城市(city): unknown
省份(region): unknown
国家(country): Indonesia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.234.219.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34831
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.234.219.35.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 22:33:56 CST 2025
;; MSG SIZE  rcvd: 107
        35.219.234.103.in-addr.arpa domain name pointer 35.219.234.103.platinum.net.id.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
35.219.234.103.in-addr.arpa	name = 35.219.234.103.platinum.net.id.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 103.255.4.62 | attack | Unauthorized connection attempt from IP address 103.255.4.62 on Port 445(SMB)  | 
                    2020-03-14 01:38:25 | 
| 144.217.15.221 | attack | Feb 18 05:25:13 pi sshd[26702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.15.221 Feb 18 05:25:15 pi sshd[26702]: Failed password for invalid user cron from 144.217.15.221 port 57248 ssh2  | 
                    2020-03-14 02:05:14 | 
| 144.217.243.216 | attackbotsspam | Jan 4 19:25:55 pi sshd[4944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.243.216 Jan 4 19:25:57 pi sshd[4944]: Failed password for invalid user dk from 144.217.243.216 port 44636 ssh2  | 
                    2020-03-14 01:56:20 | 
| 157.245.228.155 | attackbots | Contact form spam. -sol  | 
                    2020-03-14 02:00:52 | 
| 195.20.28.192 | attackbots | Unauthorized connection attempt from IP address 195.20.28.192 on Port 445(SMB)  | 
                    2020-03-14 01:55:40 | 
| 89.222.197.230 | attackbotsspam | Honeypot attack, port: 445, PTR: host-19-230.netorn.net.  | 
                    2020-03-14 01:51:19 | 
| 181.126.83.125 | attackspam | 2020-03-13T17:33:37.494863shield sshd\[22885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.criterion.com.py user=root 2020-03-13T17:33:39.894282shield sshd\[22885\]: Failed password for root from 181.126.83.125 port 36780 ssh2 2020-03-13T17:35:39.168080shield sshd\[23064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.criterion.com.py user=root 2020-03-13T17:35:41.316202shield sshd\[23064\]: Failed password for root from 181.126.83.125 port 60980 ssh2 2020-03-13T17:37:45.867495shield sshd\[23330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.criterion.com.py user=root  | 
                    2020-03-14 01:43:11 | 
| 43.242.242.42 | attack | Unauthorized connection attempt from IP address 43.242.242.42 on Port 445(SMB)  | 
                    2020-03-14 01:42:30 | 
| 78.184.233.141 | attackspambots | Honeypot attack, port: 81, PTR: 78.184.233.141.dynamic.ttnet.com.tr.  | 
                    2020-03-14 01:46:18 | 
| 95.152.53.243 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/95.152.53.243/ RU - 1H : (104) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : RU NAME ASN : ASN12389 IP : 95.152.53.243 CIDR : 95.152.0.0/18 PREFIX COUNT : 2741 UNIQUE IP COUNT : 8699648 ATTACKS DETECTED ASN12389 : 1H - 4 3H - 8 6H - 8 12H - 8 24H - 8 DateTime : 2020-03-13 13:45:52 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery  | 
                    2020-03-14 01:47:54 | 
| 145.239.79.45 | attack | Mar 13 11:25:25 plusreed sshd[22595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.79.45 user=root Mar 13 11:25:27 plusreed sshd[22595]: Failed password for root from 145.239.79.45 port 38100 ssh2 ...  | 
                    2020-03-14 01:29:41 | 
| 175.24.11.223 | attack | Mar 13 17:11:57 hosting180 sshd[7196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.11.223 user=root Mar 13 17:11:59 hosting180 sshd[7196]: Failed password for root from 175.24.11.223 port 52454 ssh2 ...  | 
                    2020-03-14 01:28:04 | 
| 181.113.58.26 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/181.113.58.26/ EC - 1H : (7) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : EC NAME ASN : ASN28006 IP : 181.113.58.26 CIDR : 181.113.56.0/21 PREFIX COUNT : 586 UNIQUE IP COUNT : 293888 ATTACKS DETECTED ASN28006 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2020-03-13 13:45:53 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery  | 
                    2020-03-14 01:46:52 | 
| 144.217.89.55 | attack | SSH_scan  | 
                    2020-03-14 01:47:17 | 
| 73.179.45.166 | attackbotsspam | Honeypot attack, port: 5555, PTR: c-73-179-45-166.hsd1.fl.comcast.net.  | 
                    2020-03-14 01:27:06 |