城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.28.100.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.28.100.4. IN A
;; AUTHORITY SECTION:
. 525 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 03:09:00 CST 2022
;; MSG SIZE rcvd: 105
4.100.28.103.in-addr.arpa domain name pointer bikeunairak2018.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer www.bikeunairak.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer assess.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer www.bikeunairak2018.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer www.sedz.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer www.cebrs.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer mahadthaiphone.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer download.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer www.edp.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer cctv.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer cebrs.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer isan.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer www.isan.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer edp.moi.go.th.
4.100.28.103.in-addr.arpa domain name pointer www.secure.moi.go.th.
4.100.28.103.in-add
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
4.100.28.103.in-addr.arpa name = bikeunairak2018.moi.go.th.
4.100.28.103.in-addr.arpa name = www.bikeunairak.moi.go.th.
4.100.28.103.in-addr.arpa name = assess.moi.go.th.
4.100.28.103.in-addr.arpa name = www.bikeunairak2018.moi.go.th.
4.100.28.103.in-addr.arpa name = www.sedz.moi.go.th.
4.100.28.103.in-addr.arpa name = www.cebrs.moi.go.th.
4.100.28.103.in-addr.arpa name = mahadthaiphone.moi.go.th.
4.100.28.103.in-addr.arpa name = download.moi.go.th.
4.100.28.103.in-addr.arpa name = www.edp.moi.go.th.
4.100.28.103.in-addr.arpa name = cctv.moi.go.th.
4.100.28.103.in-addr.arpa name = cebrs.moi.go.th.
4.100.28.103.in-addr.arpa name = isan.moi.go.th.
4.100.28.103.in-addr.arpa name = www.isan.moi.go.th.
4.100.28.103.in-addr.arpa name = edp.moi.go.th.
4.100.28.103.in-addr.arpa name = www.secure.moi.go.th.
4.100.28.103.in-addr.arpa name = www.mahadthaiphone.moi.go.th.
4.100.28.103.in-addr.arpa name = training.moi.go.th.
4.100.28.103.in-addr.arpa name = www.hrh.moi.go.th.
4.100.28.103.in-addr.arpa name = sedz.moi.go.th.
4.100.28.103.in-addr.arpa name = hrh.moi.go.th.
4.100.28.103.in-addr.arpa name = secure.moi.go.th.
4.100.28.103.in-addr.arpa name = bikeunairak.moi.go.th.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 34.74.143.98 | attackbotsspam | 2019-06-23T17:15:30Z - RDP login failed multiple times. (34.74.143.98) |
2019-06-24 02:49:54 |
| 115.84.99.216 | attackbots | Automatic report - Web App Attack |
2019-06-24 02:54:08 |
| 200.23.227.47 | attackbots | SMTP-sasl brute force ... |
2019-06-24 02:45:19 |
| 213.109.244.84 | attackspambots | 23/tcp [2019-06-23]1pkt |
2019-06-24 03:09:07 |
| 112.85.42.187 | attack | SSH Brute-Force reported by Fail2Ban |
2019-06-24 02:43:00 |
| 78.112.180.202 | attackspam | Jun 23 09:00:05 srv00 sshd[42959]: Connection from 78.112.180.202 port 39574 on 87.98.249.174 port 22 Jun 23 09:00:44 srv00 sshd[42959]: reveeclipse mapping checking getaddrinfo for 202.180.112.78.rev.sfr.net [78.112.180.202] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 23 09:00:44 srv00 sshd[42959]: Connection closed by 78.112.180.202 port 39574 [preauth] Jun 23 09:14:09 srv00 sshd[43019]: Connection from 78.112.180.202 port 51134 on 87.98.249.174 port 22 Jun 23 09:16:00 srv00 sshd[43019]: reveeclipse mapping checking getaddrinfo for 202.180.112.78.rev.sfr.net [78.112.180.202] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 23 09:16:05 srv00 sshd[43019]: Connection closed by 78.112.180.202 port 51134 [preauth] Jun 23 09:16:08 srv00 sshd[43026]: Connection from 78.112.180.202 port 38286 on 87.98.249.174 port 22 Jun 23 09:16:38 srv00 sshd[43026]: reveeclipse mapping checking getaddrinfo for 202.180.112.78.rev.sfr.net [78.112.180.202] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 23 09:16:39........ ------------------------------ |
2019-06-24 03:06:27 |
| 109.88.137.104 | attack | Lines containing failures of 109.88.137.104 Jun 23 11:26:34 omfg postfix/smtpd[24142]: connect from host-109-88-137-104.dynamic.voo.be[109.88.137.104] Jun x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=109.88.137.104 |
2019-06-24 03:09:33 |
| 95.219.130.237 | attackbots | Unauthorized connection attempt from IP address 95.219.130.237 on Port 445(SMB) |
2019-06-24 03:05:04 |
| 83.143.32.73 | attackspam | Chat Spam |
2019-06-24 03:06:11 |
| 90.55.252.166 | attack | Jun 23 11:18:27 m2 sshd[8975]: Invalid user cisco from 90.55.252.166 Jun 23 11:18:31 m2 sshd[8975]: Failed password for invalid user cisco from 90.55.252.166 port 40358 ssh2 Jun 23 11:21:20 m2 sshd[9963]: Failed password for r.r from 90.55.252.166 port 48688 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=90.55.252.166 |
2019-06-24 02:37:59 |
| 46.229.168.137 | attack | Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools |
2019-06-24 02:36:19 |
| 173.230.151.87 | attackspam | Jun 23 11:22:25 mxgate1 postfix/postscreen[16059]: CONNECT from [173.230.151.87]:33056 to [176.31.12.44]:25 Jun 23 11:22:25 mxgate1 postfix/dnsblog[16487]: addr 173.230.151.87 listed by domain zen.spamhaus.org as 127.0.0.4 Jun 23 11:22:25 mxgate1 postfix/dnsblog[16485]: addr 173.230.151.87 listed by domain cbl.abuseat.org as 127.0.0.2 Jun 23 11:22:25 mxgate1 postfix/dnsblog[16488]: addr 173.230.151.87 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jun 23 11:22:27 mxgate1 postfix/dnsblog[16484]: addr 173.230.151.87 listed by domain bl.spamcop.net as 127.0.0.2 Jun 23 11:22:31 mxgate1 postfix/postscreen[16059]: DNSBL rank 5 for [173.230.151.87]:33056 Jun x@x Jun 23 11:22:31 mxgate1 postfix/postscreen[16059]: HANGUP after 0.74 from [173.230.151.87]:33056 in tests after SMTP handshake Jun 23 11:22:31 mxgate1 postfix/postscreen[16059]: DISCONNECT [173.230.151.87]:33056 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=173.230.151.87 |
2019-06-24 02:48:02 |
| 77.247.110.161 | attackspam | 5060/udp 5060/udp 5060/udp... [2019-06-21/23]14pkt,1pt.(udp) |
2019-06-24 02:56:10 |
| 50.2.38.159 | attackspam | NAME : EONIX CIDR : 50.2.0.0/15 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Nevada - block certain countries :) IP: 50.2.38.159 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-24 02:44:13 |
| 213.184.224.70 | attackbotsspam | 3389BruteforceFW21 |
2019-06-24 02:44:32 |