城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 104.129.3.254 | attackspambots | (From eric@talkwithwebvisitor.com) My name’s Eric and I just came across your website - nassauchiropracticphysicaltherapy.com - in the search results. Here’s what that means to me… Your SEO’s working. You’re getting eyeballs – mine at least. Your content’s pretty good, wouldn’t change a thing. BUT… Eyeballs don’t pay the bills. CUSTOMERS do. And studies show that 7 out of 10 visitors to a site like nassauchiropracticphysicaltherapy.com will drop by, take a gander, and then head for the hills without doing anything else. It’s like they never were even there. You can fix this. You can make it super-simple for them to raise their hand, say, “okay, let’s talk” without requiring them to even pull their cell phone from their pocket… thanks to Talk With Web Visitor. Talk With Web Visitor is a software widget that sits on your site, ready and waiting to capture any visitor’s Name, Email address and Phone Number. It lets you know immediately – so you can talk to that lead immediate  | 
                    2020-09-30 00:23:51 | 
| 104.129.31.27 | attackspambots | POODLE attack imap-login: Disconnected (no auth attempts in 0 secs): user=<>, rip=104.129.31.27, lip=[snip], TLS handshaking: SSL_accept() failed: error:14094412:SSL routines:ssl3_read_bytes:sslv3 alert bad certificate: SSL alert number 42, session=<[snip]>  | 
                    2020-06-12 13:09:54 | 
| 104.129.3.3 | attackspam | 3,39-06/06 [bc04/m132] PostRequest-Spammer scoring: zurich  | 
                    2020-06-07 01:25:41 | 
| 104.129.3.144 | attackspam | (From eric@talkwithcustomer.com) Hello pomeroychiropractic.com, People ask, “why does TalkWithCustomer work so well?” It’s simple. TalkWithCustomer enables you to connect with a prospective customer at EXACTLY the Perfect Time. - NOT one week, two weeks, three weeks after they’ve checked out your website pomeroychiropractic.com. - NOT with a form letter style email that looks like it was written by a bot. - NOT with a robocall that could come at any time out of the blue. TalkWithCustomer connects you to that person within seconds of THEM asking to hear from YOU. They kick off the conversation. They take that first step. They ask to hear from you regarding what you have to offer and how it can make their life better. And it happens almost immediately. In real time. While they’re still looking over your website pomeroychiropractic.com, trying to make up their mind whether you are right for them. When you connect with them at that very moment it’s the ultimate in Perfect Timing –  | 
                    2019-07-24 01:40:47 | 
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.129.3.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.129.3.133.			IN	A
;; AUTHORITY SECTION:
.			510	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 15:59:54 CST 2022
;; MSG SIZE  rcvd: 106
        133.3.129.104.in-addr.arpa domain name pointer 104.129.3.133.static.quadranet.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
133.3.129.104.in-addr.arpa	name = 104.129.3.133.static.quadranet.com.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 45.173.224.22 | attackbotsspam | Unauthorized connection attempt from IP address 45.173.224.22 on Port 445(SMB)  | 
                    2019-11-21 00:02:53 | 
| 5.58.77.93 | attack | Unauthorized connection attempt from IP address 5.58.77.93 on Port 445(SMB)  | 
                    2019-11-21 00:01:32 | 
| 5.135.135.116 | attackspambots | Nov 20 05:42:25 web1 sshd\[32629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.135.116 user=backup Nov 20 05:42:28 web1 sshd\[32629\]: Failed password for backup from 5.135.135.116 port 56661 ssh2 Nov 20 05:45:59 web1 sshd\[488\]: Invalid user vh from 5.135.135.116 Nov 20 05:45:59 web1 sshd\[488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.135.116 Nov 20 05:46:01 web1 sshd\[488\]: Failed password for invalid user vh from 5.135.135.116 port 46289 ssh2  | 
                    2019-11-20 23:55:18 | 
| 72.87.95.169 | attackspambots | Telnet brute force and port scan  | 
                    2019-11-20 23:53:47 | 
| 190.198.27.35 | attackbots | Unauthorized connection attempt from IP address 190.198.27.35 on Port 445(SMB)  | 
                    2019-11-20 23:32:53 | 
| 93.170.144.45 | attack | scan z  | 
                    2019-11-20 23:54:25 | 
| 181.115.185.42 | attack | Unauthorized connection attempt from IP address 181.115.185.42 on Port 445(SMB)  | 
                    2019-11-20 23:47:16 | 
| 45.224.151.74 | attackspam | Unauthorized connection attempt from IP address 45.224.151.74 on Port 445(SMB)  | 
                    2019-11-20 23:31:48 | 
| 179.36.41.239 | attackbots | 2019-11-20 14:47:32 H=(179-36-41-239.speedy.com.ar) [179.36.41.239]:34132 I=[10.100.18.21]:25 F=  | 
                    2019-11-20 23:36:25 | 
| 185.175.93.37 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 34840 proto: TCP cat: Misc Attack  | 
                    2019-11-20 23:47:43 | 
| 123.20.124.171 | attack | SASL Brute Force  | 
                    2019-11-20 23:51:05 | 
| 223.206.251.32 | attackbots | Unauthorized connection attempt from IP address 223.206.251.32 on Port 445(SMB)  | 
                    2019-11-20 23:40:54 | 
| 50.70.229.239 | attackbotsspam | Nov 20 20:43:33 vibhu-HP-Z238-Microtower-Workstation sshd\[14615\]: Invalid user aile from 50.70.229.239 Nov 20 20:43:33 vibhu-HP-Z238-Microtower-Workstation sshd\[14615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.70.229.239 Nov 20 20:43:35 vibhu-HP-Z238-Microtower-Workstation sshd\[14615\]: Failed password for invalid user aile from 50.70.229.239 port 50112 ssh2 Nov 20 20:47:29 vibhu-HP-Z238-Microtower-Workstation sshd\[15475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.70.229.239 user=uucp Nov 20 20:47:30 vibhu-HP-Z238-Microtower-Workstation sshd\[15475\]: Failed password for uucp from 50.70.229.239 port 58452 ssh2 ...  | 
                    2019-11-20 23:27:11 | 
| 91.112.193.242 | attackspambots | Fail2Ban Ban Triggered  | 
                    2019-11-21 00:00:43 | 
| 103.197.92.193 | attackspam | Unauthorized connection attempt from IP address 103.197.92.193 on Port 445(SMB)  | 
                    2019-11-20 23:56:31 |