城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.12.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.22.12.190. IN A
;; AUTHORITY SECTION:
. 80 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:24:24 CST 2022
;; MSG SIZE rcvd: 106
Host 190.12.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 190.12.22.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.82.78.100 | attackbots | 80.82.78.100 was recorded 22 times by 12 hosts attempting to connect to the following ports: 41092,41022,48899. Incident counter (4h, 24h, all-time): 22, 130, 19124 |
2020-02-20 18:38:30 |
| 129.211.99.128 | attackspam | Invalid user bunny from 129.211.99.128 port 52570 |
2020-02-20 18:25:45 |
| 121.46.26.126 | attack | Invalid user nagios from 121.46.26.126 port 56008 |
2020-02-20 18:35:39 |
| 192.144.134.18 | attackbots | Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP] |
2020-02-20 18:28:45 |
| 49.235.221.86 | attackbots | Invalid user ubuntu from 49.235.221.86 port 45176 |
2020-02-20 18:15:34 |
| 188.148.149.113 | attack | Honeypot attack, port: 5555, PTR: c188-148-149-113.bredband.comhem.se. |
2020-02-20 18:35:01 |
| 189.171.66.137 | attack | Honeypot attack, port: 4567, PTR: dsl-189-171-66-137-dyn.prod-infinitum.com.mx. |
2020-02-20 18:47:50 |
| 106.40.151.65 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-02-20 18:20:32 |
| 194.26.29.122 | attackspambots | Feb 20 11:24:27 h2177944 kernel: \[5392131.379965\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=177 ID=48285 PROTO=TCP SPT=44707 DPT=13382 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 20 11:24:27 h2177944 kernel: \[5392131.379979\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=177 ID=48285 PROTO=TCP SPT=44707 DPT=13382 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 20 11:28:26 h2177944 kernel: \[5392369.737590\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=177 ID=62928 PROTO=TCP SPT=44707 DPT=63397 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 20 11:28:26 h2177944 kernel: \[5392369.737605\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=177 ID=62928 PROTO=TCP SPT=44707 DPT=63397 WINDOW=1024 RES=0x00 SYN URGP=0 Feb 20 11:30:37 h2177944 kernel: \[5392501.304215\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=194.26.29.122 DST=85.214.1 |
2020-02-20 18:37:37 |
| 92.115.141.236 | attackbotsspam | trying to access non-authorized port |
2020-02-20 18:27:13 |
| 152.237.233.119 | attack | Automatic report - Port Scan Attack |
2020-02-20 18:25:31 |
| 185.59.124.62 | attackbotsspam | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-02-20 18:46:51 |
| 94.191.99.243 | attackbotsspam | Automatic report - SSH Brute-Force Attack |
2020-02-20 18:36:10 |
| 183.88.228.168 | attackspam | Honeypot attack, port: 445, PTR: mx-ll-183.88.228-168.dynamic.3bb.in.th. |
2020-02-20 18:54:12 |
| 171.227.200.6 | attackspam | Honeypot attack, port: 81, PTR: dynamic-ip-adsl.viettel.vn. |
2020-02-20 18:52:04 |