城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): Amanah Tech Inc.
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Data Center/Web Hosting/Transit
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attackbots | rfi injection: ftp://sergievs:sergievs@sergievs.50webs.org/envi.php? |
2019-10-29 21:38:39 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.245.145.21 | attackspambots | 2020-08-14 22:58:21 | |
| 104.245.145.24 | attack | 2020-08-14 22:58:07 | |
| 104.245.145.36 | attackbots | 2020-08-14 22:57:34 | |
| 104.245.145.41 | attackspam | (From christen.crowe@gmail.com) No cost advertising for your website here: http://www.free-ad-submission.xyz |
2020-05-24 16:11:03 |
| 104.245.145.40 | attackbots | (From jina.piscitelli@gmail.com) Greetings, I was just taking a look at your website and filled out your contact form. The feedback page on your site sends you these messages via email which is why you're reading my message at this moment right? That's the most important achievement with any type of online ad, getting people to actually READ your message and this is exactly what you're doing now! If you have an advertisement you would like to blast out to thousands of websites via their contact forms in the U.S. or anywhere in the world send me a quick note now, I can even focus on your required niches and my pricing is very reasonable. Shoot me an email here: Phungcorsi@gmail.com |
2020-05-24 15:24:33 |
| 104.245.145.7 | attack | Automatic report - Banned IP Access |
2020-05-24 07:26:20 |
| 104.245.145.58 | attackbots | Contact form spam |
2020-05-23 22:24:16 |
| 104.245.145.125 | attackspam | Malicious Traffic/Form Submission |
2020-05-20 01:19:18 |
| 104.245.145.122 | attackspam | (From pitcher.theresa@gmail.com) Interested in the latest fitness , wellness, nutrition trends? Check out my blog here: https://bit.ly/www-fitnessismystatussymbol-com And my Instagram page @ziptofitness |
2020-05-19 23:52:38 |
| 104.245.145.21 | attackspambots | (From nussbaum.velma@gmail.com) Groundbreaking new way to advertise your website for Nothing! See here: http://bit.ly/submityourfreeads |
2020-05-16 14:55:55 |
| 104.245.145.37 | attack | (From herlitz.samira@gmail.com) Stem cell therapy has proven itself to be one of the most effective treatments for COPD (Chronic Obstructive Pulmonary Disorder). IMC is the leader in stem cell therapies in Mexico. For more information on how we can treat COPD please visit: https://bit.ly/copd-integramedicalcenter |
2020-05-14 16:37:14 |
| 104.245.145.38 | attack | Malicious Traffic/Form Submission |
2020-05-11 14:29:54 |
| 104.245.145.39 | attackbots | Spammer |
2020-04-11 05:49:45 |
| 104.245.145.5 | attack | (From marx.stacy@gmail.com) Greetings, I was just visiting your website and filled out your "contact us" form. The contact page on your site sends you messages like this to your email account which is why you are reading my message at this moment right? That's the most important achievement with any type of advertising, making people actually READ your advertisement and that's exactly what I just accomplished with you! If you have an advertisement you would like to blast out to tons of websites via their contact forms in the US or to any country worldwide send me a quick note now, I can even focus on specific niches and my charges are very affordable. Reply here: trinitybeumer@gmail.com |
2020-04-08 18:18:02 |
| 104.245.145.124 | attack | (From samantha.barden@yahoo.com) Are You interested in an advertising service that charges less than $50 every month and sends hundreds of people who are ready to buy directly to your website? Check out: http://www.trafficmasters.xyz |
2020-04-06 15:06:05 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.245.145.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.245.145.13. IN A
;; AUTHORITY SECTION:
. 185 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019102900 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 29 21:38:32 CST 2019
;; MSG SIZE rcvd: 118
13.145.245.104.in-addr.arpa domain name pointer r-13-145-245-104.consumer-pool.prcdn.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
13.145.245.104.in-addr.arpa name = r-13-145-245-104.consumer-pool.prcdn.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 84.215.23.72 | attackspambots | Invalid user firefart from 84.215.23.72 port 40702 |
2020-04-21 21:07:37 |
| 79.3.6.207 | attack | Invalid user hadoop from 79.3.6.207 port 64875 |
2020-04-21 21:09:32 |
| 137.74.173.182 | attackspambots | Invalid user bj from 137.74.173.182 port 48452 |
2020-04-21 20:43:56 |
| 106.13.175.211 | attackspambots | Invalid user admin from 106.13.175.211 port 56218 |
2020-04-21 21:00:22 |
| 92.50.249.166 | attackbotsspam | Invalid user pv from 92.50.249.166 port 43786 |
2020-04-21 21:05:47 |
| 104.236.224.69 | attack | Fail2Ban - SSH Bruteforce Attempt |
2020-04-21 21:01:28 |
| 84.45.251.243 | attackspambots | (sshd) Failed SSH login from 84.45.251.243 (GB/United Kingdom/Durham/Willington/84-45-251-243.static.enta.net/[AS8468 Entanet]): 1 in the last 3600 secs |
2020-04-21 21:07:57 |
| 49.247.193.105 | attackbotsspam | Invalid user postgres from 49.247.193.105 port 51028 |
2020-04-21 21:18:56 |
| 104.236.175.127 | attackbotsspam | Apr 21 15:17:36 lukav-desktop sshd\[32391\]: Invalid user mr from 104.236.175.127 Apr 21 15:17:36 lukav-desktop sshd\[32391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.175.127 Apr 21 15:17:39 lukav-desktop sshd\[32391\]: Failed password for invalid user mr from 104.236.175.127 port 50512 ssh2 Apr 21 15:20:26 lukav-desktop sshd\[32516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.175.127 user=root Apr 21 15:20:28 lukav-desktop sshd\[32516\]: Failed password for root from 104.236.175.127 port 60104 ssh2 |
2020-04-21 21:01:59 |
| 80.24.111.17 | attackbotsspam | SSH bruteforce |
2020-04-21 21:09:00 |
| 122.51.89.18 | attackspam | Invalid user fn from 122.51.89.18 port 36298 |
2020-04-21 20:52:32 |
| 128.199.110.226 | attackbots | Invalid user vl from 128.199.110.226 port 60163 |
2020-04-21 20:49:25 |
| 123.207.97.250 | attack | Invalid user nn from 123.207.97.250 port 51420 |
2020-04-21 20:50:50 |
| 128.199.79.158 | attack | Apr 21 08:04:36 Tower sshd[28426]: Connection from 128.199.79.158 port 35335 on 192.168.10.220 port 22 rdomain "" Apr 21 08:04:39 Tower sshd[28426]: Invalid user ubuntu from 128.199.79.158 port 35335 Apr 21 08:04:39 Tower sshd[28426]: error: Could not get shadow information for NOUSER Apr 21 08:04:39 Tower sshd[28426]: Failed password for invalid user ubuntu from 128.199.79.158 port 35335 ssh2 Apr 21 08:04:39 Tower sshd[28426]: Received disconnect from 128.199.79.158 port 35335:11: Bye Bye [preauth] Apr 21 08:04:39 Tower sshd[28426]: Disconnected from invalid user ubuntu 128.199.79.158 port 35335 [preauth] |
2020-04-21 20:49:57 |
| 46.218.7.227 | attackbots | Invalid user ea from 46.218.7.227 port 45480 |
2020-04-21 21:20:50 |