城市(city): Yinchuan
省份(region): Ningxia Hui Autonomous Region
国家(country): China
运营商(isp): ChinaNet Ningxia Province Network
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
类型 | 评论内容 | 时间 |
---|---|---|
attackbots | The IP has triggered Cloudflare WAF. CF-Ray: 543614a51abfd376 | WAF_Rule_ID: ipr24 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/4.066686748 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-12 03:37:36 |
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
106.45.0.198 | attack | Detected by ModSecurity. Host header is an IP address, Request URI: / |
2020-08-07 18:17:55 |
106.45.0.182 | attackspam | Unauthorized connection attempt detected from IP address 106.45.0.182 to port 443 |
2020-07-25 20:37:03 |
106.45.0.43 | attackspam | Unauthorized connection attempt detected from IP address 106.45.0.43 to port 8081 [J] |
2020-03-02 20:37:01 |
106.45.0.168 | attackbots | Unauthorized connection attempt detected from IP address 106.45.0.168 to port 8899 [J] |
2020-03-02 17:15:57 |
106.45.0.111 | attackbotsspam | Unauthorized connection attempt detected from IP address 106.45.0.111 to port 22 [J] |
2020-03-02 15:06:55 |
106.45.0.255 | attack | Unauthorized connection attempt detected from IP address 106.45.0.255 to port 22 [J] |
2020-03-02 15:06:35 |
106.45.0.52 | attack | Unauthorized connection attempt detected from IP address 106.45.0.52 to port 443 [J] |
2020-02-05 09:42:09 |
106.45.0.64 | attackbots | Unauthorized connection attempt detected from IP address 106.45.0.64 to port 8089 [T] |
2020-01-29 17:45:51 |
106.45.0.208 | attack | Unauthorized connection attempt detected from IP address 106.45.0.208 to port 8081 [T] |
2020-01-29 17:45:22 |
106.45.0.171 | attack | Unauthorized connection attempt detected from IP address 106.45.0.171 to port 8888 [J] |
2020-01-29 10:31:04 |
106.45.0.45 | attackspam | Unauthorized connection attempt detected from IP address 106.45.0.45 to port 8000 [J] |
2020-01-27 17:38:30 |
106.45.0.112 | attackspam | Unauthorized connection attempt detected from IP address 106.45.0.112 to port 8000 [J] |
2020-01-27 14:48:50 |
106.45.0.56 | attackspam | Unauthorized connection attempt detected from IP address 106.45.0.56 to port 8081 [J] |
2020-01-27 00:51:09 |
106.45.0.77 | attackbots | Unauthorized connection attempt detected from IP address 106.45.0.77 to port 8081 [J] |
2020-01-27 00:19:12 |
106.45.0.97 | attackbots | Unauthorized connection attempt detected from IP address 106.45.0.97 to port 80 [J] |
2020-01-20 20:37:58 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.45.0.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.45.0.98. IN A
;; AUTHORITY SECTION:
. 439 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019121101 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 03:37:32 CST 2019
;; MSG SIZE rcvd: 115
Host 98.0.45.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 98.0.45.106.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
77.244.209.4 | attack | Invalid user tom from 77.244.209.4 port 43228 |
2020-02-01 06:54:04 |
165.22.215.185 | attackbots | Invalid user bot from 165.22.215.185 port 33360 |
2020-02-01 07:15:47 |
49.232.51.237 | attackbots | Jan 31 23:33:46 markkoudstaal sshd[28979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.237 Jan 31 23:33:48 markkoudstaal sshd[28979]: Failed password for invalid user oracle from 49.232.51.237 port 36594 ssh2 Jan 31 23:37:05 markkoudstaal sshd[29549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.51.237 |
2020-02-01 06:50:06 |
180.158.212.107 | attackspam | Unauthorized connection attempt detected from IP address 180.158.212.107 to port 1433 [J] |
2020-02-01 06:48:37 |
60.216.149.98 | attackbotsspam | SSH-bruteforce attempts |
2020-02-01 07:09:52 |
178.211.51.222 | attackbots | Trying ports that it shouldn't be. |
2020-02-01 06:49:06 |
51.77.212.179 | attackspambots | Invalid user takeuchi from 51.77.212.179 port 39662 |
2020-02-01 07:11:33 |
36.235.113.132 | attackspam | 5555/tcp [2020-01-31]1pkt |
2020-02-01 07:16:51 |
42.180.237.179 | attack | 23/tcp [2020-01-31]1pkt |
2020-02-01 07:20:13 |
198.108.66.45 | attack | 83/tcp 3389/tcp 8089/tcp... [2019-12-12/2020-01-31]4pkt,4pt.(tcp) |
2020-02-01 06:53:34 |
41.97.78.202 | attackbotsspam | Jan 31 22:33:56 vmd46246 kernel: [4417843.236491] [UFW AUDIT INVALID] IN=eth0 OUT= MAC=00:50:56:3e:fb:88:28:99:3a:4d:23:91:08:00 SRC=41.97.78.202 DST=144.91.112.181 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=32954 PROTO=TCP SPT=26566 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 Jan 31 22:33:56 vmd46246 kernel: [4417843.236501] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:fb:88:28:99:3a:4d:23:91:08:00 SRC=41.97.78.202 DST=144.91.112.181 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=32954 PROTO=TCP SPT=26566 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 Jan 31 22:33:57 vmd46246 kernel: [4417844.248968] [UFW AUDIT INVALID] IN=eth0 OUT= MAC=00:50:56:3e:fb:88:28:99:3a:4d:23:91:08:00 SRC=41.97.78.202 DST=144.91.112.181 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=32970 PROTO=TCP SPT=26572 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 Jan 31 22:33:57 vmd46246 kernel: [4417844.248978] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:fb:88:28:99:3a:4d:23:91:08:00 SRC=41.97.78.202 DST=144.91.112.181 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=32970 PROTO=TCP SPT ... |
2020-02-01 07:23:25 |
183.249.242.103 | attackspam | Jan 31 22:56:03 game-panel sshd[24027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.249.242.103 Jan 31 22:56:06 game-panel sshd[24027]: Failed password for invalid user devops from 183.249.242.103 port 39864 ssh2 Jan 31 23:00:55 game-panel sshd[24313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.249.242.103 |
2020-02-01 07:14:38 |
181.177.115.31 | attackbotsspam | 01/31/2020-22:34:34.084514 181.177.115.31 Protocol: 6 ET DROP Spamhaus DROP Listed Traffic Inbound group 19 |
2020-02-01 06:47:22 |
170.84.87.207 | attackbots | 445/tcp [2020-01-31]1pkt |
2020-02-01 07:25:42 |
202.190.86.225 | attackspam | Abuse |
2020-02-01 07:05:45 |