城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 107.152.192.145 | attackspambots | (From whitlow.retha@gmail.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com |
2020-07-24 23:07:28 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.152.192.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.152.192.58. IN A
;; AUTHORITY SECTION:
. 42 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400
;; Query time: 177 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 08:13:10 CST 2023
;; MSG SIZE rcvd: 107
58.192.152.107.in-addr.arpa domain name pointer 7a1d4f.westemberg.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
58.192.152.107.in-addr.arpa name = 7a1d4f.westemberg.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 219.145.104.203 | attack | Unauthorized connection attempt detected from IP address 219.145.104.203 to port 1433 |
2020-01-01 19:17:56 |
| 221.218.186.191 | attack | Unauthorized connection attempt detected from IP address 221.218.186.191 to port 23 |
2020-01-01 19:44:30 |
| 138.0.224.232 | attack | Unauthorized connection attempt detected from IP address 138.0.224.232 to port 445 |
2020-01-01 19:23:36 |
| 221.181.24.246 | attack | Unauthorized connection attempt detected from IP address 221.181.24.246 to port 22 |
2020-01-01 19:17:22 |
| 163.125.193.40 | attackspambots | Unauthorized connection attempt detected from IP address 163.125.193.40 to port 1433 |
2020-01-01 19:21:12 |
| 159.203.197.32 | attackspambots | Unauthorized connection attempt from IP address 159.203.197.32 on Port 139(NETBIOS) |
2020-01-01 19:22:18 |
| 139.226.56.43 | attack | 23/tcp [2020-01-01]1pkt |
2020-01-01 19:53:12 |
| 157.230.143.29 | attack | Unauthorized connection attempt detected from IP address 157.230.143.29 to port 9000 |
2020-01-01 19:22:49 |
| 153.141.129.87 | attackbots | Unauthorized connection attempt detected from IP address 153.141.129.87 to port 23 |
2020-01-01 19:52:46 |
| 36.96.206.243 | attack | Unauthorized connection attempt detected from IP address 36.96.206.243 to port 2323 |
2020-01-01 19:36:39 |
| 1.55.174.2 | attack | Unauthorized connection attempt detected from IP address 1.55.174.2 to port 23 |
2020-01-01 19:41:15 |
| 185.173.35.61 | attack | Jan 1 11:38:45 debian-2gb-nbg1-2 kernel: \[134457.938501\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.173.35.61 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=239 ID=56357 PROTO=TCP SPT=63380 DPT=8530 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-01 19:19:08 |
| 183.80.110.212 | attack | Unauthorized connection attempt detected from IP address 183.80.110.212 to port 23 |
2020-01-01 19:19:58 |
| 182.84.125.48 | attackbotsspam | 2020-01-01T11:49:59.2323681240 sshd\[16992\]: Invalid user pi from 182.84.125.48 port 51932 2020-01-01T11:49:59.2419371240 sshd\[16990\]: Invalid user pi from 182.84.125.48 port 51928 2020-01-01T11:49:59.4735451240 sshd\[16992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.84.125.48 2020-01-01T11:49:59.4880551240 sshd\[16990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.84.125.48 ... |
2020-01-01 19:49:55 |
| 132.232.94.184 | attackbots | Unauthorized connection attempt detected from IP address 132.232.94.184 to port 80 |
2020-01-01 19:54:10 |