城市(city): unknown
省份(region): unknown
国家(country): Armenia
运营商(isp): Ucom LLC
主机名(hostname): unknown
机构(organization): Ucom LLC
使用类型(Usage Type): unknown
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attack |
|
2020-07-22 22:45:38 |
| attack | Unauthorised access (Feb 9) SRC=109.75.40.148 LEN=40 PREC=0x20 TTL=55 ID=2138 TCP DPT=23 WINDOW=64863 SYN Unauthorised access (Feb 4) SRC=109.75.40.148 LEN=40 PREC=0x20 TTL=55 ID=11152 TCP DPT=8080 WINDOW=50004 SYN Unauthorised access (Feb 3) SRC=109.75.40.148 LEN=40 PREC=0x20 TTL=55 ID=34770 TCP DPT=8080 WINDOW=59290 SYN Unauthorised access (Feb 3) SRC=109.75.40.148 LEN=40 PREC=0x20 TTL=55 ID=20556 TCP DPT=8080 WINDOW=59290 SYN |
2020-02-10 04:30:52 |
| attack | Unauthorized connection attempt detected from IP address 109.75.40.148 to port 23 [J] |
2020-01-26 03:06:28 |
| attack | Fail2Ban Ban Triggered |
2019-10-15 19:36:16 |
| attackspambots | Jul 28 03:04:48 h2177944 kernel: \[2599897.236739\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.75.40.148 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=54 ID=52500 PROTO=TCP SPT=22507 DPT=23 WINDOW=29643 RES=0x00 SYN URGP=0 Jul 28 03:04:50 h2177944 kernel: \[2599899.431355\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.75.40.148 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=54 ID=52500 PROTO=TCP SPT=22507 DPT=23 WINDOW=29643 RES=0x00 SYN URGP=0 Jul 28 03:04:54 h2177944 kernel: \[2599903.186695\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.75.40.148 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=54 ID=52500 PROTO=TCP SPT=22507 DPT=23 WINDOW=29643 RES=0x00 SYN URGP=0 Jul 28 03:04:56 h2177944 kernel: \[2599905.019345\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.75.40.148 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=54 ID=52500 PROTO=TCP SPT=22507 DPT=23 WINDOW=29643 RES=0x00 SYN URGP=0 Jul 28 03:04:57 h2177944 kernel: \[2599906.030148\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=109.75.40.148 DST=85.214.117.9 LEN=40 |
2019-07-28 17:27:57 |
| attack | Honeypot attack, port: 23, PTR: host-148.40.75.109.ucom.am. |
2019-07-02 09:12:02 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 109.75.40.127 | attackbotsspam | Honeypot attack, port: 445, PTR: host-127.40.75.109.ucom.am. |
2020-05-05 03:06:35 |
| 109.75.40.123 | attackspambots | Unauthorized connection attempt from IP address 109.75.40.123 on Port 445(SMB) |
2019-09-05 19:43:56 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.75.40.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26482
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.75.40.148. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019041601 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 17 11:45:24 +08 2019
;; MSG SIZE rcvd: 117
148.40.75.109.in-addr.arpa domain name pointer host-148.40.75.109.ucom.am.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
148.40.75.109.in-addr.arpa name = host-148.40.75.109.ucom.am.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 177.94.13.20 | attackspam | Unauthorized connection attempt detected from IP address 177.94.13.20 to port 23 |
2020-01-06 03:49:57 |
| 201.69.204.201 | attackbots | Unauthorized connection attempt detected from IP address 201.69.204.201 to port 80 |
2020-01-06 03:39:43 |
| 91.126.207.21 | attackbots | Unauthorized connection attempt detected from IP address 91.126.207.21 to port 5555 [J] |
2020-01-06 03:56:51 |
| 61.77.200.15 | attackbots | Unauthorized connection attempt detected from IP address 61.77.200.15 to port 5555 [J] |
2020-01-06 03:31:11 |
| 3.233.234.238 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-01-06 03:33:45 |
| 73.49.27.3 | attack | Unauthorized connection attempt detected from IP address 73.49.27.3 to port 8000 |
2020-01-06 04:01:23 |
| 200.48.240.43 | attack | Unauthorized connection attempt detected from IP address 200.48.240.43 to port 23 |
2020-01-06 03:41:04 |
| 217.216.12.151 | attackbots | Unauthorized connection attempt detected from IP address 217.216.12.151 to port 23 |
2020-01-06 03:36:35 |
| 200.0.8.7 | attackbots | Unauthorized connection attempt detected from IP address 200.0.8.7 to port 4567 |
2020-01-06 03:42:00 |
| 41.230.61.3 | attackbots | Unauthorized connection attempt detected from IP address 41.230.61.3 to port 8080 [J] |
2020-01-06 04:04:05 |
| 197.44.237.194 | attackbotsspam | Unauthorized connection attempt detected from IP address 197.44.237.194 to port 2323 [J] |
2020-01-06 03:42:25 |
| 195.43.172.151 | attackspambots | Unauthorized connection attempt detected from IP address 195.43.172.151 to port 80 |
2020-01-06 03:43:36 |
| 81.16.251.175 | attackbotsspam | Unauthorized connection attempt detected from IP address 81.16.251.175 to port 23 |
2020-01-06 03:58:56 |
| 91.222.197.207 | attackspambots | Unauthorized connection attempt detected from IP address 91.222.197.207 to port 80 |
2020-01-06 03:56:25 |
| 1.249.31.138 | attackbots | Unauthorized connection attempt detected from IP address 1.249.31.138 to port 4567 [J] |
2020-01-06 03:34:09 |