城市(city): unknown
省份(region): unknown
国家(country): Republic of China (ROC)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.104.97.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.104.97.1. IN A
;; AUTHORITY SECTION:
. 454 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030302 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 10:13:59 CST 2022
;; MSG SIZE rcvd: 105
1.97.104.112.in-addr.arpa domain name pointer 112-104-97-1.adsl.dynamic.seed.net.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
1.97.104.112.in-addr.arpa name = 112-104-97-1.adsl.dynamic.seed.net.tw.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
106.13.237.235 | attackspambots | Invalid user vbox from 106.13.237.235 port 44720 |
2020-09-05 14:31:53 |
182.155.224.185 | attackspam | Honeypot attack, port: 5555, PTR: 182-155-224-185.veetime.com. |
2020-09-05 14:45:11 |
172.107.95.30 | attackspambots |
|
2020-09-05 14:30:06 |
203.195.205.202 | attackbotsspam | Sep 5 04:03:53 mavik sshd[8844]: Invalid user postgres from 203.195.205.202 Sep 5 04:03:53 mavik sshd[8844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.205.202 Sep 5 04:03:55 mavik sshd[8844]: Failed password for invalid user postgres from 203.195.205.202 port 43824 ssh2 Sep 5 04:08:39 mavik sshd[9130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.205.202 user=root Sep 5 04:08:42 mavik sshd[9130]: Failed password for root from 203.195.205.202 port 36340 ssh2 ... |
2020-09-05 14:57:47 |
112.85.42.172 | attackbotsspam | Sep 5 06:24:28 hcbbdb sshd\[12095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172 user=root Sep 5 06:24:30 hcbbdb sshd\[12095\]: Failed password for root from 112.85.42.172 port 46140 ssh2 Sep 5 06:24:39 hcbbdb sshd\[12095\]: Failed password for root from 112.85.42.172 port 46140 ssh2 Sep 5 06:24:43 hcbbdb sshd\[12095\]: Failed password for root from 112.85.42.172 port 46140 ssh2 Sep 5 06:24:47 hcbbdb sshd\[12127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172 user=root |
2020-09-05 14:28:12 |
194.180.224.130 | attack | Sep 5 08:07:06 server sshd[11139]: Failed password for invalid user admin from 194.180.224.130 port 41804 ssh2 Sep 5 08:07:06 server sshd[11141]: Failed password for invalid user admin from 194.180.224.130 port 41866 ssh2 Sep 5 08:07:06 server sshd[11142]: Failed password for root from 194.180.224.130 port 41860 ssh2 |
2020-09-05 14:25:31 |
195.54.160.180 | attackbotsspam | Sep 5 08:32:16 home sshd[789933]: Invalid user payingit from 195.54.160.180 port 41555 Sep 5 08:32:16 home sshd[789933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180 Sep 5 08:32:16 home sshd[789933]: Invalid user payingit from 195.54.160.180 port 41555 Sep 5 08:32:18 home sshd[789933]: Failed password for invalid user payingit from 195.54.160.180 port 41555 ssh2 Sep 5 08:32:20 home sshd[789936]: Invalid user pi from 195.54.160.180 port 52420 ... |
2020-09-05 14:34:42 |
185.225.136.37 | attackbotsspam | (From eric@talkwithwebvisitor.com) Hey, my name’s Eric and for just a second, imagine this… - Someone does a search and winds up at drlesliechiro.com. - They hang out for a minute to check it out. “I’m interested… but… maybe…” - And then they hit the back button and check out the other search results instead. - Bottom line – you got an eyeball, but nothing else to show for it. - There they go. This isn’t really your fault – it happens a LOT – studies show 7 out of 10 visitors to any site disappear without leaving a trace. But you CAN fix that. Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number. It lets you know right then and there – enabling you to call that lead while they’re literally looking over your site. CLICK HERE http://www.talkwithwebvisitors.com to try out a Live Demo with Talk With Web Visitor now to see exactly how it works. Time is money when it comes to connecting with leads – |
2020-09-05 14:28:33 |
49.235.169.15 | attackspambots | 2020-09-05T05:47:12.235972vps1033 sshd[369]: Invalid user roy from 49.235.169.15 port 39284 2020-09-05T05:47:12.242758vps1033 sshd[369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.169.15 2020-09-05T05:47:12.235972vps1033 sshd[369]: Invalid user roy from 49.235.169.15 port 39284 2020-09-05T05:47:14.793136vps1033 sshd[369]: Failed password for invalid user roy from 49.235.169.15 port 39284 ssh2 2020-09-05T05:51:20.015125vps1033 sshd[9043]: Invalid user ec2-user from 49.235.169.15 port 56124 ... |
2020-09-05 14:53:08 |
164.132.145.70 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-09-05 14:17:07 |
192.126.156.1 | attack | Registration form abuse |
2020-09-05 14:42:57 |
104.168.99.225 | attackbotsspam | Scanning |
2020-09-05 14:19:58 |
183.194.212.16 | attackspam | Sep 5 05:35:29 [host] sshd[16930]: Invalid user t Sep 5 05:35:29 [host] sshd[16930]: pam_unix(sshd: Sep 5 05:35:31 [host] sshd[16930]: Failed passwor |
2020-09-05 14:36:02 |
60.2.224.234 | attackspam | Sep 5 07:53:54 server sshd[5060]: Failed password for root from 60.2.224.234 port 40194 ssh2 Sep 5 08:05:31 server sshd[10479]: Failed password for invalid user jdoe from 60.2.224.234 port 45244 ssh2 Sep 5 08:14:40 server sshd[14792]: Failed password for invalid user dasusr1 from 60.2.224.234 port 42332 ssh2 |
2020-09-05 14:23:18 |
172.245.58.78 | attackspambots | (From eric@talkwithwebvisitor.com) Good day, My name is Eric and unlike a lot of emails you might get, I wanted to instead provide you with a word of encouragement – Congratulations What for? Part of my job is to check out websites and the work you’ve done with guarinochiropractic.com definitely stands out. It’s clear you took building a website seriously and made a real investment of time and resources into making it top quality. There is, however, a catch… more accurately, a question… So when someone like me happens to find your site – maybe at the top of the search results (nice job BTW) or just through a random link, how do you know? More importantly, how do you make a connection with that person? Studies show that 7 out of 10 visitors don’t stick around – they’re there one second and then gone with the wind. Here’s a way to create INSTANT engagement that you may not have known about… Talk With Web Visitor is a software widget that’s works on your site, ready to capture |
2020-09-05 14:41:04 |