城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): CMC Telecom Infrastructure Company
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Fixed Line ISP
类型 | 评论内容 | 时间 |
---|---|---|
attackspambots | 19/6/29@23:37:41: FAIL: Alarm-Intrusion address from=113.20.98.246 ... |
2019-06-30 17:24:30 |
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
113.20.98.10 | attack | 1598877266 - 08/31/2020 14:34:26 Host: 113.20.98.10/113.20.98.10 Port: 445 TCP Blocked ... |
2020-08-31 23:53:06 |
113.20.98.228 | attackbots | 1593489220 - 06/30/2020 05:53:40 Host: 113.20.98.228/113.20.98.228 Port: 445 TCP Blocked |
2020-06-30 15:08:17 |
113.20.98.1 | attack | Unauthorized connection attempt from IP address 113.20.98.1 on Port 445(SMB) |
2020-03-23 21:34:56 |
113.20.98.232 | attackbots | 1584434401 - 03/17/2020 09:40:01 Host: 113.20.98.232/113.20.98.232 Port: 445 TCP Blocked |
2020-03-18 01:21:18 |
113.20.98.64 | attackspam | Unauthorized connection attempt from IP address 113.20.98.64 on Port 445(SMB) |
2019-10-19 03:45:41 |
113.20.98.232 | attack | Automatic report - Port Scan Attack |
2019-10-07 22:44:07 |
113.20.98.139 | attack | Unauthorized connection attempt from IP address 113.20.98.139 on Port 445(SMB) |
2019-08-27 15:41:28 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.20.98.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36665
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.20.98.246. IN A
;; AUTHORITY SECTION:
. 2729 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019063000 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 30 17:24:23 CST 2019
;; MSG SIZE rcvd: 117
Host 246.98.20.113.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 246.98.20.113.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
42.232.43.248 | attackspambots | Port Scan: TCP/23 |
2019-08-05 11:04:33 |
183.249.121.189 | attack | Port Scan: TCP/2323 |
2019-08-05 10:38:09 |
13.82.53.10 | attack | Port Scan: TCP/445 |
2019-08-05 10:22:18 |
184.105.139.78 | attack | Port Scan: UDP/443 |
2019-08-05 10:37:34 |
1.173.59.124 | attackspambots | Port Scan: TCP/23 |
2019-08-05 10:25:21 |
66.35.135.50 | attackbotsspam | Port Scan: TCP/135 |
2019-08-05 10:58:50 |
81.22.45.29 | attackbotsspam | Port scan on 14 port(s): 9074 9142 9217 9283 9303 9338 9434 9436 9522 9759 9793 9843 9945 9963 |
2019-08-05 10:51:54 |
222.100.155.14 | attack | Port Scan: TCP/5555 |
2019-08-05 10:25:47 |
177.138.64.239 | attackspambots | Port Scan: TCP/445 |
2019-08-05 10:39:57 |
67.227.152.230 | attackspam | Port Scan: TCP/445 |
2019-08-05 10:57:09 |
5.36.92.42 | attackbotsspam | Port Scan: TCP/60001 |
2019-08-05 10:24:28 |
195.210.138.202 | attackbotsspam | Port Scan: TCP/445 |
2019-08-05 10:33:21 |
71.41.206.150 | attackspam | Port Scan: UDP/137 |
2019-08-05 10:55:14 |
123.207.90.186 | attackbotsspam | Port Scan: TCP/445 |
2019-08-05 10:42:42 |
120.52.152.16 | attack | 05.08.2019 01:22:45 SSH access blocked by firewall |
2019-08-05 10:44:14 |