城市(city): Taipei
省份(region): Taipei City
国家(country): Taiwan, China
运营商(isp): Chunghwa Telecom Co. Ltd.
主机名(hostname): unknown
机构(organization): Data Communication Business Group
使用类型(Usage Type): unknown
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/114.32.80.100/ TW - 1H : (2973) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : TW NAME ASN : ASN3462 IP : 114.32.80.100 CIDR : 114.32.64.0/18 PREFIX COUNT : 390 UNIQUE IP COUNT : 12267520 WYKRYTE ATAKI Z ASN3462 : 1H - 301 3H - 1047 6H - 2195 12H - 2873 24H - 2882 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-09-24 04:14:47 |
| attack | : |
2019-08-18 20:17:53 |
| attackbots | " " |
2019-07-18 05:42:32 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 114.32.80.234 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-11-03 08:23:44 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.32.80.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49445
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.32.80.100. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019071701 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jul 18 05:42:27 CST 2019
;; MSG SIZE rcvd: 117
100.80.32.114.in-addr.arpa domain name pointer 114-32-80-100.HINET-IP.hinet.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
100.80.32.114.in-addr.arpa name = 114-32-80-100.HINET-IP.hinet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 89.40.73.252 | attackspambots | Unauthorized connection attempt detected from IP address 89.40.73.252 to port 80 |
2020-05-12 23:23:51 |
| 178.93.43.183 | attack | Unauthorized connection attempt detected from IP address 178.93.43.183 to port 8080 |
2020-05-13 00:03:08 |
| 89.40.73.240 | attackbots | Unauthorized connection attempt detected from IP address 89.40.73.240 to port 443 |
2020-05-12 23:26:01 |
| 41.204.232.102 | attackspam | Unauthorized connection attempt detected from IP address 41.204.232.102 to port 8080 |
2020-05-12 23:49:33 |
| 202.113.80.58 | attack | Unauthorized connection attempt detected from IP address 202.113.80.58 to port 1433 |
2020-05-12 23:56:30 |
| 36.78.200.231 | attack | Unauthorized connection attempt detected from IP address 36.78.200.231 to port 445 |
2020-05-12 23:12:07 |
| 178.207.128.225 | attackspambots | Unauthorized connection attempt detected from IP address 178.207.128.225 to port 445 |
2020-05-12 23:20:35 |
| 208.111.86.112 | attackbots | Unauthorized connection attempt detected from IP address 208.111.86.112 to port 8089 |
2020-05-12 23:54:34 |
| 89.40.73.217 | attackspambots | Unauthorized connection attempt detected from IP address 89.40.73.217 to port 8888 |
2020-05-12 23:34:01 |
| 89.40.73.221 | attackspam | Unauthorized connection attempt detected from IP address 89.40.73.221 to port 443 |
2020-05-12 23:32:17 |
| 201.28.114.17 | attackspam | Unauthorized connection attempt detected from IP address 201.28.114.17 to port 8080 |
2020-05-12 23:16:39 |
| 45.235.131.50 | attack | Unauthorized connection attempt detected from IP address 45.235.131.50 to port 445 |
2020-05-12 23:48:19 |
| 162.243.136.182 | attack | Unauthorized connection attempt detected from IP address 162.243.136.182 to port 135 |
2020-05-13 00:05:07 |
| 89.40.73.238 | attackbotsspam | Unauthorized connection attempt detected from IP address 89.40.73.238 to port 8080 |
2020-05-12 23:26:57 |
| 201.43.181.90 | attack | Unauthorized connection attempt detected from IP address 201.43.181.90 to port 445 |
2020-05-12 23:57:03 |