城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.122.72.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.122.72.245. IN A
;; AUTHORITY SECTION:
. 328 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 06:57:27 CST 2022
;; MSG SIZE rcvd: 107
245.72.122.124.in-addr.arpa domain name pointer ppp-124-122-72-245.revip2.asianet.co.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.72.122.124.in-addr.arpa name = ppp-124-122-72-245.revip2.asianet.co.th.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 125.161.128.161 | attackspambots | 1580791972 - 02/04/2020 05:52:52 Host: 125.161.128.161/125.161.128.161 Port: 445 TCP Blocked |
2020-02-04 21:20:42 |
| 5.101.0.209 | attackspambots | Unauthorized connection attempt detected from IP address 5.101.0.209 to port 80 [J] |
2020-02-04 21:30:54 |
| 111.230.211.183 | attackbotsspam | Unauthorized connection attempt detected from IP address 111.230.211.183 to port 2220 [J] |
2020-02-04 21:39:24 |
| 52.165.31.220 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2020-02-04 21:40:10 |
| 31.13.115.8 | attackspambots | [Tue Feb 04 11:52:49.129317 2020] [:error] [pid 9378:tid 139908148619008] [client 31.13.115.8:33724] [client 31.13.115.8] ModSecurity: Access denied with code 403 (phase 2). Found 3 byte(s) in REQUEST_URI outside range: 32-36,38-126. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "1304"] [id "920272"] [msg "Invalid character in request (outside of printable chars below ascii 127)"] [data "REQUEST_URI=/images/Klimatologi/Analisis/02-Analisis_Dasarian/Dinamika/2020/01_Januari_2020/Das-III/Analisis_Dinamika_Atmosfer\\xe2\\x80\\x93Laut_Dan_Prediksi_Curah_Hujan_Update_Dasarian_III_Januari_2020.jpg"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/EVASION"] [tag "paranoia-level/3"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/images/Klimatologi/Analisis/02-Analisis_Dasarian/Dinamika/2020 ... |
2020-02-04 21:23:22 |
| 138.118.101.69 | attack | Automatic report - Port Scan Attack |
2020-02-04 21:49:55 |
| 187.110.208.2 | attackspambots | Unauthorized connection attempt detected from IP address 187.110.208.2 to port 80 [J] |
2020-02-04 21:46:47 |
| 121.149.57.217 | attack | Unauthorized connection attempt detected from IP address 121.149.57.217 to port 81 [J] |
2020-02-04 21:21:10 |
| 23.247.88.200 | attackspambots | Feb 4 05:52:23 icecube postfix/smtpd[43598]: NOQUEUE: reject: RCPT from unknown[23.247.88.200]: 554 5.7.1 Service unavailable; Client host [23.247.88.200] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-02-04 21:37:45 |
| 121.101.129.125 | attackspam | Feb 4 05:52:40 grey postfix/smtpd\[14724\]: NOQUEUE: reject: RCPT from unknown\[121.101.129.125\]: 554 5.7.1 Service unavailable\; Client host \[121.101.129.125\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=121.101.129.125\; from=\ |
2020-02-04 21:28:30 |
| 222.186.169.192 | attackbotsspam | Feb 4 14:23:15 vpn01 sshd[21146]: Failed password for root from 222.186.169.192 port 12878 ssh2 Feb 4 14:23:18 vpn01 sshd[21146]: Failed password for root from 222.186.169.192 port 12878 ssh2 ... |
2020-02-04 21:25:20 |
| 178.47.139.172 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-02-04 21:19:20 |
| 129.213.145.118 | attackspambots | Feb 4 12:03:00 mars sshd[3266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.145.118 Feb 4 12:03:02 mars sshd[3266]: Failed password for invalid user hydra from 129.213.145.118 port 49408 ssh2 ... |
2020-02-04 21:28:00 |
| 49.206.191.163 | attackspambots | Automatic report - XMLRPC Attack |
2020-02-04 21:54:54 |
| 49.88.112.65 | attack | Feb 4 13:38:11 hcbbdb sshd\[15354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65 user=root Feb 4 13:38:13 hcbbdb sshd\[15354\]: Failed password for root from 49.88.112.65 port 26873 ssh2 Feb 4 13:39:18 hcbbdb sshd\[15462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65 user=root Feb 4 13:39:20 hcbbdb sshd\[15462\]: Failed password for root from 49.88.112.65 port 51963 ssh2 Feb 4 13:40:23 hcbbdb sshd\[15565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65 user=root |
2020-02-04 21:46:15 |