城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 130.149.80.199 | attack | Automatic report - Banned IP Access |
2020-09-09 20:34:03 |
| 130.149.80.199 | attackspam | Automatic report - Banned IP Access |
2020-09-09 14:30:49 |
| 130.149.80.199 | attackspam | Automatic report - Banned IP Access |
2020-09-09 06:42:58 |
| 130.149.80.199 | attack | SQL Injection Attempts |
2020-08-06 17:31:32 |
| 130.149.80.199 | attack | Automatic report - Banned IP Access |
2020-08-01 16:15:20 |
| 130.149.80.199 | attackspam | 23.04.2020 05:56:10 - Wordpress fail Detected by ELinOX-ALM |
2020-04-23 12:14:40 |
| 130.149.80.199 | attackspam | DE_RIPE_<177>1579841520 [1:2522007:3950] ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 8 [Classification: Misc Attack] [Priority: 2] {TCP} 130.149.80.199:45420 |
2020-01-24 19:57:33 |
| 130.149.80.199 | attackbots | Automatic report - XMLRPC Attack |
2019-10-04 22:37:23 |
| 130.149.80.199 | attackbots | goldgier-uhren-ankauf.de:80 130.149.80.199 - - \[21/Sep/2019:11:40:00 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 515 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_6\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/69.0.3497.81 Safari/537.36" goldgier-uhren-ankauf.de 130.149.80.199 \[21/Sep/2019:11:40:01 +0200\] "POST /xmlrpc.php HTTP/1.0" 302 3617 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_6\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/69.0.3497.81 Safari/537.36" |
2019-09-21 19:43:17 |
| 130.149.80.199 | attack | Wordpress attack |
2019-07-14 07:39:54 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.149.8.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.149.8.20. IN A
;; AUTHORITY SECTION:
. 391 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400
;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:16:33 CST 2022
;; MSG SIZE rcvd: 105
20.8.149.130.in-addr.arpa domain name pointer go.tu.berlin.
20.8.149.130.in-addr.arpa domain name pointer tu.berlin.
20.8.149.130.in-addr.arpa domain name pointer apply4master.studsek.tu-berlin.de.
20.8.149.130.in-addr.arpa domain name pointer www.tu.berlin.
20.8.149.130.in-addr.arpa domain name pointer www.static.tu.berlin.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.8.149.130.in-addr.arpa name = tu.berlin.
20.8.149.130.in-addr.arpa name = apply4master.studsek.tu-berlin.de.
20.8.149.130.in-addr.arpa name = www.tu.berlin.
20.8.149.130.in-addr.arpa name = www.static.tu.berlin.
20.8.149.130.in-addr.arpa name = go.tu.berlin.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 177.67.10.4 | attackbotsspam | port scan and connect, tcp 80 (http) |
2019-06-23 04:08:57 |
| 126.82.24.78 | attackbots | php vulnerability scanning/probing |
2019-06-23 04:17:29 |
| 200.27.223.76 | attackbots | [ER hit] Tried to deliver spam. Already well known. |
2019-06-23 04:00:51 |
| 172.245.1.24 | attackspam | NAME : NET-172-245-0-0-1 CIDR : 172.245.0.0/24 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Colorado - block certain countries :) IP: 172.245.1.24 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-23 03:52:33 |
| 193.93.195.144 | attackbotsspam | 4.201.442,99-03/02 concatform PostRequest-Spammer scoring: Lusaka01 |
2019-06-23 03:55:03 |
| 125.143.121.106 | attackbots | TCP port 23 (Telnet) attempt blocked by firewall. [2019-06-22 16:35:33] |
2019-06-23 04:19:21 |
| 185.41.97.216 | attackspam | $f2bV_matches |
2019-06-23 04:04:01 |
| 77.85.168.253 | attackspam | SPF Fail sender not permitted to send mail for @btc-net.bg / Sent Mail to target address hacked/leaked from Planet3DNow.de |
2019-06-23 03:53:36 |
| 14.18.248.22 | attack | Unauthorised access (Jun 22) SRC=14.18.248.22 LEN=40 TTL=243 ID=3582 TCP DPT=445 WINDOW=1024 SYN |
2019-06-23 04:07:50 |
| 86.229.7.158 | attackspam | Automatic report - SSH Brute-Force Attack |
2019-06-23 03:44:20 |
| 85.206.165.8 | attackspambots | (From micgyhaelgop@gmail.com) That is an amazing gift for win. ottochiropractic.net http://bit.ly/2KA5Maz |
2019-06-23 04:04:33 |
| 191.53.223.177 | attackbots | failed_logins |
2019-06-23 04:23:55 |
| 139.59.56.121 | attackbotsspam | Jun 22 18:20:44 ubuntu-2gb-nbg1-dc3-1 sshd[7609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121 Jun 22 18:20:46 ubuntu-2gb-nbg1-dc3-1 sshd[7609]: Failed password for invalid user server from 139.59.56.121 port 45294 ssh2 ... |
2019-06-23 03:48:33 |
| 184.105.139.115 | attackspambots | port scan/probe/communication attempt |
2019-06-23 04:24:09 |
| 177.154.234.181 | attack | failed_logins |
2019-06-23 04:25:17 |