城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.10.106.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56298
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.10.106.145. IN A
;; AUTHORITY SECTION:
. 187 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 13:19:36 CST 2022
;; MSG SIZE rcvd: 107
145.106.10.134.in-addr.arpa domain name pointer c106h145.acad.reed.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.106.10.134.in-addr.arpa name = c106h145.acad.reed.edu.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
92.63.197.55 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 80 - port: 4631 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-01 06:46:32 |
71.6.232.8 | attackspam | Port scan: Attack repeated for 24 hours |
2020-10-01 06:30:29 |
92.63.197.66 | attackbotsspam | Sep 30 23:50:39 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=92.63.197.66 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=14818 PROTO=TCP SPT=58885 DPT=17125 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 30 23:51:13 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=92.63.197.66 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=1586 PROTO=TCP SPT=58885 DPT=16845 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 30 23:52:35 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=92.63.197.66 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=2750 PROTO=TCP SPT=58885 DPT=18102 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 30 23:52:36 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=92.63.197.66 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=63965 PROTO=TCP SPT=58885 DPT=17885 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 30 23:55:06 *hidden* kerne ... |
2020-10-01 06:25:09 |
167.248.133.69 | attack |
|
2020-10-01 06:37:33 |
115.134.128.90 | attackspambots | SSH login attempts. |
2020-10-01 06:18:56 |
62.210.177.248 | attackspambots | WordPress login Brute force / Web App Attack on client site. |
2020-10-01 06:17:34 |
103.110.106.134 | attackspam | Spammer Claim your Huge Welcome Bonus play NOW Can't Load Image? CLICK Here To See it! |
2020-10-01 06:28:22 |
112.248.124.164 | attackbots | Hit honeypot r. |
2020-10-01 06:33:44 |
37.205.51.40 | attack | Sep 30 21:08:31 sigma sshd\[10764\]: Invalid user nut from 37.205.51.40Sep 30 21:08:33 sigma sshd\[10764\]: Failed password for invalid user nut from 37.205.51.40 port 54324 ssh2 ... |
2020-10-01 06:22:20 |
114.113.81.130 | attack | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-10-01 06:39:34 |
106.12.205.237 | attack | Found on CINS badguys / proto=6 . srcport=56909 . dstport=1544 . (1955) |
2020-10-01 06:40:18 |
119.187.120.38 | attack | Listed on zen-spamhaus / proto=6 . srcport=54697 . dstport=1433 . (2089) |
2020-10-01 06:39:17 |
68.183.55.223 | attackspambots | scans once in preceeding hours on the ports (in chronological order) 24956 resulting in total of 4 scans from 68.183.0.0/16 block. |
2020-10-01 06:51:27 |
103.66.96.230 | attack | SSH login attempts. |
2020-10-01 06:24:49 |
192.241.237.210 | attackbots |
|
2020-10-01 06:18:26 |