城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.7.245.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.7.245.80. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:29:11 CST 2025
;; MSG SIZE rcvd: 105
Host 80.245.7.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 80.245.7.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.129.33.20 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 5097 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-14 05:11:54 |
| 167.248.133.22 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 8080 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-14 05:34:36 |
| 85.13.95.34 | attackbotsspam | Oct 13 22:37:32 xeon postfix/smtpd[61681]: warning: host-85-13-95-34.lidos.cz[85.13.95.34]: SASL PLAIN authentication failed: authentication failure |
2020-10-14 05:40:27 |
| 121.14.17.168 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-10-14 05:18:00 |
| 45.129.33.56 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 13478 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-14 05:47:02 |
| 185.221.134.250 | attack | ET SCAN Sipvicious Scan - port: 5060 proto: sip cat: Attempted Information Leakbytes: 452 |
2020-10-14 05:16:34 |
| 80.82.65.90 | attackbotsspam | Port Scan: UDP/389 |
2020-10-14 05:21:42 |
| 45.129.33.54 | attack | ET DROP Dshield Block Listed Source group 1 - port: 7968 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-14 05:27:24 |
| 45.129.33.145 | attack | ET DROP Dshield Block Listed Source group 1 - port: 39557 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-14 05:45:18 |
| 78.128.113.42 | attackbotsspam |
|
2020-10-14 05:40:54 |
| 103.86.158.210 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-10-14 05:37:22 |
| 58.221.62.191 | attackspam | 2020-10-13T16:10:36.9994801495-001 sshd[33269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.62.191 user=root 2020-10-13T16:10:38.8460711495-001 sshd[33269]: Failed password for root from 58.221.62.191 port 38181 ssh2 2020-10-13T16:26:33.9139911495-001 sshd[34059]: Invalid user dnscache from 58.221.62.191 port 36663 2020-10-13T16:26:33.9200101495-001 sshd[34059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.62.191 2020-10-13T16:26:33.9139911495-001 sshd[34059]: Invalid user dnscache from 58.221.62.191 port 36663 2020-10-13T16:26:36.1474431495-001 sshd[34059]: Failed password for invalid user dnscache from 58.221.62.191 port 36663 ssh2 ... |
2020-10-14 05:43:11 |
| 89.248.169.12 | attackbotsspam | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-10-14 05:20:20 |
| 92.118.160.61 | attackspambots | [Wed Oct 14 04:02:08.771804 2020] [:error] [pid 18140:tid 140204174145280] [client 92.118.160.61:51035] [client 92.118.160.61] ModSecurity: Access denied with code 403 (phase 1). Match of "within %{tx.allowed_http_versions}" against "REQUEST_PROTOCOL" required. [file "/etc/modsecurity/coreruleset-3.3.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "1041"] [id "920430"] [msg "HTTP protocol version is not allowed by policy"] [data "HTTP/1.0"] [severity "CRITICAL"] [ver "OWASP_CRS/3.3.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "X4YV0AhFQrstw8CY0VTYQwAAABU"]
... |
2020-10-14 05:38:29 |
| 71.6.167.142 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 5060 proto: sip cat: Misc Attackbytes: 271 |
2020-10-14 05:06:43 |