城市(city): Fremont
省份(region): California
国家(country): United States
运营商(isp): Hurricane Electric LLC
主机名(hostname): unknown
机构(organization): Hurricane Electric LLC
使用类型(Usage Type): Data Center/Web Hosting/Transit
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attackspambots |
|
2020-08-31 17:57:38 |
| attack | Hit honeypot r. |
2020-06-12 12:00:38 |
| attack | Port scan denied |
2020-06-08 14:48:37 |
| attackbotsspam | srv03 Mass scanning activity detected Target: 123(ntp) .. |
2020-04-21 16:51:50 |
| attackspambots | Honeypot hit. |
2020-04-09 19:37:07 |
| attack | scan z |
2020-03-27 20:03:54 |
| attackbots | Feb 20 17:22:44 debian-2gb-nbg1-2 kernel: \[4474974.813845\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=184.105.139.80 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=43213 DPT=9200 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-02-21 05:14:18 |
| attackspambots | 389/tcp 873/tcp 8080/tcp... [2019-10-17/12-12]21pkt,9pt.(tcp),1pt.(udp) |
2019-12-12 23:25:17 |
| attack | 5555/tcp 23/tcp 9200/tcp... [2019-09-05/11-03]32pkt,13pt.(tcp),1pt.(udp) |
2019-11-03 13:22:06 |
| attack | scan r |
2019-10-11 16:08:50 |
| attackbotsspam | Honeypot hit. |
2019-09-04 12:59:21 |
| attackbots | Scanning random ports - tries to find possible vulnerable services |
2019-09-01 15:58:46 |
| attackbotsspam | Honeypot hit. |
2019-08-21 14:23:18 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 184.105.139.105 | attackproxy | Compromised IP |
2024-05-09 23:09:39 |
| 184.105.139.109 | attackproxy | Vulnerability Scanner |
2024-04-30 12:59:43 |
| 184.105.139.70 | attack | Vulnerability Scanner |
2024-04-20 00:30:49 |
| 184.105.139.90 | botsattackproxy | Ddos bot |
2024-04-20 00:26:45 |
| 184.105.139.68 | attack | Vulnerability Scanner |
2024-04-10 01:16:38 |
| 184.105.139.69 | proxy | VPN fraud |
2023-05-15 19:23:33 |
| 184.105.139.120 | proxy | VPN fraud |
2023-05-10 13:17:43 |
| 184.105.139.103 | proxy | VPN fraud |
2023-03-20 14:02:25 |
| 184.105.139.99 | proxy | VPN fraud |
2023-03-20 13:57:09 |
| 184.105.139.74 | proxy | VPN |
2023-01-30 14:03:54 |
| 184.105.139.86 | proxy | VPN |
2023-01-19 13:51:12 |
| 184.105.139.124 | attackproxy | VPN |
2022-12-29 20:40:24 |
| 184.105.139.124 | attack | VPN |
2022-12-29 20:40:21 |
| 184.105.139.126 | proxy | Attack VPN |
2022-12-09 13:59:02 |
| 184.105.139.70 | attackbotsspam |
|
2020-10-14 04:24:47 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 184.105.139.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11734
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;184.105.139.80. IN A
;; AUTHORITY SECTION:
. 3575 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019033001 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Mar 31 11:10:24 +08 2019
;; MSG SIZE rcvd: 118
80.139.105.184.in-addr.arpa is an alias for 80.64-26.139.105.184.in-addr.arpa.
80.64-26.139.105.184.in-addr.arpa domain name pointer scan-02c.shadowserver.org.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
80.139.105.184.in-addr.arpa canonical name = 80.64-26.139.105.184.in-addr.arpa.
80.64-26.139.105.184.in-addr.arpa name = scan-02c.shadowserver.org.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 46.229.205.20 | attack | Unauthorized connection attempt detected from IP address 46.229.205.20 to port 23 [J] |
2020-02-06 05:18:18 |
| 124.156.50.149 | attack | Unauthorized connection attempt detected from IP address 124.156.50.149 to port 4711 [J] |
2020-02-06 05:11:38 |
| 195.101.140.117 | attack | Unauthorized connection attempt detected from IP address 195.101.140.117 to port 2004 [J] |
2020-02-06 05:25:44 |
| 151.72.95.172 | attackbotsspam | Unauthorized connection attempt detected from IP address 151.72.95.172 to port 80 [J] |
2020-02-06 05:32:22 |
| 82.62.19.40 | attackspambots | Unauthorized connection attempt detected from IP address 82.62.19.40 to port 81 [J] |
2020-02-06 05:16:22 |
| 124.156.50.36 | attackspam | Unauthorized connection attempt detected from IP address 124.156.50.36 to port 591 [J] |
2020-02-06 05:11:53 |
| 41.230.82.12 | attackbots | Unauthorized connection attempt detected from IP address 41.230.82.12 to port 23 [J] |
2020-02-06 05:19:41 |
| 89.120.165.127 | attackspam | Unauthorized connection attempt detected from IP address 89.120.165.127 to port 80 [J] |
2020-02-06 05:15:37 |
| 181.49.150.45 | attack | Unauthorized connection attempt detected from IP address 181.49.150.45 to port 2220 [J] |
2020-02-06 05:29:01 |
| 110.78.23.133 | attackspam | Unauthorized connection attempt detected from IP address 110.78.23.133 to port 2220 [J] |
2020-02-06 05:14:24 |
| 201.220.188.27 | attack | Unauthorized connection attempt detected from IP address 201.220.188.27 to port 23 [J] |
2020-02-06 05:23:48 |
| 179.95.213.22 | attack | Unauthorized connection attempt detected from IP address 179.95.213.22 to port 23 [J] |
2020-02-06 05:08:09 |
| 162.62.26.228 | attackspam | Unauthorized connection attempt detected from IP address 162.62.26.228 to port 43 [J] |
2020-02-06 05:10:56 |
| 188.158.226.89 | attackbots | Unauthorized connection attempt detected from IP address 188.158.226.89 to port 23 [J] |
2020-02-06 05:27:40 |
| 49.51.9.216 | attack | Unauthorized connection attempt detected from IP address 49.51.9.216 to port 3774 [J] |
2020-02-06 04:55:10 |