城市(city): unknown
省份(region): unknown
国家(country): Brazil
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.194.145.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;191.194.145.45. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 06:13:32 CST 2025
;; MSG SIZE rcvd: 107
45.145.194.191.in-addr.arpa domain name pointer 191-194-145-45.user.vivozap.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
45.145.194.191.in-addr.arpa name = 191-194-145-45.user.vivozap.com.br.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 62.165.58.30 | attack | 1433/tcp [2019-11-01]1pkt |
2019-11-02 05:15:58 |
| 181.234.110.8 | attackbots | 445/tcp [2019-11-01]1pkt |
2019-11-02 04:43:01 |
| 221.132.17.81 | attackbotsspam | Nov 1 16:15:44 mail sshd\[4588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.81 user=root ... |
2019-11-02 04:42:33 |
| 178.251.31.88 | attackbotsspam | 22 attempts against mh-ssh on river.magehost.pro |
2019-11-02 04:55:25 |
| 78.47.53.190 | attackspam | Hits on port : 3380 |
2019-11-02 04:41:19 |
| 14.244.166.146 | attackbotsspam | Unauthorized connection attempt from IP address 14.244.166.146 on Port 445(SMB) |
2019-11-02 04:54:02 |
| 212.64.88.97 | attack | Nov 1 10:32:30 php1 sshd\[11640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.88.97 user=root Nov 1 10:32:32 php1 sshd\[11640\]: Failed password for root from 212.64.88.97 port 36392 ssh2 Nov 1 10:37:38 php1 sshd\[12229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.88.97 user=root Nov 1 10:37:40 php1 sshd\[12229\]: Failed password for root from 212.64.88.97 port 50506 ssh2 Nov 1 10:41:43 php1 sshd\[12819\]: Invalid user ro from 212.64.88.97 Nov 1 10:41:43 php1 sshd\[12819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.88.97 |
2019-11-02 04:47:58 |
| 188.244.155.211 | attack | Unauthorized connection attempt from IP address 188.244.155.211 on Port 445(SMB) |
2019-11-02 04:50:48 |
| 101.95.190.166 | attackbotsspam | Unauthorized connection attempt from IP address 101.95.190.166 on Port 445(SMB) |
2019-11-02 04:43:28 |
| 148.76.175.130 | attackbots | RDP Bruteforce |
2019-11-02 04:40:18 |
| 185.176.27.118 | attackbotsspam | 11/01/2019-17:10:41.708624 185.176.27.118 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-02 05:11:41 |
| 104.245.144.45 | attack | (From linker.kathryn@gmail.com) Do you want to promote your advertisement on thousands of advertising sites monthly? One tiny investment every month will get you virtually unlimited traffic to your site forever! Check out our site for details: http://morebusiness.myadsubmissions.xyz |
2019-11-02 05:20:20 |
| 177.125.109.99 | attackspambots | Unauthorized connection attempt from IP address 177.125.109.99 on Port 445(SMB) |
2019-11-02 05:18:31 |
| 202.51.110.214 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/202.51.110.214/ ID - 1H : (48) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : ID NAME ASN : ASN17995 IP : 202.51.110.214 CIDR : 202.51.110.0/24 PREFIX COUNT : 122 UNIQUE IP COUNT : 31488 ATTACKS DETECTED ASN17995 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-11-01 21:15:26 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN - data recovery |
2019-11-02 04:44:51 |
| 181.49.117.166 | attack | Nov 1 21:14:49 sso sshd[4334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.166 Nov 1 21:14:52 sso sshd[4334]: Failed password for invalid user mdom from 181.49.117.166 port 56800 ssh2 ... |
2019-11-02 04:53:01 |