城市(city): Pune
省份(region): Maharashtra
国家(country): India
运营商(isp): Vodafone India
主机名(hostname): unknown
机构(organization): Vodafone India Ltd.
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.108.230.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24220
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.108.230.77. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019041600 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 16 13:23:23 +08 2019
;; MSG SIZE rcvd: 117
77.230.108.42.in-addr.arpa domain name pointer 42-108-230-77.live.vodafone.in.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
77.230.108.42.in-addr.arpa name = 42-108-230-77.live.vodafone.in.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 36.78.252.138 | attackspambots | 1584134113 - 03/13/2020 22:15:13 Host: 36.78.252.138/36.78.252.138 Port: 445 TCP Blocked |
2020-03-14 07:11:56 |
| 103.225.222.202 | attackbotsspam | Unauthorized connection attempt from IP address 103.225.222.202 on Port 445(SMB) |
2020-03-14 06:52:07 |
| 106.13.48.241 | attackbotsspam | $lgm |
2020-03-14 07:01:40 |
| 106.243.2.244 | attackbots | Mar 13 23:34:37 vps647732 sshd[6307]: Failed password for root from 106.243.2.244 port 54790 ssh2 ... |
2020-03-14 06:45:13 |
| 159.65.54.221 | attackbots | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-03-14 06:42:53 |
| 35.153.28.247 | spam | AGAIN and AGAIN and ALWAYS the same REGISTRARS as namecheap.com, uniregistry.com and name.com TO STOP IMMEDIATELY for keeping LIERS, ROBERS and else since too many years ! The cheapest service, as usual...
And Link as usual by bit.ly to delette IMMEDIATELY too !
MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord !
From: newmask.online@gmail.com
Reply-To: newmask.online@gmail.com
To: ffd-dd-llpm-4+owners@marketnetweb.uno
Message-Id: <39b17b4d-be1b-4671-aa46-866d49418462@marketnetweb.uno>
marketnetweb.uno => namecheap.com => whoisguard.com
marketnetweb.uno => 162.255.119.206
162.255.119.206 => namecheap.com
https://www.mywot.com/scorecard/marketnetweb.uno
https://www.mywot.com/scorecard/namecheap.com
https://www.mywot.com/scorecard/whoisguard.com
https://en.asytech.cn/check-ip/162.255.119.206
AS USUAL since few days for PHISHING and SCAM send to :
http://bit.ly/2IJ16gn which resend to :
https://www.getsafemask.com/checkout?cop_id=kkvvg&aff_id=6468&image={image}&txid=10200a76ef1f9dca79a129309817e4&offer_id=4737&tpl={tpl}&lang={lang}&cur={aff_currency}&preload={preload}&show_timer={timer}&aff_sub=16T&aff_sub2=c0cc55c7-9401-4820-b2d3-bd712f691b9b&aff_sub3=&aff_sub4=&aff_sub5=&aff_click_id=
getsafemask.com => namecheap.com
getsafemask.com => 35.153.28.247
35.153.28.247 => amazon.com
https://www.mywot.com/scorecard/getsafemask.com
https://www.mywot.com/scorecard/namecheap.com
https://www.mywot.com/scorecard/whoisguard.com
https://www.mywot.com/scorecard/amazon.com
https://en.asytech.cn/check-ip/35.153.28.247 |
2020-03-14 07:10:14 |
| 221.156.126.1 | attack | Mar 13 22:29:30 marvibiene sshd[4111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.126.1 user=root Mar 13 22:29:32 marvibiene sshd[4111]: Failed password for root from 221.156.126.1 port 58236 ssh2 Mar 13 22:33:40 marvibiene sshd[4193]: Invalid user HTTP from 221.156.126.1 port 42208 ... |
2020-03-14 07:04:40 |
| 1.85.38.10 | attackbots | Unauthorized connection attempt from IP address 1.85.38.10 on Port 445(SMB) |
2020-03-14 06:46:31 |
| 31.184.252.166 | attackspambots | Mar 13 23:17:40 SilenceServices sshd[2774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.184.252.166 Mar 13 23:17:42 SilenceServices sshd[2774]: Failed password for invalid user ftp1 from 31.184.252.166 port 51996 ssh2 Mar 13 23:24:17 SilenceServices sshd[11494]: Failed password for root from 31.184.252.166 port 44402 ssh2 |
2020-03-14 06:52:49 |
| 106.124.136.227 | attackspam | Mar 13 23:41:27 localhost sshd\[11816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.136.227 user=root Mar 13 23:41:29 localhost sshd\[11816\]: Failed password for root from 106.124.136.227 port 45226 ssh2 Mar 13 23:44:14 localhost sshd\[12370\]: Invalid user odoo from 106.124.136.227 port 34852 Mar 13 23:44:14 localhost sshd\[12370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.136.227 |
2020-03-14 06:51:46 |
| 112.72.15.110 | attackspam | 2020-03-13 22:15:23 H=\(\[112.72.15.110\]\) \[112.72.15.110\]:38717 I=\[193.107.88.166\]:25 F=\ |
2020-03-14 06:44:49 |
| 51.77.136.155 | attackspambots | fail2ban |
2020-03-14 06:39:00 |
| 1.165.23.129 | attackspam | Unauthorized connection attempt from IP address 1.165.23.129 on Port 445(SMB) |
2020-03-14 06:40:05 |
| 50.250.116.235 | attackbotsspam | Brute-force attempt banned |
2020-03-14 07:05:23 |
| 14.207.100.156 | attackspam | 1584134136 - 03/13/2020 22:15:36 Host: 14.207.100.156/14.207.100.156 Port: 445 TCP Blocked |
2020-03-14 06:50:02 |