城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.1.147.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;10.1.147.249. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025083000 1800 900 604800 86400
;; Query time: 136 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 30 15:19:45 CST 2025
;; MSG SIZE rcvd: 105
Host 249.147.1.10.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 249.147.1.10.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
51.91.108.15 | attackbots | detected by Fail2Ban |
2020-04-03 12:11:24 |
51.89.166.45 | attack | ssh brute force |
2020-04-03 12:31:45 |
114.67.85.25 | attackbots | Apr 3 05:53:02 sso sshd[13070]: Failed password for root from 114.67.85.25 port 34810 ssh2 ... |
2020-04-03 12:07:54 |
106.12.141.10 | attackspam | bruteforce detected |
2020-04-03 12:07:08 |
84.238.50.127 | attackbotsspam | Attempted Administrator Privilege Gain |
2020-04-03 12:34:56 |
36.155.114.151 | attackbotsspam | Apr 3 00:08:10 NPSTNNYC01T sshd[31555]: Failed password for root from 36.155.114.151 port 44632 ssh2 Apr 3 00:12:00 NPSTNNYC01T sshd[32150]: Failed password for root from 36.155.114.151 port 35835 ssh2 ... |
2020-04-03 12:18:17 |
112.117.206.172 | attack | CN China 172.206.117.112.broad.km.yn.dynamic.163data.com.cn Failures: 20 ftpd |
2020-04-03 12:20:48 |
209.97.134.82 | attackspambots | Apr 3 05:51:56 ns381471 sshd[16109]: Failed password for root from 209.97.134.82 port 45348 ssh2 |
2020-04-03 12:02:34 |
118.71.206.119 | attackspambots | Unauthorised access (Apr 3) SRC=118.71.206.119 LEN=52 TTL=107 ID=28460 DF TCP DPT=1433 WINDOW=8192 SYN |
2020-04-03 12:12:32 |
222.186.173.226 | attackspambots | Apr 3 06:44:49 santamaria sshd\[28895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226 user=root Apr 3 06:44:51 santamaria sshd\[28895\]: Failed password for root from 222.186.173.226 port 21670 ssh2 Apr 3 06:45:04 santamaria sshd\[28895\]: Failed password for root from 222.186.173.226 port 21670 ssh2 ... |
2020-04-03 12:53:16 |
101.91.242.119 | attackbotsspam | Apr 3 06:08:13 markkoudstaal sshd[2710]: Failed password for root from 101.91.242.119 port 58376 ssh2 Apr 3 06:12:35 markkoudstaal sshd[3316]: Failed password for root from 101.91.242.119 port 52084 ssh2 |
2020-04-03 12:17:34 |
89.219.10.74 | attackbots | RDP Brute-Force (Grieskirchen RZ2) |
2020-04-03 12:05:03 |
222.186.175.140 | attackspambots | Apr 3 06:30:51 silence02 sshd[22215]: Failed password for root from 222.186.175.140 port 44978 ssh2 Apr 3 06:30:56 silence02 sshd[22215]: Failed password for root from 222.186.175.140 port 44978 ssh2 Apr 3 06:30:59 silence02 sshd[22215]: Failed password for root from 222.186.175.140 port 44978 ssh2 Apr 3 06:31:02 silence02 sshd[22215]: Failed password for root from 222.186.175.140 port 44978 ssh2 |
2020-04-03 12:33:19 |
222.186.42.137 | attackbotsspam | 04/03/2020-00:34:34.127474 222.186.42.137 Protocol: 6 ET SCAN Potential SSH Scan |
2020-04-03 12:36:21 |
125.124.70.22 | attack | Apr 2 23:48:14 NPSTNNYC01T sshd[30284]: Failed password for root from 125.124.70.22 port 33252 ssh2 Apr 2 23:52:33 NPSTNNYC01T sshd[30605]: Failed password for root from 125.124.70.22 port 33346 ssh2 ... |
2020-04-03 12:11:56 |