城市(city): unknown
省份(region): unknown
国家(country): Egypt
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.45.162.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;102.45.162.127. IN A
;; AUTHORITY SECTION:
. 425 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 22:43:06 CST 2022
;; MSG SIZE rcvd: 107
127.162.45.102.in-addr.arpa domain name pointer host-102.45.162.127.tedata.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
127.162.45.102.in-addr.arpa name = host-102.45.162.127.tedata.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 220.167.89.23 | attackspam | SMB Server BruteForce Attack |
2019-08-03 07:04:00 |
| 189.45.37.254 | attackspam | Honeypot attack, port: 445, PTR: gw.stech.net.br. |
2019-08-03 06:50:38 |
| 185.175.93.3 | attackbots | 08/02/2019-19:07:29.325680 185.175.93.3 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-08-03 07:16:29 |
| 5.188.86.139 | attack | Port scan on 6 port(s): 7921 7922 7929 8000 8005 8006 |
2019-08-03 06:46:33 |
| 24.228.39.99 | attack | 23/tcp [2019-08-02]1pkt |
2019-08-03 07:15:58 |
| 23.129.64.167 | attack | Aug 2 23:25:31 microserver sshd[7240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.167 user=root Aug 2 23:25:33 microserver sshd[7240]: Failed password for root from 23.129.64.167 port 54986 ssh2 Aug 2 23:25:36 microserver sshd[7240]: Failed password for root from 23.129.64.167 port 54986 ssh2 Aug 2 23:25:39 microserver sshd[7240]: Failed password for root from 23.129.64.167 port 54986 ssh2 Aug 2 23:25:42 microserver sshd[7240]: Failed password for root from 23.129.64.167 port 54986 ssh2 |
2019-08-03 07:12:20 |
| 27.254.136.29 | attackspam | Aug 3 03:58:42 vibhu-HP-Z238-Microtower-Workstation sshd\[9082\]: Invalid user aj from 27.254.136.29 Aug 3 03:58:42 vibhu-HP-Z238-Microtower-Workstation sshd\[9082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.136.29 Aug 3 03:58:44 vibhu-HP-Z238-Microtower-Workstation sshd\[9082\]: Failed password for invalid user aj from 27.254.136.29 port 37470 ssh2 Aug 3 04:03:53 vibhu-HP-Z238-Microtower-Workstation sshd\[9266\]: Invalid user cos from 27.254.136.29 Aug 3 04:03:53 vibhu-HP-Z238-Microtower-Workstation sshd\[9266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.136.29 ... |
2019-08-03 06:43:06 |
| 66.96.239.111 | attackspambots | 37215/tcp 37215/tcp [2019-08-02]2pkt |
2019-08-03 07:03:29 |
| 106.13.26.31 | attack | Aug 2 21:13:16 Ubuntu-1404-trusty-64-minimal sshd\[6744\]: Invalid user hacker from 106.13.26.31 Aug 2 21:13:16 Ubuntu-1404-trusty-64-minimal sshd\[6744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.26.31 Aug 2 21:13:18 Ubuntu-1404-trusty-64-minimal sshd\[6744\]: Failed password for invalid user hacker from 106.13.26.31 port 46734 ssh2 Aug 2 21:26:25 Ubuntu-1404-trusty-64-minimal sshd\[12750\]: Invalid user botmaster from 106.13.26.31 Aug 2 21:26:25 Ubuntu-1404-trusty-64-minimal sshd\[12750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.26.31 |
2019-08-03 06:39:19 |
| 188.214.132.73 | attack | NAME : BALTICSERVERS-LT-DEDICATED CIDR : 188.214.132.0/25 SYN Flood DDoS Attack Lithuania - block certain countries :) IP: 188.214.132.73 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-08-03 07:07:53 |
| 64.113.32.29 | attackspambots | Aug 2 23:36:50 s1 sshd\[11296\]: User root from 64.113.32.29 not allowed because not listed in AllowUsers Aug 2 23:36:50 s1 sshd\[11296\]: Failed password for invalid user root from 64.113.32.29 port 39384 ssh2 Aug 2 23:36:54 s1 sshd\[11298\]: Invalid user admin from 64.113.32.29 port 44057 Aug 2 23:36:54 s1 sshd\[11298\]: Failed password for invalid user admin from 64.113.32.29 port 44057 ssh2 Aug 2 23:36:58 s1 sshd\[11306\]: User root from 64.113.32.29 not allowed because not listed in AllowUsers Aug 2 23:36:58 s1 sshd\[11306\]: Failed password for invalid user root from 64.113.32.29 port 45553 ssh2 ... |
2019-08-03 06:56:49 |
| 111.61.100.67 | attackbotsspam | 22/tcp 22/tcp [2019-08-02]2pkt |
2019-08-03 06:41:47 |
| 92.118.161.61 | attackspam | 08/02/2019-17:04:25.249328 92.118.161.61 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 99 |
2019-08-03 06:53:32 |
| 180.114.168.66 | attackbotsspam | 23/tcp [2019-08-02]1pkt |
2019-08-03 06:58:00 |
| 142.93.91.42 | attackspam | Aug 2 22:47:56 ip-172-31-62-245 sshd\[25474\]: Invalid user server from 142.93.91.42\ Aug 2 22:47:57 ip-172-31-62-245 sshd\[25474\]: Failed password for invalid user server from 142.93.91.42 port 57678 ssh2\ Aug 2 22:52:10 ip-172-31-62-245 sshd\[25485\]: Invalid user othello from 142.93.91.42\ Aug 2 22:52:11 ip-172-31-62-245 sshd\[25485\]: Failed password for invalid user othello from 142.93.91.42 port 51992 ssh2\ Aug 2 22:56:28 ip-172-31-62-245 sshd\[25517\]: Invalid user martin from 142.93.91.42\ |
2019-08-03 07:16:58 |