城市(city): unknown
省份(region): unknown
国家(country): Egypt
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.47.20.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58621
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;102.47.20.44. IN A
;; AUTHORITY SECTION:
. 529 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400
;; Query time: 431 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 22 00:19:13 CST 2023
;; MSG SIZE rcvd: 105
44.20.47.102.in-addr.arpa domain name pointer host-102.47.20.44.tedata.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
44.20.47.102.in-addr.arpa name = host-102.47.20.44.tedata.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 113.188.218.211 | attackbotsspam | Unauthorized connection attempt from IP address 113.188.218.211 on Port 445(SMB) |
2020-01-16 19:25:01 |
| 5.88.155.130 | attack | $f2bV_matches |
2020-01-16 19:43:32 |
| 216.12.28.98 | attack | Unauthorized connection attempt detected from IP address 216.12.28.98 to port 23 [J] |
2020-01-16 19:24:32 |
| 203.150.221.195 | attack | Unauthorized connection attempt detected from IP address 203.150.221.195 to port 2220 [J] |
2020-01-16 19:25:38 |
| 112.85.42.173 | attackspambots | Triggered by Fail2Ban at Vostok web server |
2020-01-16 19:31:31 |
| 148.227.208.7 | attack | Jan 15 18:23:14 plesk sshd[14667]: Invalid user tq from 148.227.208.7 Jan 15 18:23:14 plesk sshd[14667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.227.208.7 Jan 15 18:23:16 plesk sshd[14667]: Failed password for invalid user tq from 148.227.208.7 port 18849 ssh2 Jan 15 18:23:16 plesk sshd[14667]: Received disconnect from 148.227.208.7: 11: Bye Bye [preauth] Jan 15 18:26:34 plesk sshd[14959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.227.208.7 user=r.r Jan 15 18:26:36 plesk sshd[14959]: Failed password for r.r from 148.227.208.7 port 32801 ssh2 Jan 15 18:26:36 plesk sshd[14959]: Received disconnect from 148.227.208.7: 11: Bye Bye [preauth] Jan 15 18:29:47 plesk sshd[15045]: Invalid user cp1 from 148.227.208.7 Jan 15 18:29:47 plesk sshd[15045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.227.208.7 Jan 15 18:29:50 plesk sshd........ ------------------------------- |
2020-01-16 19:46:16 |
| 103.100.209.228 | attackbotsspam | Jan 15 22:37:26 cumulus sshd[25882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.228 user=r.r Jan 15 22:37:28 cumulus sshd[25882]: Failed password for r.r from 103.100.209.228 port 55003 ssh2 Jan 15 22:37:29 cumulus sshd[25882]: Received disconnect from 103.100.209.228 port 55003:11: Bye Bye [preauth] Jan 15 22:37:29 cumulus sshd[25882]: Disconnected from 103.100.209.228 port 55003 [preauth] Jan 15 22:41:48 cumulus sshd[26201]: Invalid user rf from 103.100.209.228 port 44721 Jan 15 22:41:48 cumulus sshd[26201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.228 Jan 15 22:41:49 cumulus sshd[26201]: Failed password for invalid user rf from 103.100.209.228 port 44721 ssh2 Jan 15 22:41:50 cumulus sshd[26201]: Received disconnect from 103.100.209.228 port 44721:11: Bye Bye [preauth] Jan 15 22:41:50 cumulus sshd[26201]: Disconnected from 103.100.209.228 port 44721 [pr........ ------------------------------- |
2020-01-16 19:59:40 |
| 45.252.245.239 | attackbots | Unauthorized connection attempt from IP address 45.252.245.239 on Port 445(SMB) |
2020-01-16 19:23:41 |
| 201.71.229.130 | attackspambots | Unauthorized connection attempt from IP address 201.71.229.130 on Port 445(SMB) |
2020-01-16 19:36:52 |
| 196.188.240.13 | attack | 1579149913 - 01/16/2020 05:45:13 Host: 196.188.240.13/196.188.240.13 Port: 445 TCP Blocked |
2020-01-16 19:51:05 |
| 159.192.104.2 | attack | Unauthorized connection attempt from IP address 159.192.104.2 on Port 445(SMB) |
2020-01-16 19:34:17 |
| 125.160.60.167 | attack | Unauthorized connection attempt from IP address 125.160.60.167 on Port 445(SMB) |
2020-01-16 19:47:32 |
| 52.66.206.135 | attackbots | Unauthorized connection attempt detected from IP address 52.66.206.135 to port 2220 [J] |
2020-01-16 19:47:55 |
| 14.172.89.219 | attackbotsspam | Unauthorized connection attempt from IP address 14.172.89.219 on Port 445(SMB) |
2020-01-16 19:41:38 |
| 34.216.58.98 | attackspambots | REQUESTED PAGE: / |
2020-01-16 20:00:40 |