城市(city): unknown
省份(region): unknown
国家(country): Indonesia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.18.117.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46723
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.18.117.9.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:09:23 CST 2022
;; MSG SIZE  rcvd: 105
        9.117.18.103.in-addr.arpa domain name pointer mx.sicantik.go.id.
9.117.18.103.in-addr.arpa domain name pointer mx.siswa.id.
9.117.18.103.in-addr.arpa domain name pointer webmail.sicantik.go.id.
9.117.18.103.in-addr.arpa domain name pointer webmail.siswa.id.
9.117.18.103.in-addr.arpa domain name pointer webmail.niaskab.go.id.
9.117.18.103.in-addr.arpa domain name pointer nscpl5.layanan.go.id.
9.117.18.103.in-addr.arpa domain name pointer nscpl6.layanan.go.id.
9.117.18.103.in-addr.arpa domain name pointer webmail.layanan.go.id.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
9.117.18.103.in-addr.arpa	name = mx.sicantik.go.id.
9.117.18.103.in-addr.arpa	name = mx.siswa.id.
9.117.18.103.in-addr.arpa	name = webmail.sicantik.go.id.
9.117.18.103.in-addr.arpa	name = webmail.siswa.id.
9.117.18.103.in-addr.arpa	name = webmail.niaskab.go.id.
9.117.18.103.in-addr.arpa	name = nscpl5.layanan.go.id.
9.117.18.103.in-addr.arpa	name = nscpl6.layanan.go.id.
9.117.18.103.in-addr.arpa	name = webmail.layanan.go.id.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 37.45.82.198 | attackspambots | IMAP/SMTP Authentication Failure  | 
                    2020-03-09 05:13:59 | 
| 89.137.11.41 | attackbotsspam | proto=tcp . spt=47887 . dpt=25 . Listed on dnsbl-sorbs plus abuseat-org and barracuda (296)  | 
                    2020-03-09 05:20:01 | 
| 118.250.114.135 | attackspam | Brute force blocker - service: proftpd1 - aantal: 48 - Sat Mar 17 23:05:16 2018  | 
                    2020-03-09 05:32:00 | 
| 103.85.162.62 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-03-09 05:07:35 | 
| 185.53.88.26 | attack | [2020-03-08 16:50:10] NOTICE[1148][C-00010022] chan_sip.c: Call from '' (185.53.88.26:62860) to extension '011442037694876' rejected because extension not found in context 'public'. [2020-03-08 16:50:10] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-08T16:50:10.488-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442037694876",SessionID="0x7fd82c3f03d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.26/62860",ACLName="no_extension_match" [2020-03-08 17:00:10] NOTICE[1148][C-00010029] chan_sip.c: Call from '' (185.53.88.26:56186) to extension '011441613940821' rejected because extension not found in context 'public'. [2020-03-08 17:00:10] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-08T17:00:10.640-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441613940821",SessionID="0x7fd82c43c848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185 ...  | 
                    2020-03-09 05:04:21 | 
| 189.34.62.36 | attackbots | fail2ban  | 
                    2020-03-09 05:24:52 | 
| 198.199.84.154 | attackspambots | Invalid user admin\#@! from 198.199.84.154 port 39749 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154 Failed password for invalid user admin\#@! from 198.199.84.154 port 39749 ssh2 Invalid user !@\#$QWE from 198.199.84.154 port 49067 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.84.154  | 
                    2020-03-09 05:10:00 | 
| 49.145.193.91 | attackspambots | 1583673287 - 03/08/2020 14:14:47 Host: 49.145.193.91/49.145.193.91 Port: 445 TCP Blocked  | 
                    2020-03-09 05:11:31 | 
| 207.154.229.50 | attackspam | Mar 8 22:03:47 lukav-desktop sshd\[25041\]: Invalid user vendeg from 207.154.229.50 Mar 8 22:03:47 lukav-desktop sshd\[25041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50 Mar 8 22:03:48 lukav-desktop sshd\[25041\]: Failed password for invalid user vendeg from 207.154.229.50 port 50940 ssh2 Mar 8 22:10:06 lukav-desktop sshd\[502\]: Invalid user john from 207.154.229.50 Mar 8 22:10:06 lukav-desktop sshd\[502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50  | 
                    2020-03-09 04:57:56 | 
| 94.23.203.37 | attackspam | 2020-03-08T21:44:45.412452scmdmz1 sshd[8641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns305079.ip-94-23-203.eu 2020-03-08T21:44:45.408412scmdmz1 sshd[8641]: Invalid user falcon from 94.23.203.37 port 45976 2020-03-08T21:44:48.129569scmdmz1 sshd[8641]: Failed password for invalid user falcon from 94.23.203.37 port 45976 ssh2 ...  | 
                    2020-03-09 04:59:32 | 
| 115.207.186.41 | attackspambots | Brute force blocker - service: proftpd1 - aantal: 40 - Sat Apr 7 13:00:16 2018  | 
                    2020-03-09 05:16:29 | 
| 222.186.30.209 | attackspam | Mar 8 20:47:30 [HOSTNAME] sshd[20054]: User **removed** from 222.186.30.209 not allowed because not listed in AllowUsers Mar 8 21:03:45 [HOSTNAME] sshd[20136]: User **removed** from 222.186.30.209 not allowed because not listed in AllowUsers Mar 8 22:25:02 [HOSTNAME] sshd[20841]: User **removed** from 222.186.30.209 not allowed because not listed in AllowUsers ...  | 
                    2020-03-09 05:29:42 | 
| 211.83.242.56 | attackspambots | Jan 24 19:04:57 ms-srv sshd[58922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.83.242.56 Jan 24 19:05:00 ms-srv sshd[58922]: Failed password for invalid user uftp from 211.83.242.56 port 59698 ssh2  | 
                    2020-03-09 05:09:32 | 
| 27.76.240.32 | attack | 20/3/8@09:14:56: FAIL: Alarm-Network address from=27.76.240.32 20/3/8@09:14:56: FAIL: Alarm-Network address from=27.76.240.32 ...  | 
                    2020-03-09 04:54:59 | 
| 121.232.170.218 | attackspam | Brute force blocker - service: proftpd1 - aantal: 60 - Sat Apr 7 17:35:16 2018  | 
                    2020-03-09 05:10:30 |