城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.152.207.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.152.207.0. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 19:21:26 CST 2025
;; MSG SIZE rcvd: 106
Host 0.207.152.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 0.207.152.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.248.86.155 | attackbotsspam | Nov 30 12:37:48 server6 sshd[22800]: Failed password for invalid user csgoserver from 45.248.86.155 port 34030 ssh2 Nov 30 12:37:48 server6 sshd[22800]: Received disconnect from 45.248.86.155: 11: Bye Bye [preauth] Nov 30 12:46:44 server6 sshd[30787]: Failed password for invalid user oracle from 45.248.86.155 port 53680 ssh2 Nov 30 12:46:44 server6 sshd[30787]: Received disconnect from 45.248.86.155: 11: Bye Bye [preauth] Nov 30 12:55:40 server6 sshd[6390]: Failed password for invalid user rama from 45.248.86.155 port 45070 ssh2 Nov 30 12:55:40 server6 sshd[6390]: Received disconnect from 45.248.86.155: 11: Bye Bye [preauth] Nov 30 13:13:14 server6 sshd[19860]: Failed password for invalid user wpyan from 45.248.86.155 port 56150 ssh2 Nov 30 13:13:15 server6 sshd[19860]: Received disconnect from 45.248.86.155: 11: Bye Bye [preauth] Dec 1 08:44:33 server6 sshd[19759]: Failed password for invalid user skazzi from 45.248.86.155 port 53300 ssh2 Dec 1 08:44:34 server6 sshd[........ ------------------------------- |
2019-10-04 14:35:58 |
| 177.74.127.214 | attack | port scan and connect, tcp 8080 (http-proxy) |
2019-10-04 14:13:23 |
| 201.55.199.143 | attack | Oct 4 07:37:47 hosting sshd[26260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.199.143 user=root Oct 4 07:37:49 hosting sshd[26260]: Failed password for root from 201.55.199.143 port 50356 ssh2 ... |
2019-10-04 14:12:48 |
| 118.89.240.188 | attackspambots | Oct 4 07:46:33 vps647732 sshd[5046]: Failed password for root from 118.89.240.188 port 56830 ssh2 ... |
2019-10-04 14:30:28 |
| 190.14.37.102 | attackbots | " " |
2019-10-04 14:41:21 |
| 31.170.51.251 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-10-04 14:42:26 |
| 177.234.173.10 | attackbots | Web App Attack |
2019-10-04 14:32:12 |
| 222.186.173.154 | attack | Oct 4 06:11:02 *** sshd[23156]: User root from 222.186.173.154 not allowed because not listed in AllowUsers |
2019-10-04 14:37:06 |
| 109.167.231.203 | attack | Automatic report - Port Scan |
2019-10-04 14:48:30 |
| 14.204.104.196 | attackbots | port scan and connect, tcp 23 (telnet) |
2019-10-04 14:34:00 |
| 41.84.156.46 | attack | Oct 2 07:01:00 mail01 postfix/postscreen[16000]: CONNECT from [41.84.156.46]:41028 to [94.130.181.95]:25 Oct 2 07:01:00 mail01 postfix/dnsblog[19769]: addr 41.84.156.46 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Oct 2 07:01:00 mail01 postfix/dnsblog[19770]: addr 41.84.156.46 listed by domain zen.spamhaus.org as 127.0.0.3 Oct 2 07:01:00 mail01 postfix/dnsblog[19770]: addr 41.84.156.46 listed by domain zen.spamhaus.org as 127.0.0.4 Oct 2 07:01:01 mail01 postfix/postscreen[16000]: PREGREET 37 after 0.69 from [41.84.156.46]:41028: EHLO 41.84.156.46.liquidtelecom.net Oct 2 07:01:01 mail01 postfix/postscreen[16000]: DNSBL rank 4 for [41.84.156.46]:41028 Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=41.84.156.46 |
2019-10-04 14:20:26 |
| 103.114.107.203 | attackspam | Oct 4 10:56:46 lcl-usvr-01 sshd[21219]: Invalid user SSH.TOT.NHAT.TAI.SELLSSH247.COM from 103.114.107.203 |
2019-10-04 14:11:32 |
| 40.73.77.70 | attackbots | Oct 4 08:12:12 dedicated sshd[25575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.77.70 user=root Oct 4 08:12:14 dedicated sshd[25575]: Failed password for root from 40.73.77.70 port 44520 ssh2 |
2019-10-04 14:21:05 |
| 201.182.162.159 | attackbotsspam | UTC: 2019-10-03 port: 23/tcp |
2019-10-04 14:43:28 |
| 159.65.144.233 | attackbots | auto-add |
2019-10-04 14:21:40 |