城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.227.194.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30884
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.227.194.132. IN A
;; AUTHORITY SECTION:
. 462 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:12:00 CST 2022
;; MSG SIZE rcvd: 108
132.194.227.104.in-addr.arpa domain name pointer root.nextlevelgames9999.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
132.194.227.104.in-addr.arpa name = root.nextlevelgames9999.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.200.118.42 | attackspam | 1194/udp 1080/tcp 1723/tcp... [2019-05-06/06-26]52pkt,4pt.(tcp),1pt.(udp) |
2019-06-26 18:23:40 |
| 198.46.140.106 | attackspambots | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-06-26 18:27:23 |
| 136.243.17.25 | attack | Scanning and Vuln Attempts |
2019-06-26 18:44:47 |
| 89.68.160.211 | attackbots | Jun 26 12:42:54 srv-4 sshd\[2755\]: Invalid user avis from 89.68.160.211 Jun 26 12:42:54 srv-4 sshd\[2755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.68.160.211 Jun 26 12:42:56 srv-4 sshd\[2755\]: Failed password for invalid user avis from 89.68.160.211 port 37150 ssh2 ... |
2019-06-26 18:33:47 |
| 54.39.25.192 | attackspambots | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-06-26 18:49:47 |
| 216.218.206.107 | attackbots | 3389BruteforceFW21 |
2019-06-26 18:45:40 |
| 191.53.253.149 | attack | Jun 25 22:45:54 mailman postfix/smtpd[30612]: warning: unknown[191.53.253.149]: SASL PLAIN authentication failed: authentication failure |
2019-06-26 18:22:09 |
| 210.56.20.181 | attack | SSH invalid-user multiple login try |
2019-06-26 18:48:17 |
| 113.161.90.97 | attackbotsspam | Unauthorized connection attempt from IP address 113.161.90.97 on Port 445(SMB) |
2019-06-26 18:19:02 |
| 74.208.27.191 | attack | Jun 26 13:21:25 srv-4 sshd\[7657\]: Invalid user apache from 74.208.27.191 Jun 26 13:21:25 srv-4 sshd\[7657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.27.191 Jun 26 13:21:28 srv-4 sshd\[7657\]: Failed password for invalid user apache from 74.208.27.191 port 56360 ssh2 ... |
2019-06-26 18:39:33 |
| 178.46.209.217 | attackbots | 37215/tcp [2019-06-26]1pkt |
2019-06-26 18:56:03 |
| 139.59.58.150 | attackspambots | WordPress login Brute force / Web App Attack on client site. |
2019-06-26 18:27:57 |
| 137.74.44.216 | attackbots | Jun 24 23:21:49 jarvis sshd[2850]: Invalid user reza from 137.74.44.216 port 50112 Jun 24 23:21:50 jarvis sshd[2850]: Failed password for invalid user reza from 137.74.44.216 port 50112 ssh2 Jun 24 23:21:50 jarvis sshd[2850]: Received disconnect from 137.74.44.216 port 50112:11: Bye Bye [preauth] Jun 24 23:21:50 jarvis sshd[2850]: Disconnected from 137.74.44.216 port 50112 [preauth] Jun 24 23:24:40 jarvis sshd[2913]: Invalid user teacher1 from 137.74.44.216 port 57074 Jun 24 23:24:42 jarvis sshd[2913]: Failed password for invalid user teacher1 from 137.74.44.216 port 57074 ssh2 Jun 24 23:24:42 jarvis sshd[2913]: Received disconnect from 137.74.44.216 port 57074:11: Bye Bye [preauth] Jun 24 23:24:42 jarvis sshd[2913]: Disconnected from 137.74.44.216 port 57074 [preauth] Jun 24 23:26:10 jarvis sshd[3029]: Invalid user new from 137.74.44.216 port 46368 Jun 24 23:26:13 jarvis sshd[3029]: Failed password for invalid user new from 137.74.44.216 port 46368 ssh2 Jun 24 23:26:13........ ------------------------------- |
2019-06-26 18:17:12 |
| 223.71.139.97 | attackspam | Jun 26 04:53:47 db sshd\[32286\]: Invalid user GardenUser from 223.71.139.97 Jun 26 04:53:47 db sshd\[32286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.97 Jun 26 04:53:49 db sshd\[32286\]: Failed password for invalid user GardenUser from 223.71.139.97 port 37438 ssh2 Jun 26 05:00:23 db sshd\[32359\]: Invalid user rao from 223.71.139.97 Jun 26 05:00:23 db sshd\[32359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.97 ... |
2019-06-26 18:50:47 |
| 198.245.50.81 | attackbots | Jun 25 23:05:03 cac1d2 sshd\[20728\]: Invalid user bie from 198.245.50.81 port 48152 Jun 25 23:05:03 cac1d2 sshd\[20728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81 Jun 25 23:05:05 cac1d2 sshd\[20728\]: Failed password for invalid user bie from 198.245.50.81 port 48152 ssh2 ... |
2019-06-26 18:31:08 |