城市(city): unknown
省份(region): unknown
国家(country): South Africa
运营商(isp): Vodacom
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.242.55.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;105.242.55.118. IN A
;; AUTHORITY SECTION:
. 459 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024060500 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 05 15:47:18 CST 2024
;; MSG SIZE rcvd: 107
118.55.242.105.in-addr.arpa domain name pointer vc-gp-n-105-242-55-118.umts.vodacom.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
118.55.242.105.in-addr.arpa name = vc-gp-n-105-242-55-118.umts.vodacom.co.za.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 87.251.74.243 | attackbots | Multiport scan : 29 ports scanned 1054 1074 1076 1717 1919 1981 2626 3170 3371 3420 4013 5090 5522 6010 6611 8060 8520 8580 9085 10495 10625 10950 25025 25152 31313 40804 47047 51051 64064 |
2020-05-03 07:18:05 |
| 77.247.109.40 | attackspambots | May 2 23:06:32 debian-2gb-nbg1-2 kernel: \[10712498.495960\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.109.40 DST=195.201.40.59 LEN=442 TOS=0x00 PREC=0x00 TTL=54 ID=8231 DF PROTO=UDP SPT=5088 DPT=5060 LEN=422 |
2020-05-03 07:25:59 |
| 180.92.158.235 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 07:09:13 |
| 91.226.22.148 | attack | Invalid user demo from 91.226.22.148 port 34622 |
2020-05-03 07:39:25 |
| 89.248.168.202 | attackbots | Multiport scan : 21 ports scanned 3400 3402 3404 3406 3407 3408 3409 3410 3411 3412 3414 3416 3417 3419 3422 3423 3424 3425 3426 3427 3429 |
2020-05-03 07:16:38 |
| 37.32.125.145 | attack | ET SCAN Suspicious inbound to mySQL port 3306 - port: 3306 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 07:33:13 |
| 222.186.30.76 | attackbotsspam | May 2 23:36:02 scw-6657dc sshd[12811]: Failed password for root from 222.186.30.76 port 54005 ssh2 May 2 23:36:02 scw-6657dc sshd[12811]: Failed password for root from 222.186.30.76 port 54005 ssh2 May 2 23:36:04 scw-6657dc sshd[12811]: Failed password for root from 222.186.30.76 port 54005 ssh2 ... |
2020-05-03 07:41:44 |
| 185.175.93.14 | attack | 05/02/2020-18:30:47.080582 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-03 07:07:28 |
| 51.15.54.24 | attackspam | May 2 22:43:27 *** sshd[10393]: Invalid user ts3srv from 51.15.54.24 |
2020-05-03 07:45:09 |
| 79.124.62.82 | attack | Multiport scan : 14 ports scanned 33 1337 2006 3502 5901 6668 7289 8005 8484 8891 9529 10005 20002 20089 |
2020-05-03 07:24:23 |
| 87.251.74.240 | attackbots | firewall-block, port(s): 7773/tcp, 9954/tcp, 10022/tcp, 29999/tcp, 40100/tcp, 59595/tcp |
2020-05-03 07:18:45 |
| 61.250.179.81 | attackbotsspam | May 2 22:49:34 scw-6657dc sshd[11473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.250.179.81 May 2 22:49:34 scw-6657dc sshd[11473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.250.179.81 May 2 22:49:36 scw-6657dc sshd[11473]: Failed password for invalid user sinha from 61.250.179.81 port 36714 ssh2 ... |
2020-05-03 07:43:31 |
| 87.251.74.59 | attackspambots | 05/02/2020-18:45:27.507159 87.251.74.59 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-03 07:19:12 |
| 49.84.251.76 | attackspam | SERVER-WEBAPP MVPower DVR Shell arbitrary command execution attempt - port: 80 proto: TCP cat: Attempted Administrator Privilege Gain |
2020-05-03 07:28:45 |
| 45.55.32.34 | attackbotsspam | Invalid user upload from 45.55.32.34 port 55281 |
2020-05-03 07:31:23 |