城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.2.130.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50296
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.2.130.145. IN A
;; AUTHORITY SECTION:
. 352 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019092201 1800 900 604800 86400
;; Query time: 277 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 23 09:08:31 CST 2019
;; MSG SIZE rcvd: 117
Host 145.130.2.106.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 145.130.2.106.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
172.105.211.153 | attackspambots | " " |
2020-02-27 01:14:00 |
142.44.211.179 | attackbots | probes 5 times on the port 52869 |
2020-02-27 00:53:57 |
211.254.214.150 | attack | $f2bV_matches |
2020-02-27 00:44:39 |
185.153.199.52 | attackspam | Feb 26 16:03:07 debian-2gb-nbg1-2 kernel: \[4988583.614120\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.153.199.52 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=30786 PROTO=TCP SPT=53402 DPT=33390 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-27 01:12:07 |
211.253.129.225 | attack | $f2bV_matches |
2020-02-27 00:52:19 |
172.105.210.107 | attackbotsspam | scans 1 times in preceeding hours on the ports (in chronological order) 8009 resulting in total of 6 scans from 172.104.0.0/15 block. |
2020-02-27 01:14:17 |
185.175.93.34 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2020-02-27 01:10:18 |
185.209.0.19 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 3390 proto: TCP cat: Misc Attack |
2020-02-27 00:49:22 |
210.222.102.172 | attackspambots | probes 14 times on the port 60001 8080 |
2020-02-27 00:46:47 |
192.241.223.185 | attack | Port 7777 scan denied |
2020-02-27 00:49:06 |
176.113.115.203 | attackbotsspam | scans 14 times in preceeding hours on the ports (in chronological order) 38535 38576 38662 38747 38970 38630 38691 38636 38746 38906 38786 38722 38633 38589 resulting in total of 65 scans from 176.113.115.0/24 block. |
2020-02-27 01:12:45 |
222.186.15.166 | attackbots | Feb 26 17:39:50 vps691689 sshd[12090]: Failed password for root from 222.186.15.166 port 36684 ssh2 Feb 26 17:39:51 vps691689 sshd[12090]: Failed password for root from 222.186.15.166 port 36684 ssh2 Feb 26 17:39:53 vps691689 sshd[12090]: Failed password for root from 222.186.15.166 port 36684 ssh2 ... |
2020-02-27 00:45:10 |
185.175.93.104 | attack | TCP Port Scanning |
2020-02-27 01:08:25 |
49.247.203.22 | attackspambots | Feb 26 17:53:25 MK-Soft-VM6 sshd[3359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.203.22 Feb 26 17:53:26 MK-Soft-VM6 sshd[3359]: Failed password for invalid user couchdb from 49.247.203.22 port 59124 ssh2 ... |
2020-02-27 01:02:41 |
220.134.64.93 | attack | Feb 26 14:36:14 debian-2gb-nbg1-2 kernel: \[4983369.822540\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=220.134.64.93 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=26756 PROTO=TCP SPT=22222 DPT=23 WINDOW=27616 RES=0x00 SYN URGP=0 |
2020-02-27 01:03:24 |