城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.89.72.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.89.72.6. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 14:07:04 CST 2025
;; MSG SIZE rcvd: 104
Host 6.72.89.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 6.72.89.106.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.209.0.92 | attackspam | 12/07/2019-01:15:09.375023 185.209.0.92 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-12-07 08:35:19 |
| 185.153.199.109 | attackspam | Multiport scan : 18 ports scanned 1107 1906 2222 3000 3300 3311 3386 3388 3394 3500 4005 5002 7001 30001 33897 33923 55555 56000 |
2019-12-07 08:59:50 |
| 180.163.220.125 | attackspambots | Multiport scan : 13 ports scanned 146 254 1049 3128 3826 4445 5033 6112 9040 9110 15002 50389 65000 |
2019-12-07 09:08:36 |
| 185.209.0.91 | attackbotsspam | Multiport scan : 15 ports scanned 2222 2999 6660 8999 9090 9999 10506 10515 10550 10575 10599 52389 55555 60389 60606 |
2019-12-07 08:35:48 |
| 185.143.223.144 | attackspambots | Multiport scan : 29 ports scanned 1055 1075 1370 1999 3115 3145 3364 3480 3590 4365 4389 4492 5175 5340 6435 6510 9944 10820 10895 11155 14541 14941 15851 20102 41014 53035 53835 58000 63336 |
2019-12-07 09:04:22 |
| 185.156.73.31 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-07 08:56:28 |
| 185.156.73.11 | attack | Multiport scan : 10 ports scanned 18118 18120 18859 18860 18861 34105 34107 35734 35735 35736 |
2019-12-07 08:59:15 |
| 106.3.135.27 | attack | SSH brute-force: detected 7 distinct usernames within a 24-hour window. |
2019-12-07 08:41:58 |
| 185.175.93.25 | attackbots | 888/tcp 7700/tcp 9099/tcp... [2019-10-06/12-06]1204pkt,190pt.(tcp) |
2019-12-07 08:53:15 |
| 79.192.229.159 | attack | Chat Spam |
2019-12-07 09:10:00 |
| 101.187.39.74 | attack | Dec 6 14:40:32 web9 sshd\[3962\]: Invalid user bomar from 101.187.39.74 Dec 6 14:40:32 web9 sshd\[3962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.187.39.74 Dec 6 14:40:34 web9 sshd\[3962\]: Failed password for invalid user bomar from 101.187.39.74 port 43544 ssh2 Dec 6 14:47:54 web9 sshd\[5139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.187.39.74 user=mail Dec 6 14:47:56 web9 sshd\[5139\]: Failed password for mail from 101.187.39.74 port 54754 ssh2 |
2019-12-07 08:52:16 |
| 113.53.212.71 | attackspam | " " |
2019-12-07 08:51:50 |
| 185.176.27.54 | attack | 12/07/2019-01:31:02.809785 185.176.27.54 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-12-07 08:44:03 |
| 180.163.220.99 | attackbots | Multiport scan : 12 ports scanned 9 544 648 700 720 1069 1183 2047 2394 4443 5120 7019 |
2019-12-07 09:13:24 |
| 119.29.136.114 | attackspam | Dec 7 00:40:17 game-panel sshd[15443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.136.114 Dec 7 00:40:20 game-panel sshd[15443]: Failed password for invalid user Sirpa from 119.29.136.114 port 45016 ssh2 Dec 7 00:47:03 game-panel sshd[15720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.136.114 |
2019-12-07 08:47:43 |