城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.189.242.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.189.242.91. IN A
;; AUTHORITY SECTION:
. 567 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022052502 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 26 06:51:56 CST 2022
;; MSG SIZE rcvd: 107
91.242.189.109.in-addr.arpa domain name pointer ti0059q161-1355.bb.online.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
91.242.189.109.in-addr.arpa name = ti0059q161-1355.bb.online.no.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 221.143.48.143 | attack | Sep 1 19:40:45 rotator sshd\[16792\]: Address 221.143.48.143 maps to mailfwd.mailplug.co.kr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 1 19:40:48 rotator sshd\[16792\]: Failed password for root from 221.143.48.143 port 33726 ssh2Sep 1 19:44:19 rotator sshd\[16809\]: Address 221.143.48.143 maps to mailfwd.mailplug.co.kr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 1 19:44:19 rotator sshd\[16809\]: Invalid user made from 221.143.48.143Sep 1 19:44:21 rotator sshd\[16809\]: Failed password for invalid user made from 221.143.48.143 port 41260 ssh2Sep 1 19:47:58 rotator sshd\[17571\]: Address 221.143.48.143 maps to mailfwd.mailplug.co.kr, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 1 19:47:58 rotator sshd\[17571\]: Invalid user hadoop from 221.143.48.143 ... |
2020-09-02 04:41:41 |
| 51.158.153.221 | attackbots | Automatic report - Banned IP Access |
2020-09-02 04:38:40 |
| 218.92.0.208 | attack | Sep 1 22:46:32 eventyay sshd[748]: Failed password for root from 218.92.0.208 port 20055 ssh2 Sep 1 22:46:34 eventyay sshd[748]: Failed password for root from 218.92.0.208 port 20055 ssh2 Sep 1 22:46:36 eventyay sshd[748]: Failed password for root from 218.92.0.208 port 20055 ssh2 ... |
2020-09-02 04:51:11 |
| 119.18.157.154 | attack | Sep 1 13:26:39 shivevps sshd[27485]: Bad protocol version identification '\024' from 119.18.157.154 port 53440 ... |
2020-09-02 04:36:38 |
| 45.230.176.146 | attack | Sep 1 13:26:28 shivevps sshd[27336]: Bad protocol version identification '\024' from 45.230.176.146 port 55399 ... |
2020-09-02 04:45:01 |
| 119.63.138.25 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2020-09-02 05:08:33 |
| 192.42.116.27 | attack | 3 failed attempts at connecting to SSH. |
2020-09-02 04:33:44 |
| 186.229.25.18 | attackspam | Sep 1 13:26:03 shivevps sshd[27073]: Bad protocol version identification '\024' from 186.229.25.18 port 49485 ... |
2020-09-02 05:05:04 |
| 84.17.60.216 | attackspam | (From wehrle.robby@gmail.com) Hello, I have been informed to contact you. The CIA has been doing intensive research for the past fifty years researching on what we call so called life. That information has been collected and presented for you here https://bit.ly/3lqUJ3u This has been the finding as of seventeen years ago as of today. Now governments and other large organizations have develop technology around these concepts for their own deceptive uses. Soon you will be contacted by other means for counter measures and the part that you play in all this. Please get this as soon as possible because there are powers that be to take down this information about this. |
2020-09-02 04:54:53 |
| 200.76.195.188 | attackspam | Automatic report - Port Scan Attack |
2020-09-02 05:00:52 |
| 1.179.148.9 | attack | Sep 1 13:26:10 shivevps sshd[27136]: Bad protocol version identification '\024' from 1.179.148.9 port 37941 ... |
2020-09-02 04:59:21 |
| 175.24.34.90 | attackbots | Sep 1 16:23:36 l03 sshd[10036]: Invalid user terry from 175.24.34.90 port 60568 ... |
2020-09-02 04:38:25 |
| 167.249.168.131 | bots | https://youtu.be/OORReN7pQ5M |
2020-09-02 05:09:05 |
| 103.139.212.213 | attackspam | 443 |
2020-09-02 05:08:44 |
| 85.105.218.37 | attackspambots | Automatic report - Banned IP Access |
2020-09-02 05:02:15 |