城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.195.107.24
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.195.107.24. IN A
;; AUTHORITY SECTION:
. 595 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 04:15:07 CST 2022
;; MSG SIZE rcvd: 107
24.107.195.109.in-addr.arpa domain name pointer dynamicip-109-195-107-24.pppoe.ekat.ertelecom.ru.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
24.107.195.109.in-addr.arpa name = dynamicip-109-195-107-24.pppoe.ekat.ertelecom.ru.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 134.249.124.67 | attackbotsspam | Spam comment : Жизнь с запущенным раком простаты может быть подавляющей. Важно понимать как болезнь, так и ваше лечение, чтобы вы могли принимать активное участие в принятии решений о вашем лечении. Если уровень простат-специфического антигена (ПСА) постоянно повышается во время лечения, которое снижает уровень тестостерона, это может означать, что ваш рак простаты прогрессирует. Прогрессирование означает, что рак ухудшается или распространяется. Когда это произойдет, ваше лечение может измениться. Вот почему ваш врач может назначить XTANDI - лечение, которое может помочь замедлить прогрессирование. энзалутамид 160 мг цена +в нижнем новгороде |
2020-07-29 05:03:54 |
| 111.250.128.247 | attackbots | Spam comment : unethost無限空間虛擬主機 技術分享部落格 http://blog.unethost.com/ |
2020-07-29 04:56:44 |
| 111.231.139.30 | attackbots | Jul 28 22:17:53 santamaria sshd\[19274\]: Invalid user alias from 111.231.139.30 Jul 28 22:17:53 santamaria sshd\[19274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.139.30 Jul 28 22:17:56 santamaria sshd\[19274\]: Failed password for invalid user alias from 111.231.139.30 port 56103 ssh2 ... |
2020-07-29 04:51:38 |
| 179.111.208.81 | attack | Jul 28 20:51:40 localhost sshd[48259]: Invalid user wukun from 179.111.208.81 port 33952 Jul 28 20:51:40 localhost sshd[48259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.111.208.81 Jul 28 20:51:40 localhost sshd[48259]: Invalid user wukun from 179.111.208.81 port 33952 Jul 28 20:51:42 localhost sshd[48259]: Failed password for invalid user wukun from 179.111.208.81 port 33952 ssh2 Jul 28 20:57:02 localhost sshd[48903]: Invalid user manavi from 179.111.208.81 port 61954 ... |
2020-07-29 05:13:09 |
| 46.101.236.105 | attackspambots | Jul 28 22:18:01 theomazars sshd[27306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.236.105 user=root Jul 28 22:18:03 theomazars sshd[27306]: Failed password for root from 46.101.236.105 port 53722 ssh2 |
2020-07-29 04:36:50 |
| 136.169.168.52 | attackbots | Spam comment : قصص سكس سكس مصري سكس مصري قصص محارم قصص محارم سكس مترجم نسوانجى |
2020-07-29 04:52:57 |
| 124.43.4.67 | attackspambots | SMB Server BruteForce Attack |
2020-07-29 05:13:40 |
| 51.83.79.177 | attackspam | Jul 28 16:50:39 george sshd[29178]: Failed password for invalid user yukun from 51.83.79.177 port 56640 ssh2 Jul 28 16:54:14 george sshd[29190]: Invalid user wangtingzhang from 51.83.79.177 port 42216 Jul 28 16:54:14 george sshd[29190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.79.177 Jul 28 16:54:15 george sshd[29190]: Failed password for invalid user wangtingzhang from 51.83.79.177 port 42216 ssh2 Jul 28 16:57:54 george sshd[30835]: Invalid user wpzhang from 51.83.79.177 port 56036 ... |
2020-07-29 05:11:53 |
| 51.91.108.57 | attackspambots | 2020-07-28T14:17:53.191849linuxbox-skyline sshd[74963]: Invalid user yuanganzhao from 51.91.108.57 port 44060 ... |
2020-07-29 04:55:11 |
| 45.129.33.9 | attackbotsspam | Jul 28 22:18:02 debian-2gb-nbg1-2 kernel: \[18225980.758536\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.129.33.9 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=53532 PROTO=TCP SPT=52451 DPT=3970 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-29 04:38:59 |
| 27.115.127.210 | attackbots | Jul 28 22:31:06 meumeu sshd[366787]: Invalid user chouping from 27.115.127.210 port 40324 Jul 28 22:31:06 meumeu sshd[366787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.127.210 Jul 28 22:31:06 meumeu sshd[366787]: Invalid user chouping from 27.115.127.210 port 40324 Jul 28 22:31:08 meumeu sshd[366787]: Failed password for invalid user chouping from 27.115.127.210 port 40324 ssh2 Jul 28 22:34:27 meumeu sshd[366932]: Invalid user michelle from 27.115.127.210 port 35678 Jul 28 22:34:27 meumeu sshd[366932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.127.210 Jul 28 22:34:27 meumeu sshd[366932]: Invalid user michelle from 27.115.127.210 port 35678 Jul 28 22:34:30 meumeu sshd[366932]: Failed password for invalid user michelle from 27.115.127.210 port 35678 ssh2 Jul 28 22:37:45 meumeu sshd[367091]: Invalid user ashkan from 27.115.127.210 port 59318 ... |
2020-07-29 04:42:57 |
| 61.133.232.252 | attackspambots | Jul 28 22:49:39 marvibiene sshd[21144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.252 Jul 28 22:49:41 marvibiene sshd[21144]: Failed password for invalid user boreas from 61.133.232.252 port 31039 ssh2 |
2020-07-29 05:01:03 |
| 5.188.84.95 | attackspam | Spam comment : Just one click can turn you dollar into $1000. Link - https://plbtc.page.link/zXbp |
2020-07-29 05:07:26 |
| 132.232.14.159 | attack | Jul 28 22:32:22 vps647732 sshd[30648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.14.159 Jul 28 22:32:24 vps647732 sshd[30648]: Failed password for invalid user ofisher from 132.232.14.159 port 55692 ssh2 ... |
2020-07-29 04:43:33 |
| 106.13.119.163 | attackbots | ... |
2020-07-29 04:48:51 |