城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.40.0.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.40.0.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:59:52 CST 2025
;; MSG SIZE rcvd: 104
54.0.40.109.in-addr.arpa domain name pointer ip-109-40-0-54.web.vodafone.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.0.40.109.in-addr.arpa name = ip-109-40-0-54.web.vodafone.de.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 114.119.165.216 | attackbotsspam | web attack |
2020-08-03 07:33:46 |
| 51.75.195.25 | attackbotsspam | Aug 2 21:30:36 rush sshd[9257]: Failed password for root from 51.75.195.25 port 42794 ssh2 Aug 2 21:34:26 rush sshd[9401]: Failed password for root from 51.75.195.25 port 55792 ssh2 ... |
2020-08-03 07:18:11 |
| 45.136.7.103 | attackspambots | IP: 45.136.7.103
Ports affected
Simple Mail Transfer (25)
Abuse Confidence rating 18%
Found in DNSBL('s)
ASN Details
AS209737 Meric Internet Teknolojileri A.S.
Turkey (TR)
CIDR 45.136.4.0/22
Log Date: 2/08/2020 8:24:19 PM UTC |
2020-08-03 07:19:29 |
| 91.139.196.141 | attackbots | Aug 2 22:10:47 jumpserver sshd[361784]: Failed password for root from 91.139.196.141 port 52493 ssh2 Aug 2 22:14:43 jumpserver sshd[361869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.139.196.141 user=root Aug 2 22:14:46 jumpserver sshd[361869]: Failed password for root from 91.139.196.141 port 59164 ssh2 ... |
2020-08-03 07:23:15 |
| 50.115.170.70 | attack | port scan and connect, tcp 22 (ssh) |
2020-08-03 07:32:12 |
| 27.221.97.3 | attackspam | Brute force attempt |
2020-08-03 07:14:47 |
| 109.173.53.43 | attackbots | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-08-03 07:20:00 |
| 36.72.241.85 | attack | 20/8/2@16:23:00: FAIL: Alarm-Network address from=36.72.241.85 20/8/2@16:23:00: FAIL: Alarm-Network address from=36.72.241.85 ... |
2020-08-03 07:04:37 |
| 37.187.132.132 | attackspambots | 37.187.132.132 - - [02/Aug/2020:21:22:28 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.187.132.132 - - [02/Aug/2020:21:22:29 +0100] "POST /wp-login.php HTTP/1.1" 200 1845 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.187.132.132 - - [02/Aug/2020:21:22:29 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-03 07:26:20 |
| 51.83.69.84 | attackspam | Bruteforce detected by fail2ban |
2020-08-03 07:14:16 |
| 177.129.90.0 | attack | RDP Brute-Force (honeypot 11) |
2020-08-03 06:58:32 |
| 111.207.171.222 | attackbotsspam | Lines containing failures of 111.207.171.222 Aug 2 20:51:41 supported sshd[17431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.207.171.222 user=r.r Aug 2 20:51:43 supported sshd[17431]: Failed password for r.r from 111.207.171.222 port 55126 ssh2 Aug 2 20:51:44 supported sshd[17431]: Received disconnect from 111.207.171.222 port 55126:11: Bye Bye [preauth] Aug 2 20:51:44 supported sshd[17431]: Disconnected from authenticating user r.r 111.207.171.222 port 55126 [preauth] Aug 2 20:57:37 supported sshd[18189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.207.171.222 user=r.r Aug 2 20:57:39 supported sshd[18189]: Failed password for r.r from 111.207.171.222 port 39780 ssh2 Aug 2 20:57:40 supported sshd[18189]: Received disconnect from 111.207.171.222 port 39780:11: Bye Bye [preauth] Aug 2 20:57:40 supported sshd[18189]: Disconnected from authenticating user r.r 111.207.1........ ------------------------------ |
2020-08-03 07:28:19 |
| 101.99.90.7 | attackbotsspam | Aug 3 00:55:11 ns381471 sshd[13582]: Failed password for root from 101.99.90.7 port 42920 ssh2 |
2020-08-03 07:20:40 |
| 190.195.132.175 | attack | Fail2Ban - HTTP Auth Bruteforce Attempt |
2020-08-03 07:21:41 |
| 113.137.36.187 | attackbots | Aug 2 21:55:21 rush sshd[10210]: Failed password for root from 113.137.36.187 port 38386 ssh2 Aug 2 21:59:40 rush sshd[10368]: Failed password for root from 113.137.36.187 port 44564 ssh2 ... |
2020-08-03 06:59:32 |