城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.66.85.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.66.85.104.			IN	A
;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030102 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 11:26:45 CST 2022
;; MSG SIZE  rcvd: 106Host 104.85.66.112.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 104.85.66.112.in-addr.arpa: NXDOMAIN| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 139.99.125.58 | attackspam | Blocked by Sophos UTM Network Protection . / / proto=6 . srcport=10001 . dstport=32936 . (1089) | 2020-09-17 19:04:12 | 
| 175.36.140.79 | attack | 2020-09-17T04:04:11.661963morrigan.ad5gb.com sshd[498523]: Disconnected from authenticating user root 175.36.140.79 port 51084 [preauth] | 2020-09-17 19:43:14 | 
| 213.202.101.114 | attackspambots | 2020-09-17T10:52:54.779032abusebot.cloudsearch.cf sshd[29388]: Invalid user lfp from 213.202.101.114 port 39082 2020-09-17T10:52:54.785411abusebot.cloudsearch.cf sshd[29388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.101.114 2020-09-17T10:52:54.779032abusebot.cloudsearch.cf sshd[29388]: Invalid user lfp from 213.202.101.114 port 39082 2020-09-17T10:52:56.620172abusebot.cloudsearch.cf sshd[29388]: Failed password for invalid user lfp from 213.202.101.114 port 39082 ssh2 2020-09-17T10:56:42.878639abusebot.cloudsearch.cf sshd[29536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.101.114 user=root 2020-09-17T10:56:45.681807abusebot.cloudsearch.cf sshd[29536]: Failed password for root from 213.202.101.114 port 51408 ssh2 2020-09-17T11:00:29.564846abusebot.cloudsearch.cf sshd[29588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.202.101.114 u ... | 2020-09-17 19:16:58 | 
| 105.140.81.96 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found | 2020-09-17 19:07:47 | 
| 212.70.149.52 | attack | Sep 17 12:39:08 relay postfix/smtpd\[10970\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 17 12:39:34 relay postfix/smtpd\[10970\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 17 12:39:59 relay postfix/smtpd\[10971\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 17 12:40:25 relay postfix/smtpd\[10966\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 17 12:40:51 relay postfix/smtpd\[10970\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... | 2020-09-17 18:43:44 | 
| 42.113.103.93 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found | 2020-09-17 18:49:58 | 
| 121.149.116.38 | attack | Honeypot attack, port: 81, PTR: PTR record not found | 2020-09-17 18:44:42 | 
| 129.211.165.225 | attackspam | Port Scan/VNC login attempt ... | 2020-09-17 19:17:29 | 
| 5.135.161.7 | attack | sshd: Failed password for .... from 5.135.161.7 port 36760 ssh2 (12 attempts) | 2020-09-17 19:00:33 | 
| 67.214.176.163 | attack | port scan and connect, tcp 1433 (ms-sql-s) | 2020-09-17 19:43:44 | 
| 202.91.244.247 | attackspam | Listed on barracudaCentral / proto=6 . srcport=56676 . dstport=1433 . (1090) | 2020-09-17 18:50:56 | 
| 103.59.113.193 | attack | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) | 2020-09-17 19:00:01 | 
| 104.140.188.10 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - | 2020-09-17 19:15:42 | 
| 13.78.12.218 | attack | MAIL: User Login Brute Force Attempt | 2020-09-17 18:57:29 | 
| 208.97.177.178 | attack | Unwanted checking 80 or 443 port ... | 2020-09-17 19:12:41 |