城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.68.0.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;117.68.0.74. IN A
;; AUTHORITY SECTION:
. 108 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 18:51:51 CST 2022
;; MSG SIZE rcvd: 104
Host 74.0.68.117.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.0.68.117.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 31.14.133.173 | attack | CloudCIX Reconnaissance Scan Detected, PTR: host173-133-14-31.serverdedicati.aruba.it. |
2019-11-06 20:04:03 |
| 37.59.119.181 | attackbotsspam | Lines containing failures of 37.59.119.181 Nov 5 21:14:29 shared04 sshd[16905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.119.181 user=r.r Nov 5 21:14:31 shared04 sshd[16905]: Failed password for r.r from 37.59.119.181 port 49936 ssh2 Nov 5 21:14:31 shared04 sshd[16905]: Received disconnect from 37.59.119.181 port 49936:11: Bye Bye [preauth] Nov 5 21:14:31 shared04 sshd[16905]: Disconnected from authenticating user r.r 37.59.119.181 port 49936 [preauth] Nov 5 21:43:32 shared04 sshd[24392]: Invalid user deployer from 37.59.119.181 port 34324 Nov 5 21:43:32 shared04 sshd[24392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.119.181 Nov 5 21:43:33 shared04 sshd[24392]: Failed password for invalid user deployer from 37.59.119.181 port 34324 ssh2 Nov 5 21:43:33 shared04 sshd[24392]: Received disconnect from 37.59.119.181 port 34324:11: Bye Bye [preauth] Nov 5 21:43:33........ ------------------------------ |
2019-11-06 20:06:53 |
| 185.176.221.238 | attack | CloudCIX Reconnaissance Scan Detected, PTR: 210968.2cloud.eu. |
2019-11-06 19:56:38 |
| 207.154.206.212 | attackbotsspam | Nov 6 08:45:52 v22018076622670303 sshd\[18930\]: Invalid user com\#2010\?01 from 207.154.206.212 port 33906 Nov 6 08:45:52 v22018076622670303 sshd\[18930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212 Nov 6 08:45:54 v22018076622670303 sshd\[18930\]: Failed password for invalid user com\#2010\?01 from 207.154.206.212 port 33906 ssh2 ... |
2019-11-06 20:04:25 |
| 146.66.244.246 | attack | 5x Failed Password |
2019-11-06 20:16:39 |
| 49.232.23.127 | attackspam | Nov 6 07:13:40 v22019058497090703 sshd[26653]: Failed password for root from 49.232.23.127 port 49416 ssh2 Nov 6 07:18:14 v22019058497090703 sshd[26956]: Failed password for root from 49.232.23.127 port 49068 ssh2 ... |
2019-11-06 20:30:52 |
| 182.253.188.11 | attack | $f2bV_matches |
2019-11-06 20:32:37 |
| 104.197.98.229 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: 229.98.197.104.bc.googleusercontent.com. |
2019-11-06 19:59:40 |
| 222.186.175.216 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root Failed password for root from 222.186.175.216 port 29806 ssh2 Failed password for root from 222.186.175.216 port 29806 ssh2 Failed password for root from 222.186.175.216 port 29806 ssh2 Failed password for root from 222.186.175.216 port 29806 ssh2 |
2019-11-06 20:09:08 |
| 5.12.174.169 | attack | SSH,FTP,8080, Web management Port Scan |
2019-11-06 20:31:26 |
| 45.89.175.110 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-06 20:02:41 |
| 81.28.100.136 | attack | 2019-11-06T07:23:23.707360stark.klein-stark.info postfix/smtpd\[9168\]: NOQUEUE: reject: RCPT from shallow.shrewdmhealth.com\[81.28.100.136\]: 554 5.7.1 \ |
2019-11-06 19:56:21 |
| 74.82.47.2 | attack | 11211/tcp 4786/tcp 27017/tcp... [2019-09-07/11-06]31pkt,12pt.(tcp),1pt.(udp) |
2019-11-06 19:52:58 |
| 180.246.74.67 | attackspam | Unauthorised access (Nov 6) SRC=180.246.74.67 LEN=52 TTL=247 ID=18172 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-06 19:51:49 |
| 138.201.232.60 | attackbots | CloudCIX Reconnaissance Scan Detected, PTR: static.60.232.201.138.clients.your-server.de. |
2019-11-06 19:52:10 |