城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.139.90.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.139.90.17. IN A
;; AUTHORITY SECTION:
. 473 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020082600 1800 900 604800 86400
;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 26 17:04:17 CST 2020
;; MSG SIZE rcvd: 116
Host 17.90.139.12.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 17.90.139.12.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 23.129.64.202 | attackspam | GET /wp-config.php.old HTTP/1.1 |
2020-08-07 03:51:57 |
| 5.234.87.221 | attackspambots | 20/8/6@09:20:14: FAIL: Alarm-Network address from=5.234.87.221 ... |
2020-08-07 03:25:29 |
| 162.255.119.131 | attackspam | port scanner kiddies |
2020-08-07 03:45:50 |
| 195.176.3.23 | attackbotsspam | Unwanted checking 80 or 443 port ... |
2020-08-07 03:52:16 |
| 42.194.137.87 | attack | Aug 6 20:18:27 dhoomketu sshd[2195602]: Failed password for root from 42.194.137.87 port 34796 ssh2 Aug 6 20:20:53 dhoomketu sshd[2195639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.137.87 user=root Aug 6 20:20:55 dhoomketu sshd[2195639]: Failed password for root from 42.194.137.87 port 59918 ssh2 Aug 6 20:23:17 dhoomketu sshd[2195663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.137.87 user=root Aug 6 20:23:19 dhoomketu sshd[2195663]: Failed password for root from 42.194.137.87 port 56798 ssh2 ... |
2020-08-07 03:39:07 |
| 187.235.8.101 | attackspam | k+ssh-bruteforce |
2020-08-07 03:56:01 |
| 125.214.57.81 | attackspam | 1596720006 - 08/06/2020 15:20:06 Host: 125.214.57.81/125.214.57.81 Port: 445 TCP Blocked |
2020-08-07 03:31:19 |
| 54.215.164.132 | attackspam | HEAD /epa/scripts/win/nsepa_setup.exe HTTP/1.1 |
2020-08-07 03:48:48 |
| 86.38.174.217 | attackspambots | MAIL: User Login Brute Force Attempt |
2020-08-07 03:24:41 |
| 148.70.93.108 | attackbotsspam | Attempts to probe for or exploit a Drupal 7.69 site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb. |
2020-08-07 03:50:09 |
| 72.129.166.218 | attackspambots | Aug 6 16:16:10 rocket sshd[13959]: Failed password for root from 72.129.166.218 port 17634 ssh2 Aug 6 16:19:08 rocket sshd[14237]: Failed password for root from 72.129.166.218 port 34446 ssh2 ... |
2020-08-07 03:31:59 |
| 191.8.90.159 | attackbotsspam | Aug 4 17:59:39 www sshd[6824]: reveeclipse mapping checking getaddrinfo for 191-8-90-159.user.vivozap.com.br [191.8.90.159] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 4 17:59:39 www sshd[6824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.8.90.159 user=r.r Aug 4 17:59:41 www sshd[6824]: Failed password for r.r from 191.8.90.159 port 52483 ssh2 Aug 4 17:59:42 www sshd[6824]: Received disconnect from 191.8.90.159: 11: Bye Bye [preauth] Aug 4 18:14:08 www sshd[7558]: reveeclipse mapping checking getaddrinfo for 191-8-90-159.user.vivozap.com.br [191.8.90.159] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 4 18:14:08 www sshd[7558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.8.90.159 user=r.r Aug 4 18:14:10 www sshd[7558]: Failed password for r.r from 191.8.90.159 port 46275 ssh2 Aug 4 18:14:11 www sshd[7558]: Received disconnect from 191.8.90.159: 11: Bye Bye [preauth] Aug 4 18:........ ------------------------------- |
2020-08-07 03:46:48 |
| 186.194.88.79 | attackspam | From m-alceu=alkosa.com.br@m.LINCOGIX.com Thu Aug 06 10:20:08 2020 Received: from [186.194.88.79] (port=36116 helo=tg02-079.m.lincogix.com) |
2020-08-07 03:27:43 |
| 31.31.74.131 | attackbotsspam | GET /wp-config.phporiginal HTTP/1.1 |
2020-08-07 03:50:59 |
| 122.152.211.187 | attackspambots | Aug 6 12:15:50 mail sshd\[30108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.211.187 user=root ... |
2020-08-07 03:23:11 |