城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.72.22.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30827
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;120.72.22.149. IN A
;; AUTHORITY SECTION:
. 531 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400
;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 19:35:20 CST 2022
;; MSG SIZE rcvd: 106
Host 149.22.72.120.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 149.22.72.120.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
171.103.165.162 | attack | Unauthorized connection attempt from IP address 171.103.165.162 on Port 445(SMB) |
2020-05-20 20:13:04 |
171.239.41.180 | attackbotsspam | Unauthorized connection attempt from IP address 171.239.41.180 on Port 445(SMB) |
2020-05-20 20:09:04 |
117.6.248.50 | attack | Unauthorized connection attempt from IP address 117.6.248.50 on Port 445(SMB) |
2020-05-20 20:26:43 |
2.35.180.242 | attackbots | Automatic report - Port Scan Attack |
2020-05-20 20:38:39 |
54.38.160.4 | attackbots | Invalid user qir from 54.38.160.4 port 41332 |
2020-05-20 20:14:33 |
181.30.28.198 | attackspambots | May 20 09:38:32 ns392434 sshd[16382]: Invalid user wyh from 181.30.28.198 port 56746 May 20 09:38:32 ns392434 sshd[16382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.198 May 20 09:38:32 ns392434 sshd[16382]: Invalid user wyh from 181.30.28.198 port 56746 May 20 09:38:34 ns392434 sshd[16382]: Failed password for invalid user wyh from 181.30.28.198 port 56746 ssh2 May 20 09:43:16 ns392434 sshd[16616]: Invalid user qcs from 181.30.28.198 port 34778 May 20 09:43:16 ns392434 sshd[16616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.28.198 May 20 09:43:16 ns392434 sshd[16616]: Invalid user qcs from 181.30.28.198 port 34778 May 20 09:43:18 ns392434 sshd[16616]: Failed password for invalid user qcs from 181.30.28.198 port 34778 ssh2 May 20 09:46:23 ns392434 sshd[16709]: Invalid user uiy from 181.30.28.198 port 51214 |
2020-05-20 20:41:45 |
59.57.153.245 | attackbots | Invalid user ti from 59.57.153.245 port 48170 |
2020-05-20 20:46:49 |
51.158.77.33 | attack | 16 May 2020 07:42:13 SRC=51.158.77.33 DPT=22 18:19:57 SRC=51.158.77.33 DPT=22 21:12:25 SRC=51.158.77.33 DPT=22 |
2020-05-20 20:32:01 |
203.130.23.2 | attack | Unauthorized connection attempt from IP address 203.130.23.2 on Port 445(SMB) |
2020-05-20 20:47:53 |
183.182.112.244 | attack | May 20 09:46:33 andromeda sshd\[9903\]: Invalid user sniffer from 183.182.112.244 port 3311 May 20 09:46:33 andromeda sshd\[9901\]: Invalid user sniffer from 183.182.112.244 port 3280 May 20 09:46:34 andromeda sshd\[9901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.182.112.244 May 20 09:46:34 andromeda sshd\[9903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.182.112.244 |
2020-05-20 20:19:17 |
14.18.103.163 | attackspam | May 20 09:59:55 163-172-32-151 sshd[7504]: Invalid user wangjw from 14.18.103.163 port 54868 ... |
2020-05-20 20:30:53 |
36.73.148.87 | attackspam | Web Server Attack |
2020-05-20 20:22:46 |
51.83.134.142 | attack | Invalid user admin from 51.83.134.142 port 43676 |
2020-05-20 20:16:58 |
49.233.172.85 | attackbots | $f2bV_matches |
2020-05-20 20:45:26 |
167.71.76.122 | attack | Invalid user wns from 167.71.76.122 port 39520 |
2020-05-20 20:33:07 |