城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.85.114.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;120.85.114.74. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400
;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:52:59 CST 2022
;; MSG SIZE rcvd: 106
Host 74.114.85.120.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.114.85.120.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 195.54.166.45 | attack |
|
2020-06-07 02:29:34 |
| 195.54.166.47 | attackspambots | RU_OOO Network of data-centers Selectel_<177>1591464427 [1:2402000:5565] ET DROP Dshield Block Listed Source group 1 [Classification: Misc Attack] [Priority: 2]: |
2020-06-07 02:29:10 |
| 125.69.93.40 | attackspambots | scans once in preceeding hours on the ports (in chronological order) 37215 resulting in total of 4 scans from 125.64.0.0/13 block. |
2020-06-07 02:48:34 |
| 194.26.29.125 | attackbotsspam | scans 37 times in preceeding hours on the ports (in chronological order) 54266 54520 53453 54049 51877 52646 51636 52972 53668 52904 52775 54979 51806 54966 53215 53655 54465 53611 54070 53841 54026 50261 54056 51344 52850 54838 50228 54361 50206 53859 54812 52222 51515 53644 54367 53969 54285 resulting in total of 612 scans from 194.26.29.0/24 block. |
2020-06-07 02:30:20 |
| 192.241.194.171 | attackspam | 1591452099 - 06/06/2020 16:01:39 Host: 192.241.194.171/192.241.194.171 Port: 20 TCP Blocked |
2020-06-07 02:31:47 |
| 185.39.11.38 | attackspam | 06/06/2020-14:31:51.523941 185.39.11.38 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-07 02:41:02 |
| 27.155.88.103 | attackspam | scans 2 times in preceeding hours on the ports (in chronological order) 39267 24393 |
2020-06-07 02:24:22 |
| 119.90.126.87 | attack | scans 2 times in preceeding hours on the ports (in chronological order) 1727 3141 |
2020-06-07 02:12:23 |
| 167.172.156.227 | attackspambots |
|
2020-06-07 02:45:07 |
| 104.248.87.160 | attack | trying to access non-authorized port |
2020-06-07 02:49:54 |
| 194.26.29.220 | attackspambots | scans 47 times in preceeding hours on the ports (in chronological order) 7728 7379 7578 7360 7984 7856 7204 7198 7618 7227 7849 7660 7442 7654 7688 7902 7619 7669 7102 7968 7521 7632 7189 7949 7575 7931 7955 7532 7002 7910 7863 7630 7677 7442 7780 7514 7178 7011 7673 7435 7578 7627 7028 7707 7485 7771 7131 resulting in total of 612 scans from 194.26.29.0/24 block. |
2020-06-07 02:17:22 |
| 49.232.30.175 | attackbots | Jun 6 15:33:12 jane sshd[4970]: Failed password for root from 49.232.30.175 port 45896 ssh2 ... |
2020-06-07 02:23:19 |
| 213.217.0.205 | attack |
|
2020-06-07 02:25:14 |
| 194.26.29.134 | attack | scans 33 times in preceeding hours on the ports (in chronological order) 4788 4238 4236 4294 4935 4317 4953 4769 4344 4837 4311 4057 4305 4101 4817 4003 4011 4715 4435 4468 4741 4340 4979 4502 4314 4379 4543 4942 4365 4941 4317 4781 4262 resulting in total of 612 scans from 194.26.29.0/24 block. |
2020-06-07 02:20:17 |
| 206.189.143.219 | attackspambots | Jun 6 19:23:33 debian-2gb-nbg1-2 kernel: \[13722961.406600\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=206.189.143.219 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=51264 PROTO=TCP SPT=59338 DPT=20822 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-07 02:25:52 |