城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.14.134.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.14.134.56.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 18:28:14 CST 2025
;; MSG SIZE  rcvd: 106Host 56.134.14.124.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 56.134.14.124.in-addr.arpa: NXDOMAIN| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 168.228.148.122 | attackspambots | failed_logins | 2019-08-01 07:13:29 | 
| 68.183.136.244 | attackbotsspam | Jul 31 18:40:23 TORMINT sshd\[32262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.136.244 user=root Jul 31 18:40:25 TORMINT sshd\[32262\]: Failed password for root from 68.183.136.244 port 58286 ssh2 Jul 31 18:44:34 TORMINT sshd\[32415\]: Invalid user compta from 68.183.136.244 Jul 31 18:44:34 TORMINT sshd\[32415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.136.244 ... | 2019-08-01 06:48:23 | 
| 190.104.220.117 | attackspam | Jun 6 11:09:31 server sshd\[220003\]: Invalid user lpd from 190.104.220.117 Jun 6 11:09:31 server sshd\[220003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.220.117 Jun 6 11:09:33 server sshd\[220003\]: Failed password for invalid user lpd from 190.104.220.117 port 57460 ssh2 ... | 2019-08-01 06:52:30 | 
| 54.38.184.10 | attack | Automatic report - Banned IP Access | 2019-08-01 07:21:43 | 
| 137.74.194.226 | attackspambots | Aug 1 00:33:58 MK-Soft-Root1 sshd\[28137\]: Invalid user isar from 137.74.194.226 port 37012 Aug 1 00:33:58 MK-Soft-Root1 sshd\[28137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.194.226 Aug 1 00:33:59 MK-Soft-Root1 sshd\[28137\]: Failed password for invalid user isar from 137.74.194.226 port 37012 ssh2 ... | 2019-08-01 06:48:51 | 
| 200.233.232.46 | attackspam | port scan and connect, tcp 23 (telnet) | 2019-08-01 07:07:52 | 
| 113.58.66.11 | attackspam | port scan and connect, tcp 23 (telnet) | 2019-08-01 07:23:58 | 
| 132.148.130.138 | attackbotsspam | Wordpress bruteforce attack | 2019-08-01 06:50:15 | 
| 117.4.92.108 | attackspambots | Jul 31 20:30:52 master sshd[17361]: Failed password for invalid user admin from 117.4.92.108 port 47018 ssh2 | 2019-08-01 07:26:12 | 
| 139.193.199.237 | attackbots | BURG,WP GET /wp-login.php | 2019-08-01 07:25:07 | 
| 185.176.27.186 | attack | proto=tcp . spt=50942 . dpt=3389 . src=185.176.27.186 . dst=xx.xx.4.1 . (listed on CINS badguys Jul 31) (1066) | 2019-08-01 07:22:58 | 
| 111.231.92.63 | attack | 21 attempts against mh_ha-misbehave-ban on lake.magehost.pro | 2019-08-01 07:25:27 | 
| 191.201.33.243 | attack | Jul 31 20:30:59 master sshd[17363]: Failed password for invalid user admin from 191.201.33.243 port 2098 ssh2 | 2019-08-01 07:24:33 | 
| 117.92.47.198 | attackbotsspam | Brute force SMTP login attempts. | 2019-08-01 07:11:52 | 
| 80.211.16.26 | attack | Jul 8 16:37:05 server sshd\[116089\]: Invalid user salim from 80.211.16.26 Jul 8 16:37:05 server sshd\[116089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.16.26 Jul 8 16:37:06 server sshd\[116089\]: Failed password for invalid user salim from 80.211.16.26 port 53126 ssh2 ... | 2019-08-01 06:58:02 |