城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.223.127.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57508
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;128.223.127.136. IN A
;; AUTHORITY SECTION:
. 2054 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019070601 1800 900 604800 86400
;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 07 04:20:05 CST 2019
;; MSG SIZE rcvd: 119
136.127.223.128.in-addr.arpa domain name pointer d127-136.uoregon.edu.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
136.127.223.128.in-addr.arpa name = d127-136.uoregon.edu.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 220.189.107.44 | attackspam | Unauthorized connection attempt from IP address 220.189.107.44 on Port 445(SMB) |
2020-04-24 02:05:11 |
| 178.128.248.121 | attackspam | Apr 23 13:40:06 NPSTNNYC01T sshd[6874]: Failed password for root from 178.128.248.121 port 57608 ssh2 Apr 23 13:44:03 NPSTNNYC01T sshd[7737]: Failed password for root from 178.128.248.121 port 43006 ssh2 ... |
2020-04-24 02:12:36 |
| 5.45.69.188 | attackbotsspam | Dear Sir / Madam, Yesterday, my close friend (Simona Simova) was contacted via fake Facebook profile to be informed that she has a profile on a escort website. While researching via the German phone number used in the advert, we have came across more ads. These profiles are created without her permission and she is now very upset. Here is a list of the profiles we have found: - https://escortsitesofia.com/de/eleonora-7/ (5.45.69.188) - https://escortsitesofia.com/de/sia-9/ (5.45.69.188) We have already hired a lawyer in Germany who will escalate the issue to the authorities. |
2020-04-24 02:07:12 |
| 67.215.244.230 | attack | Honeypot attack, port: 445, PTR: 67.215.244.230.static.quadranet.com. |
2020-04-24 01:58:16 |
| 61.7.241.34 | attackspam | Unauthorized connection attempt from IP address 61.7.241.34 on Port 445(SMB) |
2020-04-24 01:50:34 |
| 36.79.206.219 | attackspambots | Unauthorized connection attempt from IP address 36.79.206.219 on Port 445(SMB) |
2020-04-24 02:01:05 |
| 120.53.22.204 | attack | 2020-04-23T19:51:55.582103ns386461 sshd\[23720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.22.204 user=root 2020-04-23T19:51:57.870989ns386461 sshd\[23720\]: Failed password for root from 120.53.22.204 port 55370 ssh2 2020-04-23T20:06:06.570991ns386461 sshd\[4312\]: Invalid user postgres from 120.53.22.204 port 57068 2020-04-23T20:06:06.575498ns386461 sshd\[4312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.22.204 2020-04-23T20:06:08.357858ns386461 sshd\[4312\]: Failed password for invalid user postgres from 120.53.22.204 port 57068 ssh2 ... |
2020-04-24 02:11:00 |
| 94.102.56.215 | attackbots | 94.102.56.215 was recorded 13 times by 8 hosts attempting to connect to the following ports: 1797,1813,1796. Incident counter (4h, 24h, all-time): 13, 99, 12218 |
2020-04-24 02:04:22 |
| 178.44.171.126 | attackbotsspam | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-04-24 01:54:12 |
| 94.214.176.220 | attackbots | Attempted connection to port 37215. |
2020-04-24 01:38:44 |
| 51.75.16.138 | attack | $f2bV_matches |
2020-04-24 01:37:50 |
| 37.79.86.166 | attackspam | Attempted connection to port 1433. |
2020-04-24 01:40:38 |
| 77.160.240.236 | attack | Attempted connection to port 23. |
2020-04-24 01:39:52 |
| 80.211.245.129 | attackspam | Apr 23 19:45:50 DAAP sshd[24898]: Invalid user zj from 80.211.245.129 port 58328 Apr 23 19:45:50 DAAP sshd[24898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.245.129 Apr 23 19:45:50 DAAP sshd[24898]: Invalid user zj from 80.211.245.129 port 58328 Apr 23 19:45:52 DAAP sshd[24898]: Failed password for invalid user zj from 80.211.245.129 port 58328 ssh2 Apr 23 19:51:42 DAAP sshd[24978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.245.129 user=root Apr 23 19:51:44 DAAP sshd[24978]: Failed password for root from 80.211.245.129 port 44152 ssh2 ... |
2020-04-24 02:04:49 |
| 118.172.47.18 | attackspambots | Unauthorized connection attempt from IP address 118.172.47.18 on Port 445(SMB) |
2020-04-24 01:42:31 |