城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.106.32.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.106.32.54. IN A
;; AUTHORITY SECTION:
. 301 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:54:00 CST 2022
;; MSG SIZE rcvd: 106
b'54.32.106.129.in-addr.arpa domain name pointer uthouston.net.
54.32.106.129.in-addr.arpa domain name pointer uth.org.
54.32.106.129.in-addr.arpa domain name pointer uthealth.com.
54.32.106.129.in-addr.arpa domain name pointer uth.edu.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.32.106.129.in-addr.arpa name = uthealth.com.
54.32.106.129.in-addr.arpa name = uth.org.
54.32.106.129.in-addr.arpa name = uth.edu.
54.32.106.129.in-addr.arpa name = uthouston.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.67.50.2 | attack | Connection by 54.67.50.2 on port: 6066 got caught by honeypot at 11/4/2019 5:21:21 AM |
2019-11-04 21:22:23 |
| 106.52.121.64 | attackspam | 2019-11-04T06:54:05.943042abusebot-3.cloudsearch.cf sshd\[22500\]: Invalid user apipon from 106.52.121.64 port 50604 |
2019-11-04 21:20:56 |
| 2.180.35.142 | attack | Nov 4 07:13:10 mxgate1 postfix/postscreen[19168]: CONNECT from [2.180.35.142]:53152 to [176.31.12.44]:25 Nov 4 07:13:10 mxgate1 postfix/dnsblog[19200]: addr 2.180.35.142 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 4 07:13:10 mxgate1 postfix/dnsblog[19199]: addr 2.180.35.142 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 4 07:13:10 mxgate1 postfix/dnsblog[19199]: addr 2.180.35.142 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 4 07:13:10 mxgate1 postfix/dnsblog[19201]: addr 2.180.35.142 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 4 07:13:10 mxgate1 postfix/postscreen[19168]: PREGREET 21 after 0.16 from [2.180.35.142]:53152: EHLO [2.180.35.142] Nov 4 07:13:11 mxgate1 postfix/postscreen[19168]: DNSBL rank 4 for [2.180.35.142]:53152 Nov x@x Nov 4 07:13:11 mxgate1 postfix/postscreen[19168]: HANGUP after 0.6 from [2.180.35.142]:53152 in tests after SMTP handshake Nov 4 07:13:11 mxgate1 postfix/postscreen[19168]: DISCONNECT [2.180.35.142]:........ ------------------------------- |
2019-11-04 21:23:35 |
| 113.78.149.203 | attack | Unauthorised access (Nov 4) SRC=113.78.149.203 LEN=40 TOS=0x10 PREC=0x40 TTL=51 ID=49095 TCP DPT=23 WINDOW=39781 SYN |
2019-11-04 21:18:10 |
| 124.156.173.209 | attackspam | Nov 3 23:44:05 auw2 sshd\[13413\]: Invalid user All from 124.156.173.209 Nov 3 23:44:05 auw2 sshd\[13413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.173.209 Nov 3 23:44:07 auw2 sshd\[13413\]: Failed password for invalid user All from 124.156.173.209 port 45726 ssh2 Nov 3 23:50:11 auw2 sshd\[13909\]: Invalid user Welcome8 from 124.156.173.209 Nov 3 23:50:11 auw2 sshd\[13909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.173.209 |
2019-11-04 21:42:18 |
| 159.89.188.167 | attackspambots | Nov 4 09:38:32 ns381471 sshd[28270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.188.167 Nov 4 09:38:35 ns381471 sshd[28270]: Failed password for invalid user ltelles from 159.89.188.167 port 58936 ssh2 |
2019-11-04 21:38:29 |
| 200.194.29.154 | attackbots | Automatic report - Port Scan |
2019-11-04 21:47:33 |
| 177.139.5.46 | attackbots | firewall-block, port(s): 23/tcp |
2019-11-04 21:40:56 |
| 64.39.99.194 | attackbots | 5x Failed Password |
2019-11-04 21:36:31 |
| 185.209.0.18 | attackspam | 185.209.0.18 was recorded 7 times by 2 hosts attempting to connect to the following ports: 23308,23346,23340,23392,23327,23357,23331. Incident counter (4h, 24h, all-time): 7, 47, 192 |
2019-11-04 21:22:56 |
| 122.199.152.114 | attackspambots | $f2bV_matches |
2019-11-04 21:15:08 |
| 203.205.28.116 | attackbotsspam | Unauthorised access (Nov 4) SRC=203.205.28.116 LEN=52 TTL=109 ID=26327 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-04 21:16:51 |
| 67.55.25.57 | attack | SSH/22 MH Probe, BF, Hack - |
2019-11-04 21:28:02 |
| 27.78.78.6 | attackbots | 27.78.78.6 - Administrator \[03/Nov/2019:22:21:13 -0800\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 2527.78.78.6 - - \[03/Nov/2019:22:21:13 -0800\] "POST /index.php/admin/sales_order/ HTTP/1.1" 404 2064727.78.78.6 - - \[03/Nov/2019:22:21:13 -0800\] "POST /index.php/admin/index/ HTTP/1.1" 404 20623 ... |
2019-11-04 21:26:01 |
| 106.12.24.1 | attackspam | Nov 4 07:11:20 ovpn sshd\[11422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.1 user=root Nov 4 07:11:22 ovpn sshd\[11422\]: Failed password for root from 106.12.24.1 port 56834 ssh2 Nov 4 07:20:41 ovpn sshd\[13466\]: Invalid user oracle from 106.12.24.1 Nov 4 07:20:41 ovpn sshd\[13466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.1 Nov 4 07:20:43 ovpn sshd\[13466\]: Failed password for invalid user oracle from 106.12.24.1 port 57978 ssh2 |
2019-11-04 21:43:32 |