城市(city): Arlington
省份(region): Texas
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.107.45.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58401
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.107.45.139. IN A
;; AUTHORITY SECTION:
. 478 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023011401 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 15 04:05:51 CST 2023
;; MSG SIZE rcvd: 107
b'Host 139.45.107.129.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 129.107.45.139.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 220.130.81.34 | attackspam | Honeypot attack, port: 81, PTR: 220-130-81-34.HINET-IP.hinet.net. |
2020-05-21 05:41:03 |
| 35.246.220.33 | attackbots | Invalid user ouu from 35.246.220.33 port 51398 |
2020-05-21 06:08:42 |
| 162.243.138.242 | attackspam | Automatic report - Port Scan Attack |
2020-05-21 05:54:51 |
| 178.128.243.225 | attack | Invalid user plc from 178.128.243.225 port 43002 |
2020-05-21 06:12:26 |
| 83.118.194.4 | attackbotsspam | Invalid user cfk from 83.118.194.4 port 55896 |
2020-05-21 05:41:36 |
| 129.226.73.26 | attackspambots | Invalid user akv from 129.226.73.26 port 41800 |
2020-05-21 06:09:51 |
| 125.124.91.247 | attackspambots | May 18 02:54:46 sip sshd[13654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.91.247 May 18 02:54:48 sip sshd[13654]: Failed password for invalid user hcc from 125.124.91.247 port 46164 ssh2 May 18 03:03:28 sip sshd[16791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.91.247 |
2020-05-21 06:00:43 |
| 201.236.182.92 | attack | May 20 23:21:23 pve1 sshd[25357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.182.92 May 20 23:21:24 pve1 sshd[25357]: Failed password for invalid user ipi from 201.236.182.92 port 53536 ssh2 ... |
2020-05-21 05:54:31 |
| 124.128.231.162 | attack | trying to attack |
2020-05-21 05:41:11 |
| 203.109.101.86 | attackspam | Honeypot attack, port: 445, PTR: 86-101-109-203.static.youbroadband.in. |
2020-05-21 06:11:42 |
| 129.56.2.44 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-21 06:02:49 |
| 206.132.109.108 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-21 05:56:40 |
| 162.243.138.182 | attackspam | Automatic report - Port Scan Attack |
2020-05-21 05:52:40 |
| 37.187.225.67 | attackspam | May 20 18:36:16 vps46666688 sshd[6131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.225.67 May 20 18:36:20 vps46666688 sshd[6131]: Failed password for invalid user oon from 37.187.225.67 port 51010 ssh2 ... |
2020-05-21 05:37:49 |
| 106.54.242.120 | attack | SSH Brute Force |
2020-05-21 05:55:16 |