城市(city): unknown
省份(region): unknown
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.127.218.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.127.218.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 00:55:30 CST 2025
;; MSG SIZE rcvd: 108
Host 139.218.127.129.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.218.127.129.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.241.221.180 | attackspam | trying to access non-authorized port |
2020-02-15 01:03:40 |
| 184.75.211.154 | attack | (From baptiste.dick@gmail.com) Are you feeling stuck personally or professionally? As a professional coach, I have the tools to help you find solutions. Send me an email. Kozik@mbkcoaching.com Free 30-minute initial session! Majority of individuals are living their lives on autopilot, running from one thing to the next, without giving much thought about the true meaning and purpose for their life. “Having trained and mentored thousands of professionals throughout her 25 years as a high-level executive, Mary’s passion and purpose, as a Certified Coach, is to walk along side you to help you realize your dreams to live a life of fulfillment and success.” CEO of Major Healthcare System As your Personal Coach, I will: •Take you from where you are to where you want to be •Guide you to figure out where you want to go •Help you discover what is really important to you •Hold you accountable for optimal success and fulfillment •Increase your self-awareness and confidence •Expand the |
2020-02-15 01:13:43 |
| 179.9.25.139 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 00:35:50 |
| 192.144.155.63 | attack | Feb 14 13:58:36 powerpi2 sshd[14745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.155.63 Feb 14 13:58:36 powerpi2 sshd[14745]: Invalid user ted from 192.144.155.63 port 57764 Feb 14 13:58:38 powerpi2 sshd[14745]: Failed password for invalid user ted from 192.144.155.63 port 57764 ssh2 ... |
2020-02-15 01:15:55 |
| 139.162.90.220 | attack | " " |
2020-02-15 01:02:57 |
| 54.37.71.235 | attackbotsspam | Feb 14 15:37:20 plex sshd[12206]: Invalid user okb from 54.37.71.235 port 33663 |
2020-02-15 01:14:39 |
| 179.67.117.46 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 01:09:30 |
| 45.138.72.79 | attack | Feb 14 16:10:58 debian-2gb-nbg1-2 kernel: \[3952283.252910\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.138.72.79 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=44804 PROTO=TCP SPT=51127 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-15 00:52:47 |
| 77.20.185.61 | attackbotsspam | GET /api/v1.1/public/getmarkethistory |
2020-02-15 00:34:43 |
| 188.166.1.95 | attackbots | Feb 14 15:25:59 game-panel sshd[5995]: Failed password for root from 188.166.1.95 port 37693 ssh2 Feb 14 15:28:40 game-panel sshd[6102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.1.95 Feb 14 15:28:42 game-panel sshd[6102]: Failed password for invalid user stan from 188.166.1.95 port 44734 ssh2 |
2020-02-15 00:37:41 |
| 200.8.152.114 | attackbots | Port probing on unauthorized port 8080 |
2020-02-15 00:37:19 |
| 184.94.240.92 | attackbots | 184.94.240.92 - - [14/Feb/2020:03:10:11 -0500] "GET / HTTP/1.1" 403 363 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0" 0 0 "off:-:-" 177 2233 184.94.240.92 - - [14/Feb/2020:03:10:12 -0500] "GET / HTTP/1.1" 403 363 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0" 0 0 "off:-:-" 173 1263 |
2020-02-15 01:16:40 |
| 222.186.15.158 | attackbotsspam | Feb 14 17:35:43 localhost sshd\[6269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158 user=root Feb 14 17:35:45 localhost sshd\[6269\]: Failed password for root from 222.186.15.158 port 18126 ssh2 Feb 14 17:35:47 localhost sshd\[6269\]: Failed password for root from 222.186.15.158 port 18126 ssh2 |
2020-02-15 00:42:22 |
| 185.142.236.35 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 01:13:24 |
| 179.83.153.244 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-15 01:06:58 |