城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.202.113.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.202.113.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011100 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 22:20:03 CST 2025
;; MSG SIZE rcvd: 107
55.113.202.129.in-addr.arpa domain name pointer n129-202-000-000.static.ge.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
55.113.202.129.in-addr.arpa name = n129-202-000-000.static.ge.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 87.246.7.6 | attackbots | (smtpauth) Failed SMTP AUTH login from 87.246.7.6 (GB/United Kingdom/6.0-255.7.246.87.in-addr.arpa): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SMTPAUTH; Logs: 2020-08-02 21:16:51 login authenticator failed for (Lt1Kmtv9Z) [87.246.7.6]: 535 Incorrect authentication data (set_id=hello@etehadbar.com) 2020-08-02 21:17:11 login authenticator failed for (W526tlTVZ) [87.246.7.6]: 535 Incorrect authentication data (set_id=hello@etehadbar.com) 2020-08-02 21:17:22 login authenticator failed for (LlAsgZ) [87.246.7.6]: 535 Incorrect authentication data (set_id=hello@etehadbar.com) 2020-08-02 21:17:32 login authenticator failed for (21NLYhv0) [87.246.7.6]: 535 Incorrect authentication data (set_id=hello@etehadbar.com) 2020-08-02 21:17:43 login authenticator failed for (AMOfzH5) [87.246.7.6]: 535 Incorrect authentication data (set_id=hello@etehadbar.com) |
2020-08-03 01:10:41 |
| 116.100.151.76 | attack | Firewall Dropped Connection |
2020-08-03 01:29:45 |
| 114.220.238.72 | attack | B: Abusive ssh attack |
2020-08-03 00:57:56 |
| 129.226.190.74 | attackspam | Aug 2 18:54:23 melroy-server sshd[2213]: Failed password for root from 129.226.190.74 port 54906 ssh2 ... |
2020-08-03 01:03:16 |
| 120.131.11.49 | attackspam | (sshd) Failed SSH login from 120.131.11.49 (CN/China/-): 5 in the last 3600 secs |
2020-08-03 01:22:47 |
| 81.145.186.148 | attackbotsspam | [H1.VM6] Blocked by UFW |
2020-08-03 01:21:43 |
| 123.143.203.67 | attackbotsspam | Aug 2 03:25:34 php1 sshd\[26896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.143.203.67 user=root Aug 2 03:25:36 php1 sshd\[26896\]: Failed password for root from 123.143.203.67 port 42526 ssh2 Aug 2 03:30:01 php1 sshd\[27187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.143.203.67 user=root Aug 2 03:30:03 php1 sshd\[27187\]: Failed password for root from 123.143.203.67 port 54128 ssh2 Aug 2 03:34:20 php1 sshd\[27440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.143.203.67 user=root |
2020-08-03 01:10:18 |
| 192.35.169.32 | attack | Port scanning [3 denied] |
2020-08-03 01:09:43 |
| 112.13.200.154 | attackspam | $f2bV_matches |
2020-08-03 01:20:46 |
| 211.199.156.149 | attackspambots | DATE:2020-08-02 14:07:10, IP:211.199.156.149, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-08-03 01:30:30 |
| 170.84.221.198 | attackspam | DATE:2020-08-02 14:08:07, IP:170.84.221.198, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-08-03 00:55:56 |
| 37.49.224.49 | attackspambots |
|
2020-08-03 01:30:43 |
| 85.185.42.99 | attackbots | Unauthorised access (Aug 2) SRC=85.185.42.99 LEN=52 TOS=0x10 PREC=0x40 TTL=114 ID=4189 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Jul 29) SRC=85.185.42.99 LEN=52 TOS=0x10 PREC=0x40 TTL=114 ID=5956 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-03 00:55:32 |
| 64.227.38.225 | attackbots | 64.227.38.225 (GB/United Kingdom/-), 12 distributed sshd attacks on account [root] in the last 3600 secs |
2020-08-03 00:58:25 |
| 116.85.44.148 | attack | Aug 2 14:28:04 eventyay sshd[7515]: Failed password for root from 116.85.44.148 port 48716 ssh2 Aug 2 14:32:57 eventyay sshd[7656]: Failed password for root from 116.85.44.148 port 48246 ssh2 ... |
2020-08-03 01:35:08 |