城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.241.56.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4438
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.241.56.202. IN A
;; AUTHORITY SECTION:
. 122 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:28:01 CST 2022
;; MSG SIZE rcvd: 107
b'202.56.241.129.in-addr.arpa domain name pointer lvs56vip12.it.ntnu.no.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
202.56.241.129.in-addr.arpa name = lvs56vip12.it.ntnu.no.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 191.241.243.213 | attack | Unauthorized connection attempt from IP address 191.241.243.213 on Port 445(SMB) |
2019-08-28 00:52:03 |
| 110.137.146.84 | attack | Unauthorized connection attempt from IP address 110.137.146.84 on Port 445(SMB) |
2019-08-28 01:16:49 |
| 222.72.135.177 | attack | Aug 27 07:10:42 tdfoods sshd\[19590\]: Invalid user rabbitmq from 222.72.135.177 Aug 27 07:10:42 tdfoods sshd\[19590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.72.135.177 Aug 27 07:10:44 tdfoods sshd\[19590\]: Failed password for invalid user rabbitmq from 222.72.135.177 port 57159 ssh2 Aug 27 07:16:25 tdfoods sshd\[19998\]: Invalid user vnc from 222.72.135.177 Aug 27 07:16:25 tdfoods sshd\[19998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.72.135.177 |
2019-08-28 01:25:00 |
| 84.236.185.247 | attack | SPAM Delivery Attempt |
2019-08-28 01:09:32 |
| 197.95.193.173 | attackbots | Aug 27 08:32:02 debian sshd\[4208\]: Invalid user rony from 197.95.193.173 port 52726 Aug 27 08:32:02 debian sshd\[4208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.95.193.173 Aug 27 08:32:04 debian sshd\[4208\]: Failed password for invalid user rony from 197.95.193.173 port 52726 ssh2 ... |
2019-08-28 01:00:15 |
| 80.82.77.33 | attackbots | 08/27/2019-09:53:31.738002 80.82.77.33 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 84 |
2019-08-28 01:04:27 |
| 37.57.103.177 | attackbotsspam | Aug 27 13:17:09 taivassalofi sshd[118042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.57.103.177 Aug 27 13:17:11 taivassalofi sshd[118042]: Failed password for invalid user postgres!@# from 37.57.103.177 port 49356 ssh2 ... |
2019-08-28 00:49:45 |
| 128.199.255.227 | attackspam | Aug 27 13:11:12 lnxweb62 sshd[9109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.255.227 |
2019-08-28 01:08:33 |
| 138.197.78.121 | attackspam | Too many connections or unauthorized access detected from Arctic banned ip |
2019-08-28 00:55:57 |
| 51.68.174.177 | attackbotsspam | Aug 27 13:37:18 OPSO sshd\[21322\]: Invalid user ubuntu from 51.68.174.177 port 58658 Aug 27 13:37:18 OPSO sshd\[21322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.174.177 Aug 27 13:37:20 OPSO sshd\[21322\]: Failed password for invalid user ubuntu from 51.68.174.177 port 58658 ssh2 Aug 27 13:41:23 OPSO sshd\[22057\]: Invalid user xk from 51.68.174.177 port 46962 Aug 27 13:41:23 OPSO sshd\[22057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.174.177 |
2019-08-28 00:45:38 |
| 49.35.49.163 | attackbotsspam | Unauthorized connection attempt from IP address 49.35.49.163 on Port 445(SMB) |
2019-08-28 00:46:07 |
| 144.217.242.111 | attackspambots | Aug 27 10:36:13 vtv3 sshd\[1644\]: Invalid user kafka from 144.217.242.111 port 42178 Aug 27 10:36:13 vtv3 sshd\[1644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.242.111 Aug 27 10:36:15 vtv3 sshd\[1644\]: Failed password for invalid user kafka from 144.217.242.111 port 42178 ssh2 Aug 27 10:44:00 vtv3 sshd\[5355\]: Invalid user windows from 144.217.242.111 port 36534 Aug 27 10:44:00 vtv3 sshd\[5355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.242.111 Aug 27 10:55:33 vtv3 sshd\[11472\]: Invalid user him from 144.217.242.111 port 60074 Aug 27 10:55:33 vtv3 sshd\[11472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.242.111 Aug 27 10:55:35 vtv3 sshd\[11472\]: Failed password for invalid user him from 144.217.242.111 port 60074 ssh2 Aug 27 10:59:39 vtv3 sshd\[13146\]: Invalid user ibm from 144.217.242.111 port 49108 Aug 27 10:59:39 vtv3 sshd\[13146 |
2019-08-28 01:01:26 |
| 117.191.67.213 | attack | Aug 27 15:25:03 web1 sshd\[30280\]: Invalid user universitaetsgelaende from 117.191.67.213 Aug 27 15:25:03 web1 sshd\[30280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.191.67.213 Aug 27 15:25:05 web1 sshd\[30280\]: Failed password for invalid user universitaetsgelaende from 117.191.67.213 port 36549 ssh2 Aug 27 15:29:16 web1 sshd\[30444\]: Invalid user ts3 from 117.191.67.213 Aug 27 15:29:16 web1 sshd\[30444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.191.67.213 |
2019-08-28 00:56:38 |
| 89.248.160.193 | attackbots | Port scan on 6 port(s): 2225 2247 2253 2261 2271 2278 |
2019-08-28 01:34:39 |
| 167.99.4.112 | attackspambots | Aug 27 10:19:18 hb sshd\[14183\]: Invalid user ftpuser from 167.99.4.112 Aug 27 10:19:18 hb sshd\[14183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.4.112 Aug 27 10:19:19 hb sshd\[14183\]: Failed password for invalid user ftpuser from 167.99.4.112 port 54580 ssh2 Aug 27 10:23:23 hb sshd\[14487\]: Invalid user to from 167.99.4.112 Aug 27 10:23:23 hb sshd\[14487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.4.112 |
2019-08-28 00:49:01 |