城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.191.194.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.191.194.45. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 16:06:35 CST 2025
;; MSG SIZE rcvd: 106
Host 45.194.191.13.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 45.194.191.13.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 213.6.61.219 | attackspambots | Automatic report - Banned IP Access |
2020-10-07 13:01:35 |
| 106.12.242.123 | attackspam | 2020-10-07T04:37:31.266023shield sshd\[18748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.242.123 user=root 2020-10-07T04:37:33.388905shield sshd\[18748\]: Failed password for root from 106.12.242.123 port 38908 ssh2 2020-10-07T04:42:05.547254shield sshd\[19512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.242.123 user=root 2020-10-07T04:42:07.618852shield sshd\[19512\]: Failed password for root from 106.12.242.123 port 36798 ssh2 2020-10-07T04:46:38.389607shield sshd\[20267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.242.123 user=root |
2020-10-07 12:59:21 |
| 96.241.84.252 | attack | Automatic report - Banned IP Access |
2020-10-07 12:57:39 |
| 89.248.167.141 | attackbots |
|
2020-10-07 12:47:31 |
| 106.13.177.53 | attackspambots | Oct 6 23:48:03 sso sshd[4379]: Failed password for root from 106.13.177.53 port 39798 ssh2 ... |
2020-10-07 12:34:11 |
| 192.241.228.251 | attackspambots | Oct 7 02:53:27 lnxmysql61 sshd[13724]: Failed password for root from 192.241.228.251 port 34038 ssh2 Oct 7 02:58:15 lnxmysql61 sshd[14692]: Failed password for root from 192.241.228.251 port 40826 ssh2 |
2020-10-07 12:41:23 |
| 193.228.91.105 | attackspam | SSH login attempts. |
2020-10-07 12:26:08 |
| 47.30.196.246 | attackspambots | Unauthorized connection attempt from IP address 47.30.196.246 on Port 445(SMB) |
2020-10-07 12:38:11 |
| 172.81.227.243 | attackbotsspam | Oct 7 01:34:34 xeon sshd[18197]: Failed password for root from 172.81.227.243 port 45546 ssh2 |
2020-10-07 12:24:04 |
| 221.207.8.251 | attackbots | Failed password for root from 221.207.8.251 port 33448 ssh2 |
2020-10-07 12:30:38 |
| 120.236.55.130 | attackbotsspam | Port scan on 1 port(s): 23 |
2020-10-07 12:39:42 |
| 88.250.202.65 | attackbotsspam | Unauthorized connection attempt from IP address 88.250.202.65 on Port 445(SMB) |
2020-10-07 12:26:46 |
| 145.239.95.42 | attackspambots | 145.239.95.42 is unauthorized and has been banned by fail2ban |
2020-10-07 12:23:29 |
| 46.101.249.232 | attackbots | Oct 7 06:16:31 nextcloud sshd\[29677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.232 user=root Oct 7 06:16:34 nextcloud sshd\[29677\]: Failed password for root from 46.101.249.232 port 39170 ssh2 Oct 7 06:28:32 nextcloud sshd\[9563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.232 user=root |
2020-10-07 12:30:24 |
| 121.229.62.94 | attack | Oct 06 15:29:25 askasleikir sshd[14934]: Failed password for root from 121.229.62.94 port 34694 ssh2 |
2020-10-07 12:50:45 |