城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.206.90.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43631
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.206.90.4. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 06:44:40 CST 2025
;; MSG SIZE rcvd: 104
4.90.206.13.in-addr.arpa domain name pointer ec2-13-206-90-4.ap-south-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
4.90.206.13.in-addr.arpa name = ec2-13-206-90-4.ap-south-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 113.193.30.14 | attack | Unauthorized connection attempt from IP address 113.193.30.14 on Port 445(SMB) |
2019-07-13 10:57:00 |
| 1.9.21.100 | attackspambots | Unauthorized connection attempt from IP address 1.9.21.100 on Port 445(SMB) |
2019-07-13 10:54:54 |
| 150.95.111.146 | attack | Automatic report - Web App Attack |
2019-07-13 11:16:37 |
| 206.189.134.114 | attackbots | Automatic report - Web App Attack |
2019-07-13 10:31:55 |
| 211.181.237.49 | attackbotsspam | Unauthorized connection attempt from IP address 211.181.237.49 on Port 445(SMB) |
2019-07-13 10:46:45 |
| 123.207.79.126 | attackbots | Jul 13 04:39:12 vps647732 sshd[9630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.79.126 Jul 13 04:39:14 vps647732 sshd[9630]: Failed password for invalid user romain from 123.207.79.126 port 49506 ssh2 ... |
2019-07-13 10:46:23 |
| 119.147.81.31 | attackspambots | Jul 13 03:27:20 server01 sshd\[19729\]: Invalid user csm from 119.147.81.31 Jul 13 03:27:20 server01 sshd\[19729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.147.81.31 Jul 13 03:27:22 server01 sshd\[19729\]: Failed password for invalid user csm from 119.147.81.31 port 5118 ssh2 ... |
2019-07-13 10:57:54 |
| 132.232.112.25 | attack | Jul 13 04:24:46 localhost sshd[14961]: Invalid user ubuntu from 132.232.112.25 port 52574 Jul 13 04:24:46 localhost sshd[14961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.25 Jul 13 04:24:46 localhost sshd[14961]: Invalid user ubuntu from 132.232.112.25 port 52574 Jul 13 04:24:48 localhost sshd[14961]: Failed password for invalid user ubuntu from 132.232.112.25 port 52574 ssh2 ... |
2019-07-13 10:35:42 |
| 115.239.239.98 | attackspambots | Jul 12 01:21:28 *** sshd[27603]: Failed password for invalid user user from 115.239.239.98 port 54166 ssh2 Jul 12 01:27:29 *** sshd[27712]: Failed password for invalid user odoo from 115.239.239.98 port 55703 ssh2 Jul 12 01:32:59 *** sshd[27766]: Failed password for invalid user server from 115.239.239.98 port 55380 ssh2 Jul 12 01:38:30 *** sshd[27815]: Failed password for invalid user ubuntu from 115.239.239.98 port 55063 ssh2 Jul 12 01:44:17 *** sshd[28006]: Failed password for invalid user seb from 115.239.239.98 port 54742 ssh2 Jul 12 01:49:54 *** sshd[28070]: Failed password for invalid user brad from 115.239.239.98 port 54421 ssh2 Jul 12 01:55:27 *** sshd[28124]: Failed password for invalid user alvaro from 115.239.239.98 port 54103 ssh2 Jul 12 02:06:37 *** sshd[28365]: Failed password for invalid user admin from 115.239.239.98 port 53475 ssh2 Jul 12 02:12:35 *** sshd[28478]: Failed password for invalid user developer from 115.239.239.98 port 53161 ssh2 Jul 12 02:18:24 *** sshd[28539]: Failed password f |
2019-07-13 11:04:45 |
| 157.230.174.111 | attackspam | Invalid user gpadmin from 157.230.174.111 port 36814 |
2019-07-13 11:14:09 |
| 163.179.32.49 | attackspambots | WordPress brute force |
2019-07-13 11:03:45 |
| 5.126.9.204 | attackspambots | Unauthorized connection attempt from IP address 5.126.9.204 on Port 445(SMB) |
2019-07-13 10:36:54 |
| 121.67.184.228 | attackbotsspam | $f2bV_matches |
2019-07-13 10:53:00 |
| 114.108.175.184 | attack | Jul 12 07:59:10 *** sshd[1887]: Failed password for invalid user matt from 114.108.175.184 port 45976 ssh2 Jul 12 08:11:43 *** sshd[2153]: Failed password for invalid user testuser from 114.108.175.184 port 48902 ssh2 Jul 12 08:17:29 *** sshd[2210]: Failed password for invalid user ftp from 114.108.175.184 port 51044 ssh2 Jul 12 08:22:57 *** sshd[2314]: Failed password for invalid user test from 114.108.175.184 port 50098 ssh2 Jul 12 08:28:32 *** sshd[2409]: Failed password for invalid user j from 114.108.175.184 port 50194 ssh2 Jul 12 08:34:12 *** sshd[2463]: Failed password for invalid user zeng from 114.108.175.184 port 51526 ssh2 Jul 12 08:45:18 *** sshd[3169]: Failed password for invalid user support from 114.108.175.184 port 51802 ssh2 Jul 12 08:51:01 *** sshd[3229]: Failed password for invalid user bg from 114.108.175.184 port 53118 ssh2 Jul 12 08:56:35 *** sshd[3280]: Failed password for invalid user marvin from 114.108.175.184 port 52392 ssh2 Jul 12 09:02:10 *** sshd[3369]: Failed password for invali |
2019-07-13 11:11:25 |
| 154.85.13.73 | attackspambots | SCAN: Host Sweep |
2019-07-13 11:07:31 |