城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.248.193.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.248.193.180.			IN	A
;; AUTHORITY SECTION:
.			172	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:18:54 CST 2022
;; MSG SIZE  rcvd: 107
        180.193.248.13.in-addr.arpa domain name pointer a65ad14e1963e189f.awsglobalaccelerator.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
180.193.248.13.in-addr.arpa	name = a65ad14e1963e189f.awsglobalaccelerator.com.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 92.50.249.92 | attack | Invalid user fidel from 92.50.249.92 port 45018  | 
                    2019-12-27 07:24:56 | 
| 121.164.107.10 | attackbotsspam | (sshd) Failed SSH login from 121.164.107.10 (-): 5 in the last 3600 secs  | 
                    2019-12-27 07:21:04 | 
| 176.113.70.50 | attack | 176.113.70.50 was recorded 10 times by 5 hosts attempting to connect to the following ports: 1900. Incident counter (4h, 24h, all-time): 10, 62, 1017  | 
                    2019-12-27 07:01:47 | 
| 113.185.41.29 | attack | Unauthorized connection attempt from IP address 113.185.41.29 on Port 445(SMB)  | 
                    2019-12-27 07:22:21 | 
| 71.6.233.142 | attack | Port 22 Scan, PTR: None  | 
                    2019-12-27 07:06:34 | 
| 114.119.37.143 | attack | Unauthorised access (Dec 27) SRC=114.119.37.143 LEN=40 TTL=237 ID=58765 TCP DPT=1433 WINDOW=1024 SYN Unauthorised access (Dec 23) SRC=114.119.37.143 LEN=40 TTL=237 ID=31099 TCP DPT=1433 WINDOW=1024 SYN  | 
                    2019-12-27 06:57:39 | 
| 60.166.76.193 | attack | Automatic report - Port Scan Attack  | 
                    2019-12-27 07:23:34 | 
| 186.248.146.106 | attack | Unauthorized connection attempt from IP address 186.248.146.106 on Port 445(SMB)  | 
                    2019-12-27 07:28:37 | 
| 66.70.189.236 | attackbotsspam | Invalid user augustyn from 66.70.189.236 port 35890  | 
                    2019-12-27 07:16:27 | 
| 129.204.72.57 | attackspam | Dec 26 22:44:13 game-panel sshd[6209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.72.57 Dec 26 22:44:15 game-panel sshd[6209]: Failed password for invalid user ceilidh from 129.204.72.57 port 55024 ssh2 Dec 26 22:46:40 game-panel sshd[6334]: Failed password for root from 129.204.72.57 port 48106 ssh2  | 
                    2019-12-27 06:56:39 | 
| 146.185.25.175 | attackspambots | Port 22 Scan, PTR: None  | 
                    2019-12-27 07:03:30 | 
| 50.73.116.41 | attack | Detected by Maltrail  | 
                    2019-12-27 07:08:31 | 
| 189.112.228.153 | attackspambots | Dec 26 23:36:05 sd-53420 sshd\[29956\]: Invalid user server from 189.112.228.153 Dec 26 23:36:05 sd-53420 sshd\[29956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.228.153 Dec 26 23:36:07 sd-53420 sshd\[29956\]: Failed password for invalid user server from 189.112.228.153 port 57710 ssh2 Dec 26 23:46:01 sd-53420 sshd\[1832\]: User root from 189.112.228.153 not allowed because none of user's groups are listed in AllowGroups Dec 26 23:46:01 sd-53420 sshd\[1832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.228.153 user=root ...  | 
                    2019-12-27 07:17:51 | 
| 64.185.3.117 | attack | Repeated failed SSH attempt  | 
                    2019-12-27 07:00:34 | 
| 218.92.0.164 | attack | SSH bruteforce (Triggered fail2ban)  | 
                    2019-12-27 06:58:47 |