城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.48.203.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48308
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.48.203.148.			IN	A
;; AUTHORITY SECTION:
.			59	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:05:49 CST 2022
;; MSG SIZE  rcvd: 106
        148.203.48.13.in-addr.arpa domain name pointer ec2-13-48-203-148.eu-north-1.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
148.203.48.13.in-addr.arpa	name = ec2-13-48-203-148.eu-north-1.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 218.92.0.184 | attackbotsspam | v+ssh-bruteforce  | 
                    2020-01-03 15:12:18 | 
| 211.230.40.166 | attack | Telnetd brute force attack detected by fail2ban  | 
                    2020-01-03 15:19:03 | 
| 148.66.135.152 | attack | Automatic report - XMLRPC Attack  | 
                    2020-01-03 15:25:07 | 
| 45.82.153.86 | attackspambots | Jan 3 08:10:43 relay postfix/smtpd\[6455\]: warning: unknown\[45.82.153.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 3 08:12:43 relay postfix/smtpd\[6457\]: warning: unknown\[45.82.153.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 3 08:13:02 relay postfix/smtpd\[4520\]: warning: unknown\[45.82.153.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 3 08:17:48 relay postfix/smtpd\[17345\]: warning: unknown\[45.82.153.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 3 08:18:04 relay postfix/smtpd\[17348\]: warning: unknown\[45.82.153.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ...  | 
                    2020-01-03 15:20:42 | 
| 117.5.220.111 | attackbotsspam | port scan and connect, tcp 23 (telnet)  | 
                    2020-01-03 14:57:19 | 
| 122.34.170.186 | attackspambots | Jan 3 05:50:08  | 
                    2020-01-03 15:27:34 | 
| 14.171.196.40 | attack | Attempts against SMTP/SSMTP  | 
                    2020-01-03 15:08:40 | 
| 222.246.224.179 | attackbots | CN China - Failures: 20 ftpd  | 
                    2020-01-03 15:28:04 | 
| 82.165.172.80 | attack | fell into ViewStateTrap:Durban01  | 
                    2020-01-03 15:23:31 | 
| 91.106.170.33 | attack | Automatic report - Port Scan Attack  | 
                    2020-01-03 15:25:57 | 
| 129.28.153.64 | attack | Jan 3 07:15:14 silence02 sshd[13329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.153.64 Jan 3 07:15:16 silence02 sshd[13329]: Failed password for invalid user ctq from 129.28.153.64 port 55120 ssh2 Jan 3 07:19:12 silence02 sshd[13449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.153.64  | 
                    2020-01-03 15:08:23 | 
| 123.201.1.217 | attackbotsspam | Jan 3 05:50:54 debian-2gb-nbg1-2 kernel: \[286382.697165\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=123.201.1.217 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=47 ID=19712 PROTO=TCP SPT=6117 DPT=23 WINDOW=7917 RES=0x00 SYN URGP=0  | 
                    2020-01-03 15:30:35 | 
| 222.186.175.217 | attackspam | Jan 3 07:48:53 legacy sshd[31344]: Failed password for root from 222.186.175.217 port 38066 ssh2 Jan 3 07:49:07 legacy sshd[31344]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 38066 ssh2 [preauth] Jan 3 07:49:14 legacy sshd[31350]: Failed password for root from 222.186.175.217 port 14752 ssh2 ...  | 
                    2020-01-03 14:58:25 | 
| 43.255.140.218 | attack | Automatic report - Banned IP Access  | 
                    2020-01-03 14:54:34 | 
| 218.92.0.175 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175 user=root Failed password for root from 218.92.0.175 port 10902 ssh2 Failed password for root from 218.92.0.175 port 10902 ssh2 Failed password for root from 218.92.0.175 port 10902 ssh2 Failed password for root from 218.92.0.175 port 10902 ssh2  | 
                    2020-01-03 15:06:13 |