城市(city): San Jose
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.83.240.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 711
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.83.240.72. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025070702 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jul 08 09:37:22 CST 2025
;; MSG SIZE rcvd: 105
Host 72.240.83.13.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 72.240.83.13.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 162.243.136.47 | attackbotsspam | 2375/tcp 137/udp [2020-02-29/05-01]2pkt |
2020-05-01 22:42:44 |
| 31.163.180.133 | attackbots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-01 22:55:23 |
| 115.236.8.152 | attack | May 1 16:56:12 minden010 sshd[30658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.8.152 May 1 16:56:14 minden010 sshd[30658]: Failed password for invalid user udo from 115.236.8.152 port 40726 ssh2 May 1 17:00:55 minden010 sshd[366]: Failed password for root from 115.236.8.152 port 54200 ssh2 ... |
2020-05-01 23:05:17 |
| 139.199.168.18 | attackbots | May 1 14:42:40 PorscheCustomer sshd[25106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.168.18 May 1 14:42:42 PorscheCustomer sshd[25106]: Failed password for invalid user devops from 139.199.168.18 port 55110 ssh2 May 1 14:47:29 PorscheCustomer sshd[25332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.168.18 ... |
2020-05-01 22:36:52 |
| 188.166.211.194 | attackbots | May 1 15:21:57 ns392434 sshd[16152]: Invalid user pak from 188.166.211.194 port 47579 May 1 15:21:57 ns392434 sshd[16152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.211.194 May 1 15:21:57 ns392434 sshd[16152]: Invalid user pak from 188.166.211.194 port 47579 May 1 15:21:58 ns392434 sshd[16152]: Failed password for invalid user pak from 188.166.211.194 port 47579 ssh2 May 1 15:28:55 ns392434 sshd[16359]: Invalid user system from 188.166.211.194 port 55392 May 1 15:28:55 ns392434 sshd[16359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.211.194 May 1 15:28:55 ns392434 sshd[16359]: Invalid user system from 188.166.211.194 port 55392 May 1 15:28:57 ns392434 sshd[16359]: Failed password for invalid user system from 188.166.211.194 port 55392 ssh2 May 1 15:35:09 ns392434 sshd[16463]: Invalid user test from 188.166.211.194 port 59894 |
2020-05-01 23:20:52 |
| 211.22.25.198 | attackspam | 23/tcp 37215/tcp... [2020-03-31/05-01]7pkt,2pt.(tcp) |
2020-05-01 22:40:08 |
| 34.65.252.196 | attack | Unauthorized connection attempt detected from IP address 34.65.252.196 to port 443 [T] |
2020-05-01 23:12:05 |
| 222.186.15.115 | attackbotsspam | May 1 20:12:21 gw1 sshd[3317]: Failed password for root from 222.186.15.115 port 22495 ssh2 ... |
2020-05-01 23:13:16 |
| 139.194.79.219 | attackspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-01 22:40:41 |
| 52.157.140.133 | attackspambots | 2020-05-01T11:40:59.812012ionos.janbro.de sshd[99632]: Invalid user cloud from 52.157.140.133 port 54218 2020-05-01T11:41:01.537350ionos.janbro.de sshd[99632]: Failed password for invalid user cloud from 52.157.140.133 port 54218 ssh2 2020-05-01T11:45:05.006088ionos.janbro.de sshd[99643]: Invalid user orange from 52.157.140.133 port 38890 2020-05-01T11:45:05.090103ionos.janbro.de sshd[99643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.157.140.133 2020-05-01T11:45:05.006088ionos.janbro.de sshd[99643]: Invalid user orange from 52.157.140.133 port 38890 2020-05-01T11:45:06.510704ionos.janbro.de sshd[99643]: Failed password for invalid user orange from 52.157.140.133 port 38890 ssh2 2020-05-01T11:49:13.780036ionos.janbro.de sshd[99680]: Invalid user username from 52.157.140.133 port 51818 2020-05-01T11:49:13.866677ionos.janbro.de sshd[99680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.157.140.13 ... |
2020-05-01 22:35:48 |
| 112.85.42.176 | attackspam | May 1 11:59:01 firewall sshd[10043]: Failed password for root from 112.85.42.176 port 27762 ssh2 May 1 11:59:05 firewall sshd[10043]: Failed password for root from 112.85.42.176 port 27762 ssh2 May 1 11:59:09 firewall sshd[10043]: Failed password for root from 112.85.42.176 port 27762 ssh2 ... |
2020-05-01 22:59:31 |
| 182.74.57.61 | attack | 1433/tcp 445/tcp... [2020-03-11/05-01]13pkt,2pt.(tcp) |
2020-05-01 22:53:53 |
| 91.231.113.113 | attackbotsspam | 5x Failed Password |
2020-05-01 22:35:34 |
| 198.108.66.203 | attackspam | 27017/tcp 1521/tcp 8089/tcp... [2020-03-11/05-01]9pkt,8pt.(tcp) |
2020-05-01 23:17:02 |
| 175.148.40.105 | attackbots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-01 23:04:57 |