城市(city): Aalborg
省份(region): North Denmark
国家(country): Denmark
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.225.62.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64608
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;130.225.62.139. IN A
;; AUTHORITY SECTION:
. 577 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020030201 1800 900 604800 86400
;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 06:50:31 CST 2020
;; MSG SIZE rcvd: 118
139.62.225.130.in-addr.arpa domain name pointer t9.sit.aau.dk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.62.225.130.in-addr.arpa name = t9.sit.aau.dk.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 110.80.142.84 | attack | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-05T20:57:08Z |
2020-10-06 05:09:19 |
| 49.234.78.216 | attackspam | 20 attempts against mh-ssh on river |
2020-10-06 04:58:05 |
| 178.62.60.233 | attackspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-10-06 05:27:24 |
| 190.160.57.66 | attack | 23/tcp 37215/tcp [2020-09-30/10-04]2pkt |
2020-10-06 05:04:10 |
| 106.38.158.131 | attackbots | Oct 5 17:03:27 NPSTNNYC01T sshd[7183]: Failed password for root from 106.38.158.131 port 2662 ssh2 Oct 5 17:07:12 NPSTNNYC01T sshd[7428]: Failed password for root from 106.38.158.131 port 2663 ssh2 ... |
2020-10-06 05:29:50 |
| 5.101.151.41 | attackspam | Oct 5 04:21:26 web9 sshd\[13345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.151.41 user=root Oct 5 04:21:28 web9 sshd\[13345\]: Failed password for root from 5.101.151.41 port 31244 ssh2 Oct 5 04:24:46 web9 sshd\[13808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.151.41 user=root Oct 5 04:24:48 web9 sshd\[13808\]: Failed password for root from 5.101.151.41 port 29400 ssh2 Oct 5 04:28:15 web9 sshd\[14246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.151.41 user=root |
2020-10-06 05:12:45 |
| 31.16.207.18 | attack | Oct 4 22:36:21 extapp sshd[18324]: Invalid user pi from 31.16.207.18 Oct 4 22:36:21 extapp sshd[18326]: Invalid user pi from 31.16.207.18 Oct 4 22:36:23 extapp sshd[18324]: Failed password for invalid user pi from 31.16.207.18 port 41230 ssh2 Oct 4 22:36:23 extapp sshd[18326]: Failed password for invalid user pi from 31.16.207.18 port 41244 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=31.16.207.18 |
2020-10-06 05:15:23 |
| 100.12.77.82 | attackspam | Listed on zen-spamhaus also dnsbl-sorbs / proto=17 . srcport=24683 . dstport=34806 . (3555) |
2020-10-06 05:20:01 |
| 212.70.149.36 | attackbots | 2020-10-06 00:18:14 auth_plain authenticator failed for (User) [212.70.149.36]: 535 Incorrect authentication data (set_id=cl@lavrinenko.info) 2020-10-06 00:18:31 auth_plain authenticator failed for (User) [212.70.149.36]: 535 Incorrect authentication data (set_id=ns100@lavrinenko.info) ... |
2020-10-06 05:24:33 |
| 161.117.11.230 | attackspambots | Oct 4 22:32:06 localhost sshd\[29908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.11.230 user=root Oct 4 22:32:07 localhost sshd\[29908\]: Failed password for root from 161.117.11.230 port 48078 ssh2 Oct 4 22:36:21 localhost sshd\[30199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.11.230 user=root Oct 4 22:36:23 localhost sshd\[30199\]: Failed password for root from 161.117.11.230 port 42554 ssh2 Oct 4 22:40:35 localhost sshd\[30520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.11.230 user=root ... |
2020-10-06 05:37:42 |
| 192.255.199.227 | attackbotsspam | Registration form abuse |
2020-10-06 05:13:25 |
| 51.178.131.2 | attackspam | Automatic report - Banned IP Access |
2020-10-06 04:57:43 |
| 5.180.79.203 | attackspambots | 11211/tcp 11211/tcp 11211/tcp [2020-10-02/03]3pkt |
2020-10-06 05:03:42 |
| 112.85.42.53 | attack | Oct 5 21:24:26 rush sshd[4736]: Failed password for root from 112.85.42.53 port 35668 ssh2 Oct 5 21:24:40 rush sshd[4736]: Failed password for root from 112.85.42.53 port 35668 ssh2 Oct 5 21:24:40 rush sshd[4736]: error: maximum authentication attempts exceeded for root from 112.85.42.53 port 35668 ssh2 [preauth] ... |
2020-10-06 05:30:53 |
| 123.9.245.38 | attackbotsspam |
|
2020-10-06 05:17:26 |