城市(city): unknown
省份(region): unknown
国家(country): Sweden
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.240.132.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.240.132.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 18:47:39 CST 2025
;; MSG SIZE rcvd: 106
1.132.240.130.in-addr.arpa domain name pointer gw.ttlabb.ltu.se.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
1.132.240.130.in-addr.arpa name = gw.ttlabb.ltu.se.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 61.177.172.168 | attack | Jul 23 17:06:08 pve1 sshd[28905]: Failed password for root from 61.177.172.168 port 56610 ssh2 Jul 23 17:06:12 pve1 sshd[28905]: Failed password for root from 61.177.172.168 port 56610 ssh2 ... |
2020-07-23 23:20:34 |
| 2.61.146.145 | attack | Unauthorized connection attempt from IP address 2.61.146.145 on Port 445(SMB) |
2020-07-23 23:49:03 |
| 220.189.192.2 | attackspambots | 2020-07-23T11:56:05.507374abusebot-3.cloudsearch.cf sshd[23661]: Invalid user ts2 from 220.189.192.2 port 60642 2020-07-23T11:56:05.512875abusebot-3.cloudsearch.cf sshd[23661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.189.192.2 2020-07-23T11:56:05.507374abusebot-3.cloudsearch.cf sshd[23661]: Invalid user ts2 from 220.189.192.2 port 60642 2020-07-23T11:56:07.402975abusebot-3.cloudsearch.cf sshd[23661]: Failed password for invalid user ts2 from 220.189.192.2 port 60642 ssh2 2020-07-23T12:01:14.698446abusebot-3.cloudsearch.cf sshd[23686]: Invalid user bianka from 220.189.192.2 port 56684 2020-07-23T12:01:14.703961abusebot-3.cloudsearch.cf sshd[23686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.189.192.2 2020-07-23T12:01:14.698446abusebot-3.cloudsearch.cf sshd[23686]: Invalid user bianka from 220.189.192.2 port 56684 2020-07-23T12:01:17.015467abusebot-3.cloudsearch.cf sshd[23686]: Failed pas ... |
2020-07-23 23:33:57 |
| 47.22.82.8 | attack | Jul 24 00:53:37 localhost sshd[1322789]: Invalid user sumit from 47.22.82.8 port 44256 ... |
2020-07-23 23:46:51 |
| 122.170.117.77 | attackspam | Jul 23 16:38:26 electroncash sshd[36155]: Invalid user clark from 122.170.117.77 port 56768 Jul 23 16:38:26 electroncash sshd[36155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.117.77 Jul 23 16:38:26 electroncash sshd[36155]: Invalid user clark from 122.170.117.77 port 56768 Jul 23 16:38:28 electroncash sshd[36155]: Failed password for invalid user clark from 122.170.117.77 port 56768 ssh2 Jul 23 16:41:53 electroncash sshd[37083]: Invalid user eggdrop from 122.170.117.77 port 46512 ... |
2020-07-23 23:08:44 |
| 118.70.169.8 | attackspambots | Unauthorized connection attempt from IP address 118.70.169.8 on Port 445(SMB) |
2020-07-23 23:43:46 |
| 167.99.13.90 | attackspam | 167.99.13.90 - - [23/Jul/2020:13:48:13 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.99.13.90 - - [23/Jul/2020:14:01:02 +0200] "POST /xmlrpc.php HTTP/1.1" 403 16468 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-23 23:47:16 |
| 45.72.25.135 | attackspambots | (From jessika.bean@yahoo.com) This Google doc exposes how this scamdemic is part of a bigger plan to crush your business and keep it closed or semi-operational (with heavy rescritions) while big corporations remain open without consequences. This Covid lie has ruined many peoples lives and businesses and is all done on purpose to bring about the One World Order. It goes much deeper than this but the purpose of this doc is to expose the evil and wickedness that works in the background to ruin peoples lives. So feel free to share this message with friends and family. No need to reply to the email i provided above as its not registered. But this information will tell you everything you need to know. https://docs.google.com/document/d/14MuVe_anmrcDQl4sZhDqzhQy0Pbhrx9A/edit. In case the document is taken down, here is a backup source https://fakecovidscam.com |
2020-07-23 23:12:50 |
| 85.209.0.103 | attackbotsspam | Jul 23 12:10:52 firewall sshd[6527]: Failed password for root from 85.209.0.103 port 55090 ssh2 Jul 23 12:10:51 firewall sshd[6533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.103 user=root Jul 23 12:10:52 firewall sshd[6533]: Failed password for root from 85.209.0.103 port 55136 ssh2 ... |
2020-07-23 23:18:31 |
| 95.71.63.193 | attackspam | Unauthorized connection attempt from IP address 95.71.63.193 on Port 445(SMB) |
2020-07-23 23:37:27 |
| 183.82.116.79 | attackbots | Unauthorized connection attempt from IP address 183.82.116.79 on Port 445(SMB) |
2020-07-23 23:27:44 |
| 187.103.248.36 | attack | Jul 23 08:55:57 ws12vmsma01 sshd[35427]: Invalid user pibid from 187.103.248.36 Jul 23 08:55:59 ws12vmsma01 sshd[35427]: Failed password for invalid user pibid from 187.103.248.36 port 63850 ssh2 Jul 23 08:59:58 ws12vmsma01 sshd[38829]: Invalid user pibid from 187.103.248.36 ... |
2020-07-23 23:25:54 |
| 173.196.146.78 | attack | Jul 23 17:21:12 abendstille sshd\[23465\]: Invalid user kha from 173.196.146.78 Jul 23 17:21:12 abendstille sshd\[23465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.196.146.78 Jul 23 17:21:15 abendstille sshd\[23465\]: Failed password for invalid user kha from 173.196.146.78 port 31383 ssh2 Jul 23 17:25:28 abendstille sshd\[27914\]: Invalid user hyegyeong from 173.196.146.78 Jul 23 17:25:28 abendstille sshd\[27914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.196.146.78 ... |
2020-07-23 23:30:56 |
| 46.217.192.165 | attack | Unauthorized connection attempt from IP address 46.217.192.165 on Port 445(SMB) |
2020-07-23 23:16:35 |
| 122.51.47.205 | attackspam | SSHD brute force attack detected by fail2ban |
2020-07-23 23:43:25 |