城市(city): unknown
省份(region): unknown
国家(country): Switzerland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.60.184.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.60.184.132. IN A
;; AUTHORITY SECTION:
. 409 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:33:12 CST 2022
;; MSG SIZE rcvd: 107
132.184.60.130.in-addr.arpa domain name pointer irem.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer ipmz.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer ior.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer alumni.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer es.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer sglp.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer limnol.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer isc.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer kommunikation.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer mnf.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer dqbm.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer dsd.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer fsw.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer dighum.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer zis.uzh.ch.
132.184.60.130.in-addr.arpa domain name pointer socialnetworks.uzh.ch.
132.184.60.130.in-addr.arpa dom
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
132.184.60.130.in-addr.arpa name = pharma.uzh.ch.
132.184.60.130.in-addr.arpa name = bli.uzh.ch.
132.184.60.130.in-addr.arpa name = chess.uzh.ch.
132.184.60.130.in-addr.arpa name = vetbiblio.uzh.ch.
132.184.60.130.in-addr.arpa name = slav.uzh.ch.
132.184.60.130.in-addr.arpa name = qf-winterschool.uzh.ch.
132.184.60.130.in-addr.arpa name = ivr.uzh.ch.
132.184.60.130.in-addr.arpa name = immunology.uzh.ch.
132.184.60.130.in-addr.arpa name = facultyaffaires.uzh.ch.
132.184.60.130.in-addr.arpa name = khist.uzh.ch.
132.184.60.130.in-addr.arpa name = www.uzettha.ch.
132.184.60.130.in-addr.arpa name = audit.uzh.ch.
132.184.60.130.in-addr.arpa name = iem.uzh.ch.
132.184.60.130.in-addr.arpa name = generalsecretariat.uzh.ch.
132.184.60.130.in-addr.arpa name = econ.uzh.ch.
132.184.60.130.in-addr.arpa name = seniorenuni.uzh.ch.
132.184.60.130.in-addr.arpa name = vetcom.uzh.ch.
132.184.60.130.in-addr.arpa name = linguistik.uzh.ch.
132.184.60.130.in-addr.arpa name = spur.uzh.ch.
132.184.60.130.in-addr.arpa name = zwb.uzh.ch.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 190.57.232.234 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-30 14:47:27,898 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.57.232.234) |
2019-07-31 02:55:08 |
| 14.234.164.152 | attackbotsspam | 445/tcp [2019-07-30]1pkt |
2019-07-31 02:40:16 |
| 14.188.1.227 | attackspambots | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2019-07-31 03:13:35 |
| 36.67.88.27 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-07-31 03:06:35 |
| 106.51.73.45 | attackspambots | Honeypot attack, port: 445, PTR: broadband.actcorp.in. |
2019-07-31 02:56:55 |
| 73.252.161.153 | attackbotsspam | Jul 30 21:24:03 localhost sshd[23854]: Invalid user mapr from 73.252.161.153 port 57394 Jul 30 21:24:03 localhost sshd[23854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.252.161.153 Jul 30 21:24:03 localhost sshd[23854]: Invalid user mapr from 73.252.161.153 port 57394 Jul 30 21:24:04 localhost sshd[23854]: Failed password for invalid user mapr from 73.252.161.153 port 57394 ssh2 ... |
2019-07-31 03:17:01 |
| 190.113.90.75 | attackbotsspam | Failed password for invalid user takashi from 190.113.90.75 port 42492 ssh2 Invalid user chris from 190.113.90.75 port 39100 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.113.90.75 Failed password for invalid user chris from 190.113.90.75 port 39100 ssh2 Invalid user test from 190.113.90.75 port 35958 |
2019-07-31 03:01:52 |
| 176.31.218.147 | attack | Automatic report - Banned IP Access |
2019-07-31 03:12:40 |
| 36.236.35.7 | attackbots | : |
2019-07-31 02:53:57 |
| 70.75.156.28 | attackspam | 5555/tcp [2019-07-30]1pkt |
2019-07-31 03:22:24 |
| 142.93.1.71 | attack | Attempt to log in with non-existing username "administrator" /wp-login.php |
2019-07-31 03:28:33 |
| 139.59.180.53 | attackspam | 2019-07-30T17:51:36.067839stark.klein-stark.info sshd\[22737\]: Invalid user ubuntu from 139.59.180.53 port 53306 2019-07-30T17:51:36.072480stark.klein-stark.info sshd\[22737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.180.53 2019-07-30T17:51:37.978791stark.klein-stark.info sshd\[22737\]: Failed password for invalid user ubuntu from 139.59.180.53 port 53306 ssh2 ... |
2019-07-31 02:40:37 |
| 121.141.5.199 | attackbots | Jul 30 14:08:11 aat-srv002 sshd[17298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.141.5.199 Jul 30 14:08:13 aat-srv002 sshd[17298]: Failed password for invalid user callahan from 121.141.5.199 port 40892 ssh2 Jul 30 14:13:43 aat-srv002 sshd[17394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.141.5.199 Jul 30 14:13:44 aat-srv002 sshd[17394]: Failed password for invalid user dk from 121.141.5.199 port 60562 ssh2 ... |
2019-07-31 03:13:50 |
| 14.48.77.231 | attackbotsspam | 5555/tcp [2019-07-30]1pkt |
2019-07-31 02:58:31 |
| 27.13.216.123 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-07-31 02:44:31 |