城市(city): Sierra Vista
省份(region): Arizona
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.94.216.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19090
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.94.216.13. IN A
;; AUTHORITY SECTION:
. 541 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019110102 1800 900 604800 86400
;; Query time: 218 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 14:09:50 CST 2019
;; MSG SIZE rcvd: 117
Host 13.216.94.132.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 13.216.94.132.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 187.21.114.38 | attackbots | May 12 07:25:38: Invalid user connie from 187.21.114.38 port 34070 |
2020-05-13 06:29:06 |
| 206.189.165.94 | attack | May 13 03:25:44 gw1 sshd[30809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.94 May 13 03:25:46 gw1 sshd[30809]: Failed password for invalid user laury from 206.189.165.94 port 57756 ssh2 ... |
2020-05-13 06:30:01 |
| 107.158.86.116 | attack | (From eric@talkwithwebvisitor.com) My name’s Eric and I just came across your website - chiro4kids.com - in the search results. Here’s what that means to me… Your SEO’s working. You’re getting eyeballs – mine at least. Your content’s pretty good, wouldn’t change a thing. BUT… Eyeballs don’t pay the bills. CUSTOMERS do. And studies show that 7 out of 10 visitors to a site like chiro4kids.com will drop by, take a gander, and then head for the hills without doing anything else. It’s like they never were even there. You can fix this. You can make it super-simple for them to raise their hand, say, “okay, let’s talk” without requiring them to even pull their cell phone from their pocket… thanks to Talk With Web Visitor. Talk With Web Visitor is a software widget that sits on your site, ready and waiting to capture any visitor’s Name, Email address and Phone Number. It lets you know immediately – so you can talk to that lead immediately… without delay… BEFORE they head for those |
2020-05-13 06:48:59 |
| 182.76.79.36 | attackbots | Invalid user IEUser from 182.76.79.36 port 35660 |
2020-05-13 06:26:05 |
| 35.198.105.76 | attackspam | Automatic report - XMLRPC Attack |
2020-05-13 06:47:47 |
| 181.49.118.185 | attack | May 12 22:15:10 scw-6657dc sshd[32283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.118.185 May 12 22:15:10 scw-6657dc sshd[32283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.118.185 May 12 22:15:11 scw-6657dc sshd[32283]: Failed password for invalid user factorio from 181.49.118.185 port 51328 ssh2 ... |
2020-05-13 06:30:14 |
| 54.37.204.154 | attack | May 12 15:22:34 pixelmemory sshd[513794]: Invalid user nexus from 54.37.204.154 port 40552 May 12 15:22:34 pixelmemory sshd[513794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.204.154 May 12 15:22:34 pixelmemory sshd[513794]: Invalid user nexus from 54.37.204.154 port 40552 May 12 15:22:36 pixelmemory sshd[513794]: Failed password for invalid user nexus from 54.37.204.154 port 40552 ssh2 May 12 15:26:57 pixelmemory sshd[514479]: Invalid user js from 54.37.204.154 port 47822 ... |
2020-05-13 06:52:31 |
| 196.52.43.124 | attackbots | Attempts against Pop3/IMAP |
2020-05-13 06:57:28 |
| 124.207.221.66 | attackspambots | May 12 23:59:01 PorscheCustomer sshd[22670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.221.66 May 12 23:59:04 PorscheCustomer sshd[22670]: Failed password for invalid user elopez from 124.207.221.66 port 48800 ssh2 May 12 23:59:58 PorscheCustomer sshd[22733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.221.66 ... |
2020-05-13 06:48:39 |
| 46.148.201.206 | attackspambots | Invalid user deploy from 46.148.201.206 port 37054 |
2020-05-13 06:36:29 |
| 113.204.148.2 | attackspambots | Port scan(s) (3) denied |
2020-05-13 07:02:05 |
| 222.186.175.216 | attack | May 13 00:27:31 sso sshd[6191]: Failed password for root from 222.186.175.216 port 40202 ssh2 May 13 00:27:34 sso sshd[6191]: Failed password for root from 222.186.175.216 port 40202 ssh2 ... |
2020-05-13 06:31:22 |
| 222.186.180.142 | attack | May 13 00:18:11 minden010 sshd[20096]: Failed password for root from 222.186.180.142 port 60954 ssh2 May 13 00:18:20 minden010 sshd[20147]: Failed password for root from 222.186.180.142 port 38704 ssh2 May 13 00:18:22 minden010 sshd[20147]: Failed password for root from 222.186.180.142 port 38704 ssh2 ... |
2020-05-13 06:22:48 |
| 31.163.148.214 | attackspambots | trying to access non-authorized port |
2020-05-13 07:01:11 |
| 188.226.167.212 | attackspambots | Invalid user uh from 188.226.167.212 port 50736 |
2020-05-13 06:23:50 |