城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.120.93.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62194
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.120.93.79. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 16:21:29 CST 2025
;; MSG SIZE rcvd: 106
Host 79.93.120.134.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 79.93.120.134.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 201.236.182.92 | attackbotsspam | $f2bV_matches |
2020-08-18 01:41:45 |
| 156.222.3.145 | attack | Unauthorized connection attempt from IP address 156.222.3.145 on Port 445(SMB) |
2020-08-18 02:09:37 |
| 51.68.224.53 | attack | 2020-08-17T13:34:16.5287901495-001 sshd[37877]: Invalid user rv from 51.68.224.53 port 44314 2020-08-17T13:34:18.7376121495-001 sshd[37877]: Failed password for invalid user rv from 51.68.224.53 port 44314 ssh2 2020-08-17T13:36:25.4703631495-001 sshd[37958]: Invalid user armenia from 51.68.224.53 port 57710 2020-08-17T13:36:25.4736051495-001 sshd[37958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=53.ip-51-68-224.eu 2020-08-17T13:36:25.4703631495-001 sshd[37958]: Invalid user armenia from 51.68.224.53 port 57710 2020-08-17T13:36:27.5011191495-001 sshd[37958]: Failed password for invalid user armenia from 51.68.224.53 port 57710 ssh2 ... |
2020-08-18 01:59:05 |
| 165.227.63.187 | attackbotsspam | digitalocdean shit / http://firstmailer.info/firstmailer/link.php?M= |
2020-08-18 01:49:42 |
| 132.145.159.137 | attackbotsspam | (sshd) Failed SSH login from 132.145.159.137 (US/United States/-): 5 in the last 3600 secs |
2020-08-18 01:44:49 |
| 46.235.85.50 | attackbots | Unauthorized connection attempt from IP address 46.235.85.50 on Port 445(SMB) |
2020-08-18 01:38:14 |
| 222.186.15.115 | attackbots | Aug 17 19:44:51 v22018053744266470 sshd[11036]: Failed password for root from 222.186.15.115 port 17554 ssh2 Aug 17 19:45:02 v22018053744266470 sshd[11047]: Failed password for root from 222.186.15.115 port 51627 ssh2 ... |
2020-08-18 01:54:08 |
| 78.38.186.243 | attackbots | *Port Scan* detected from 78.38.186.243 (IR/Iran/Tehr?n/Tehran/-). 4 hits in the last 230 seconds |
2020-08-18 01:48:52 |
| 122.179.35.19 | attack | Email rejected due to spam filtering |
2020-08-18 02:10:21 |
| 200.44.50.155 | attackbots | Aug 17 14:37:43 root sshd[25076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155 Aug 17 14:37:45 root sshd[25076]: Failed password for invalid user uuuu from 200.44.50.155 port 42332 ssh2 Aug 17 14:46:18 root sshd[26222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155 ... |
2020-08-18 01:44:32 |
| 115.84.76.81 | attackspam | Unauthorized connection attempt from IP address 115.84.76.81 on Port 445(SMB) |
2020-08-18 01:38:45 |
| 106.13.1.245 | attackbotsspam | Aug 17 14:02:01 ncomp sshd[31433]: Invalid user zimbra from 106.13.1.245 Aug 17 14:02:01 ncomp sshd[31433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.1.245 Aug 17 14:02:01 ncomp sshd[31433]: Invalid user zimbra from 106.13.1.245 Aug 17 14:02:02 ncomp sshd[31433]: Failed password for invalid user zimbra from 106.13.1.245 port 50618 ssh2 |
2020-08-18 02:01:11 |
| 106.51.49.173 | attack | Unauthorized connection attempt from IP address 106.51.49.173 on Port 445(SMB) |
2020-08-18 02:07:21 |
| 43.225.67.123 | attackbots | Aug 17 16:30:28 Ubuntu-1404-trusty-64-minimal sshd\[14539\]: Invalid user kel from 43.225.67.123 Aug 17 16:30:28 Ubuntu-1404-trusty-64-minimal sshd\[14539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.67.123 Aug 17 16:30:30 Ubuntu-1404-trusty-64-minimal sshd\[14539\]: Failed password for invalid user kel from 43.225.67.123 port 59497 ssh2 Aug 17 16:34:58 Ubuntu-1404-trusty-64-minimal sshd\[18999\]: Invalid user whz from 43.225.67.123 Aug 17 16:34:58 Ubuntu-1404-trusty-64-minimal sshd\[18999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.225.67.123 |
2020-08-18 02:00:25 |
| 49.233.177.99 | attackspam | Aug 17 13:58:26 sshgateway sshd\[25197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.177.99 user=root Aug 17 13:58:28 sshgateway sshd\[25197\]: Failed password for root from 49.233.177.99 port 45124 ssh2 Aug 17 14:02:24 sshgateway sshd\[25266\]: Invalid user cashier from 49.233.177.99 |
2020-08-18 01:35:06 |