城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.83.204.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;135.83.204.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:04:45 CST 2025
;; MSG SIZE rcvd: 107
149.204.83.135.in-addr.arpa domain name pointer nothing.attdns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.204.83.135.in-addr.arpa name = nothing.attdns.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 34.67.85.179 | attackspam | DATE:2019-09-29 11:36:44,IP:34.67.85.179,MATCHES:10,PORT:ssh |
2019-09-29 19:25:56 |
| 106.12.85.12 | attackbots | $f2bV_matches |
2019-09-29 19:07:53 |
| 71.6.135.131 | attackspambots | " " |
2019-09-29 19:31:03 |
| 194.36.142.31 | attack | 194.36.142.31 has been banned for [spam] ... |
2019-09-29 19:06:59 |
| 185.65.137.208 | attackbotsspam | Automatic report - Banned IP Access |
2019-09-29 19:38:44 |
| 194.105.195.118 | attack | $f2bV_matches_ltvn |
2019-09-29 19:12:25 |
| 92.63.194.56 | attackspambots | 09/29/2019-12:37:33.802153 92.63.194.56 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-09-29 19:33:00 |
| 181.228.50.119 | attackspambots | Sep 29 13:28:02 ncomp sshd[26842]: Invalid user dst from 181.228.50.119 Sep 29 13:28:02 ncomp sshd[26842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.228.50.119 Sep 29 13:28:02 ncomp sshd[26842]: Invalid user dst from 181.228.50.119 Sep 29 13:28:04 ncomp sshd[26842]: Failed password for invalid user dst from 181.228.50.119 port 56357 ssh2 |
2019-09-29 19:31:39 |
| 41.33.146.1 | attackspambots | Honeypot attack, port: 445, PTR: host-41.33.146.1.tedata.net. |
2019-09-29 19:37:51 |
| 78.154.160.134 | attackbots | Honeypot attack, port: 445, PTR: 78.154.160.134.ett.ua. |
2019-09-29 19:06:25 |
| 196.15.211.92 | attackspambots | Sep 28 19:50:57 hanapaa sshd\[11956\]: Invalid user valerie from 196.15.211.92 Sep 28 19:50:57 hanapaa sshd\[11956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.15.211.92 Sep 28 19:51:00 hanapaa sshd\[11956\]: Failed password for invalid user valerie from 196.15.211.92 port 60402 ssh2 Sep 28 19:55:43 hanapaa sshd\[12352\]: Invalid user redmine from 196.15.211.92 Sep 28 19:55:43 hanapaa sshd\[12352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.15.211.92 |
2019-09-29 19:41:21 |
| 106.12.21.212 | attack | Sep 29 06:16:46 OPSO sshd\[29836\]: Invalid user password321 from 106.12.21.212 port 57216 Sep 29 06:16:46 OPSO sshd\[29836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.21.212 Sep 29 06:16:48 OPSO sshd\[29836\]: Failed password for invalid user password321 from 106.12.21.212 port 57216 ssh2 Sep 29 06:21:06 OPSO sshd\[31753\]: Invalid user gerhard from 106.12.21.212 port 39528 Sep 29 06:21:06 OPSO sshd\[31753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.21.212 |
2019-09-29 19:20:35 |
| 170.79.14.18 | attackspam | Sep 29 12:38:35 vtv3 sshd\[24567\]: Invalid user i2db from 170.79.14.18 port 42434 Sep 29 12:38:35 vtv3 sshd\[24567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.79.14.18 Sep 29 12:38:37 vtv3 sshd\[24567\]: Failed password for invalid user i2db from 170.79.14.18 port 42434 ssh2 Sep 29 12:43:46 vtv3 sshd\[27250\]: Invalid user nagios from 170.79.14.18 port 53384 Sep 29 12:43:46 vtv3 sshd\[27250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.79.14.18 Sep 29 12:58:17 vtv3 sshd\[2857\]: Invalid user uu from 170.79.14.18 port 57986 Sep 29 12:58:17 vtv3 sshd\[2857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.79.14.18 Sep 29 12:58:19 vtv3 sshd\[2857\]: Failed password for invalid user uu from 170.79.14.18 port 57986 ssh2 Sep 29 13:03:10 vtv3 sshd\[5395\]: Invalid user teste from 170.79.14.18 port 40702 Sep 29 13:03:10 vtv3 sshd\[5395\]: pam_unix\(sshd:auth\): aut |
2019-09-29 19:11:02 |
| 121.201.123.252 | attackbotsspam | Automatic report - Banned IP Access |
2019-09-29 19:41:40 |
| 62.210.217.126 | attackbotsspam | Sep 29 06:47:45 MK-Soft-VM7 sshd[19735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.217.126 Sep 29 06:47:47 MK-Soft-VM7 sshd[19735]: Failed password for invalid user shop from 62.210.217.126 port 55259 ssh2 ... |
2019-09-29 19:19:21 |