城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.254.191.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.254.191.253. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 14:30:05 CST 2025
;; MSG SIZE rcvd: 108
Host 253.191.254.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 253.191.254.138.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 212.109.27.86 | attack | Unauthorized connection attempt from IP address 212.109.27.86 on Port 445(SMB) |
2019-11-21 00:29:19 |
| 138.68.18.200 | attackbotsspam | DATE:2019-11-20 15:45:23, IP:138.68.18.200, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-11-21 00:30:19 |
| 142.44.160.214 | attack | 2019-11-20T09:34:53.3502171495-001 sshd\[50503\]: Failed password for invalid user zouzou from 142.44.160.214 port 60739 ssh2 2019-11-20T10:38:54.0100141495-001 sshd\[52713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net user=root 2019-11-20T10:38:56.2011901495-001 sshd\[52713\]: Failed password for root from 142.44.160.214 port 39599 ssh2 2019-11-20T10:42:55.3995831495-001 sshd\[52833\]: Invalid user travers from 142.44.160.214 port 57700 2019-11-20T10:42:55.4047771495-001 sshd\[52833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net 2019-11-20T10:42:57.4397831495-001 sshd\[52833\]: Failed password for invalid user travers from 142.44.160.214 port 57700 ssh2 ... |
2019-11-21 00:31:28 |
| 94.10.115.20 | attack | Netgear DGN Device Remote Command Execution Vulnerability |
2019-11-21 00:19:13 |
| 185.156.73.34 | attack | ET DROP Dshield Block Listed Source group 1 - port: 51231 proto: TCP cat: Misc Attack |
2019-11-21 00:08:44 |
| 34.74.188.104 | attackbotsspam | C1,WP GET /digitale-produkte/wp-login.php |
2019-11-21 00:26:33 |
| 45.71.237.42 | attackbotsspam | 2019-11-20 14:59:54 H=([45.71.237.42]) [45.71.237.42]:44436 I=[10.100.18.21]:25 F= |
2019-11-21 00:24:13 |
| 203.109.108.39 | attackspambots | Unauthorized connection attempt from IP address 203.109.108.39 on Port 445(SMB) |
2019-11-21 00:20:44 |
| 95.210.227.171 | attackspam | Unauthorized connection attempt from IP address 95.210.227.171 on Port 445(SMB) |
2019-11-21 00:02:27 |
| 91.112.193.242 | attackspambots | Fail2Ban Ban Triggered |
2019-11-21 00:00:43 |
| 147.135.94.171 | attackbotsspam | $f2bV_matches |
2019-11-21 00:08:32 |
| 2.19.38.59 | attackspam | 20/Nov/2019 15:14:51] IPS: Port Scan, protocol: TCP, source: 2.19.38.59, destination: ports: 49673, 49675, 49676, 49677, 49678, 49699, 49700, 49702, 49704, 49706, ... |
2019-11-21 00:37:46 |
| 185.165.168.229 | attackbotsspam | Automatic report - XMLRPC Attack |
2019-11-21 00:34:40 |
| 83.97.20.46 | attack | (Nov 20) LEN=40 TTL=243 ID=54321 TCP DPT=21 WINDOW=65535 SYN (Nov 20) LEN=40 TTL=241 ID=54321 TCP DPT=445 WINDOW=65535 SYN (Nov 20) LEN=40 TTL=241 ID=54321 TCP DPT=1433 WINDOW=65535 SYN (Nov 19) LEN=40 TTL=241 ID=54321 TCP DPT=8080 WINDOW=65535 SYN (Nov 19) LEN=40 TTL=241 ID=54321 TCP DPT=3389 WINDOW=65535 SYN (Nov 19) LEN=40 TTL=241 ID=54321 TCP DPT=3306 WINDOW=65535 SYN (Nov 18) LEN=40 TTL=241 ID=54321 TCP DPT=137 WINDOW=65535 SYN (Nov 18) LEN=40 TTL=241 ID=54321 TCP DPT=135 WINDOW=65535 SYN (Nov 18) LEN=40 TTL=241 ID=54321 TCP DPT=111 WINDOW=65535 SYN (Nov 17) LEN=40 TTL=241 ID=54321 TCP DPT=445 WINDOW=65535 SYN (Nov 17) LEN=40 TTL=241 ID=54321 TCP DPT=1433 WINDOW=65535 SYN (Nov 17) LEN=40 TTL=241 ID=54321 TCP DPT=8080 WINDOW=65535 SYN |
2019-11-21 00:26:06 |
| 103.129.98.170 | attack | 2019-11-20T16:08:32.617891abusebot-3.cloudsearch.cf sshd\[27000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.98.170 user=root |
2019-11-21 00:23:49 |