城市(city): unknown
省份(region): unknown
国家(country): Sweden
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.6.7.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34845
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.6.7.66. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011201 1800 900 604800 86400
;; Query time: 157 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 05:19:52 CST 2025
;; MSG SIZE rcvd: 103
Host 66.7.6.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 66.7.6.138.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
185.209.0.91 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 55555 proto: TCP cat: Misc Attack |
2020-06-21 07:34:13 |
185.39.11.47 | attack | Jun 21 01:08:02 debian-2gb-nbg1-2 kernel: \[14953164.988655\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.39.11.47 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=56145 PROTO=TCP SPT=50744 DPT=35380 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-21 07:36:22 |
94.254.64.165 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 93 - port: 5555 proto: TCP cat: Misc Attack |
2020-06-21 07:23:46 |
94.102.51.28 | attack | firewall-block, port(s): 6019/tcp, 6400/tcp, 6640/tcp, 6813/tcp, 6840/tcp, 6923/tcp, 6935/tcp |
2020-06-21 07:24:15 |
101.201.50.1 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 07:38:26 |
113.141.64.31 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 07:22:15 |
141.98.81.138 | attackspam |
|
2020-06-21 07:37:23 |
87.251.74.213 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 82 - port: 2976 proto: TCP cat: Misc Attack |
2020-06-21 07:26:14 |
37.49.226.208 | attackbots | Unauthorized connection attempt detected from IP address 37.49.226.208 to port 23 |
2020-06-21 07:11:58 |
92.53.65.40 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 89 - port: 12383 proto: TCP cat: Misc Attack |
2020-06-21 07:26:01 |
45.143.220.240 | attackbots | Multiport scan 31 ports : 5051 5053 5054 5055 5056 5057 5058 5059 5061(x2) 5090 5091(x2) 5092(x2) 5093(x2) 5094(x2) 5097 5098 5099 5160(x2) 5161 5260 5360 5460 5560 5660 5760(x2) 5860 5960 6070 6080 6666 7100 |
2020-06-21 07:31:03 |
93.115.1.195 | attackbotsspam | Jun 21 00:54:40 vps sshd[32691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.1.195 Jun 21 00:54:42 vps sshd[32691]: Failed password for invalid user yzi from 93.115.1.195 port 47776 ssh2 Jun 21 00:58:20 vps sshd[412]: Failed password for root from 93.115.1.195 port 51664 ssh2 ... |
2020-06-21 07:05:10 |
183.134.101.95 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 07:19:34 |
121.132.215.233 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-06-21 07:37:42 |
104.238.73.216 | spamattack | phising scam |
2020-06-21 07:03:34 |