城市(city): unknown
省份(region): unknown
国家(country): Brazil
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.97.34.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.97.34.92. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:00:48 CST 2022
;; MSG SIZE rcvd: 105
b'92.34.97.138.in-addr.arpa domain name pointer customer-138-97-34-92.maisinternet.net.br.
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
Non-authoritative answer:
92.34.97.138.in-addr.arpa name = customer-138-97-34-92.maisinternet.net.br.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 198.108.66.230 | attackbotsspam | Port 8551 scan denied |
2020-03-21 16:29:25 |
| 190.60.94.189 | attack | 2020-03-21T07:58:00.154714upcloud.m0sh1x2.com sshd[15963]: Invalid user pj from 190.60.94.189 port 21361 |
2020-03-21 16:06:17 |
| 35.194.160.189 | attackspam | Invalid user ftpuser from 35.194.160.189 port 56114 |
2020-03-21 16:45:22 |
| 121.12.151.250 | attackbotsspam | k+ssh-bruteforce |
2020-03-21 16:40:48 |
| 121.138.171.77 | attack | kp-sea2-01 recorded 2 login violations from 121.138.171.77 and was blocked at 2020-03-21 03:50:42. 121.138.171.77 has been blocked on 0 previous occasions. 121.138.171.77's first attempt was recorded at 2020-03-21 03:50:42 |
2020-03-21 16:04:56 |
| 106.12.182.142 | attackbots | Mar 21 04:45:15 pornomens sshd\[30880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.182.142 user=uucp Mar 21 04:45:16 pornomens sshd\[30880\]: Failed password for uucp from 106.12.182.142 port 53494 ssh2 Mar 21 04:50:42 pornomens sshd\[30998\]: Invalid user delu from 106.12.182.142 port 34814 Mar 21 04:50:42 pornomens sshd\[30998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.182.142 ... |
2020-03-21 16:05:49 |
| 222.186.15.166 | attackbots | Mar 21 05:20:53 firewall sshd[2265]: Failed password for root from 222.186.15.166 port 26505 ssh2 Mar 21 05:20:55 firewall sshd[2265]: Failed password for root from 222.186.15.166 port 26505 ssh2 Mar 21 05:20:57 firewall sshd[2265]: Failed password for root from 222.186.15.166 port 26505 ssh2 ... |
2020-03-21 16:29:08 |
| 104.248.58.71 | attackspam | Invalid user zabbix from 104.248.58.71 port 49576 |
2020-03-21 16:26:57 |
| 113.184.157.201 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 21-03-2020 03:50:15. |
2020-03-21 16:36:26 |
| 49.234.10.207 | attack | Mar 21 09:16:07 server sshd\[23571\]: Invalid user domin from 49.234.10.207 Mar 21 09:16:07 server sshd\[23571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.10.207 Mar 21 09:16:09 server sshd\[23571\]: Failed password for invalid user domin from 49.234.10.207 port 57428 ssh2 Mar 21 09:22:49 server sshd\[26232\]: Invalid user js from 49.234.10.207 Mar 21 09:22:49 server sshd\[26232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.10.207 ... |
2020-03-21 15:58:01 |
| 125.160.64.134 | attackspam | 1584762627 - 03/21/2020 04:50:27 Host: 125.160.64.134/125.160.64.134 Port: 445 TCP Blocked |
2020-03-21 16:22:37 |
| 49.233.165.151 | attack | Invalid user rajesh from 49.233.165.151 port 35474 |
2020-03-21 16:24:55 |
| 5.39.77.117 | attack | Mar 21 08:34:45 eventyay sshd[23785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.117 Mar 21 08:34:47 eventyay sshd[23785]: Failed password for invalid user schirmi from 5.39.77.117 port 57679 ssh2 Mar 21 08:41:54 eventyay sshd[24097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.117 ... |
2020-03-21 15:55:16 |
| 118.200.40.225 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 21-03-2020 03:50:15. |
2020-03-21 16:35:46 |
| 188.173.97.144 | attackspam | Mar 21 10:07:01 www sshd\[87270\]: Invalid user gitlab-runner from 188.173.97.144 Mar 21 10:07:01 www sshd\[87270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.97.144 Mar 21 10:07:03 www sshd\[87270\]: Failed password for invalid user gitlab-runner from 188.173.97.144 port 53722 ssh2 ... |
2020-03-21 16:18:52 |