城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.101.254.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10769
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.101.254.241. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 17:17:42 CST 2025
;; MSG SIZE rcvd: 108
241.254.101.139.in-addr.arpa domain name pointer kcn-139-101-254-241.kcn.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
241.254.101.139.in-addr.arpa name = kcn-139-101-254-241.kcn.ne.jp.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
185.175.93.14 | attackspam | 11/10/2019-19:10:29.641997 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-11 02:43:10 |
185.176.27.18 | attackbotsspam | 185.176.27.18 was recorded 146 times by 28 hosts attempting to connect to the following ports: 55390,104,7011,22222,15351,44301,65001,1389,23813,53411,406,58706,7001,42312,9874,3383,8001,53911,50720,37037,13389,33430,48048,33333,5589,18902,65110,23500,20013,31313,50213,11111,16111,50007,4489,9833,3394,33901,41812,33001,30000,2009,60001,3393,56010,8412,10101,33224. Incident counter (4h, 24h, all-time): 146, 770, 4185 |
2019-11-11 03:02:05 |
185.209.0.32 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-11-11 03:01:01 |
89.248.174.215 | attackspam | 11/10/2019-11:31:45.628600 89.248.174.215 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98 |
2019-11-11 02:49:03 |
132.232.94.184 | attackspam | Multiport scan : 8 ports scanned 80 6379 6380 7001 7002 8080 8088 9200 |
2019-11-11 02:45:12 |
80.82.78.100 | attackbots | firewall-block, port(s): 1088/udp, 1157/udp |
2019-11-11 02:53:21 |
51.75.134.211 | attack | ET COMPROMISED Known Compromised or Hostile Host Traffic group 14 - port: 5902 proto: TCP cat: Misc Attack |
2019-11-11 02:56:13 |
92.118.222.248 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 83 proto: TCP cat: Misc Attack |
2019-11-11 02:47:06 |
139.198.189.36 | attackspam | Nov 10 08:06:04 wbs sshd\[29743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.189.36 user=root Nov 10 08:06:06 wbs sshd\[29743\]: Failed password for root from 139.198.189.36 port 55628 ssh2 Nov 10 08:10:12 wbs sshd\[30229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.189.36 user=root Nov 10 08:10:15 wbs sshd\[30229\]: Failed password for root from 139.198.189.36 port 59608 ssh2 Nov 10 08:14:18 wbs sshd\[30559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.189.36 user=mysql |
2019-11-11 02:44:46 |
185.176.27.98 | attack | 11/10/2019-19:22:55.023482 185.176.27.98 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-11 03:01:17 |
81.22.45.115 | attackspam | 81.22.45.115 was recorded 132 times by 24 hosts attempting to connect to the following ports: 4065,4068,4206,4089,4164,4071,4192,4055,4152,4111,4173,4201,4155,4127,4124,4070,4159,4104,4096,4056,4047,4207,4086,4105,4215,4208,4141,4097,4074,4170,4188,4093,4058,4077,4031,4197,4046,4128,4106,4094,4176,4153,4203,4078,4184,4160,4185,4186,4217,4037,4122,4142,4090,4149,4175,4174,4103,4218,4113,4108,4154,4165,4034,4178,4041,4157,4182,4169,4162,4181,4036,4204,4180,4062,4040,4030,4187,4098,4137,4066,4210,4161,4179,4021,4172,4081,4016,4151,4143,4235,4147,4131,4076,4190,4014,4050,4048,4202,4156,4158,4237,4073,4102,4135,4100,4140. Incident counter (4h, 24h, all-time): 132, 843, 4479 |
2019-11-11 03:06:07 |
81.22.45.219 | attackbots | 81.22.45.219 was recorded 11 times by 2 hosts attempting to connect to the following ports: 49172,11462,43237,18008,26448,51455,41668,10508,51028,20138,43773. Incident counter (4h, 24h, all-time): 11, 62, 62 |
2019-11-11 02:51:45 |
52.143.182.227 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-11-11 02:55:28 |
193.29.15.60 | attackbotsspam | Multiport scan : 5 ports scanned 8889 10332 18082 20332 20334 |
2019-11-11 03:00:05 |
92.53.90.132 | attack | Port Scan: TCP/5927 |
2019-11-11 03:04:24 |