城市(city): Rostock
省份(region): Mecklenburg-Vorpommern
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.30.121.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.30.121.44. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 19:26:28 CST 2025
;; MSG SIZE rcvd: 106
Host 44.121.30.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 44.121.30.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 207.154.193.178 | attackbotsspam | Apr 25 15:43:32 home sshd[26064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.193.178 Apr 25 15:43:33 home sshd[26064]: Failed password for invalid user alison from 207.154.193.178 port 40090 ssh2 Apr 25 15:46:57 home sshd[26735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.193.178 ... |
2020-04-25 22:12:02 |
| 85.204.246.240 | attack | WordPress wp-login brute force :: 85.204.246.240 0.060 BYPASS [25/Apr/2020:12:14:48 0000] www.[censored_2] "POST /wp-login.php HTTP/1.1" 200 2252 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.90 Safari/537.36 2345Explorer/9.3.2.17331" |
2020-04-25 22:16:45 |
| 14.176.228.42 | attackbots | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-04-25 22:18:12 |
| 94.102.49.206 | attackspam | firewall-block, port(s): 5631/tcp |
2020-04-25 22:38:48 |
| 73.15.91.251 | attackspambots | Apr 25 12:17:27 *** sshd[26678]: Invalid user pakhi from 73.15.91.251 |
2020-04-25 22:15:01 |
| 77.247.108.77 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 63 - port: 28089 proto: TCP cat: Misc Attack |
2020-04-25 22:52:23 |
| 172.104.112.244 | attack | scans once in preceeding hours on the ports (in chronological order) 1080 resulting in total of 4 scans from 172.104.0.0/15 block. |
2020-04-25 22:32:14 |
| 80.82.70.118 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 3389 proto: TCP cat: Misc Attack |
2020-04-25 22:49:24 |
| 194.31.244.46 | attack | scans 16 times in preceeding hours on the ports (in chronological order) 7745 7707 7727 7738 7736 7748 7700 7724 7726 7744 7743 7708 7709 7747 7711 7737 resulting in total of 49 scans from 194.31.244.0/24 block. |
2020-04-25 22:20:06 |
| 184.105.247.195 | attackspambots | Unauthorized connection attempt detected from IP address 184.105.247.195 to port 23 |
2020-04-25 22:30:15 |
| 184.105.139.107 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 11211 resulting in total of 8 scans from 184.105.0.0/16 block. |
2020-04-25 22:30:54 |
| 106.13.224.130 | attackbotsspam | SSH auth scanning - multiple failed logins |
2020-04-25 22:12:29 |
| 185.175.93.104 | attackspambots | Fail2Ban Ban Triggered |
2020-04-25 22:24:50 |
| 92.118.37.86 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 87 - port: 6895 proto: TCP cat: Misc Attack |
2020-04-25 22:41:05 |
| 125.65.42.38 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 5353 resulting in total of 7 scans from 125.64.0.0/13 block. |
2020-04-25 22:33:15 |