城市(city): unknown
省份(region): unknown
国家(country): Denmark
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.45.58.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.45.58.96. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 09:39:03 CST 2025
;; MSG SIZE rcvd: 105
96.58.45.139.in-addr.arpa domain name pointer 139-45-58-96.norlyscustomer.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
96.58.45.139.in-addr.arpa name = 139-45-58-96.norlyscustomer.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.55.12.248 | attackbotsspam | Nov 17 10:06:25 thevastnessof sshd[2760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248 ... |
2019-11-17 21:26:06 |
| 103.242.200.38 | attackspam | ssh failed login |
2019-11-17 21:37:38 |
| 221.225.183.230 | attack | SASL broute force |
2019-11-17 21:19:41 |
| 184.75.211.132 | attackbots | (From musselman.melanie@outlook.com) We're looking for website owners like yourself who want to automate their existing business and make some extra income... Continuous Residual Income and the product practically sells itself on auto pilot. Check out: http://trimurl.co/AutomateAnyBusiness. |
2019-11-17 21:18:24 |
| 49.232.51.61 | attackbots | SSH Bruteforce |
2019-11-17 21:08:45 |
| 175.214.37.176 | attackspambots | scan z |
2019-11-17 21:42:23 |
| 49.232.4.101 | attackbots | Nov 17 05:02:46 Tower sshd[26939]: Connection from 49.232.4.101 port 58030 on 192.168.10.220 port 22 Nov 17 05:02:48 Tower sshd[26939]: Failed password for root from 49.232.4.101 port 58030 ssh2 Nov 17 05:02:49 Tower sshd[26939]: Received disconnect from 49.232.4.101 port 58030:11: Bye Bye [preauth] Nov 17 05:02:49 Tower sshd[26939]: Disconnected from authenticating user root 49.232.4.101 port 58030 [preauth] |
2019-11-17 21:11:00 |
| 213.138.73.82 | attack | spam FO |
2019-11-17 21:40:18 |
| 41.90.8.14 | attackbots | SSH Bruteforce |
2019-11-17 21:33:12 |
| 45.118.144.31 | attackbots | SSH Bruteforce |
2019-11-17 21:31:41 |
| 49.232.51.237 | attackspambots | SSH Bruteforce |
2019-11-17 21:09:57 |
| 140.143.230.161 | attackspambots | Nov 17 09:31:27 vpn01 sshd[31695]: Failed password for root from 140.143.230.161 port 61237 ssh2 ... |
2019-11-17 21:27:28 |
| 49.234.44.48 | attackspambots | SSH Bruteforce |
2019-11-17 21:05:31 |
| 63.81.87.81 | attackspambots | Autoban 63.81.87.81 AUTH/CONNECT |
2019-11-17 21:11:45 |
| 49.235.134.224 | attackspam | SSH Bruteforce |
2019-11-17 21:04:12 |