城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.9.214.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.9.214.18. IN A
;; AUTHORITY SECTION:
. 190 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:41:27 CST 2022
;; MSG SIZE rcvd: 105
18.214.9.139.in-addr.arpa domain name pointer ecs-139-9-214-18.compute.hwclouds-dns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
18.214.9.139.in-addr.arpa name = ecs-139-9-214-18.compute.hwclouds-dns.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 42.236.10.121 | attackspambots | Automated report (2019-10-04T03:51:45+00:00). Scraper detected at this address. |
2019-10-04 17:57:30 |
| 45.230.64.1 | attack | Oct 3 21:51:47 mail postfix/postscreen[115023]: PREGREET 21 after 0.82 from [45.230.64.1]:37516: EHLO looneytours.it ... |
2019-10-04 17:56:16 |
| 84.17.60.25 | attackbotsspam | (From feedbackform101@gmail.com) Support the growth and SEO of your website and services with 50% Ending Today! https://pressbroadcast.co/discount/goodnews The Press Broadcast Company is a press release distribution company that can send links and info on your business and services to 400+ News Websites and 100+ Blogs with a fully SEO developed press release. -->We offer detailed visibility reports of all the news sites where your press release has been distributed. -->We target top news websites locally, nationally, and internationally including ABC, NBC and Fox -->We help you establish a solid presence on social media by sharing your news stories across 15 of the most popular social media channels, including Twitter, Facebook, StumbleUpon, Delicious, Tumblr, and others. With the Press Broadcast press release distribution experience, you are assured of better online visibility and a steadily increasing traffic that will do wonders to your brand name. Visit the link below fo |
2019-10-04 18:13:41 |
| 222.186.173.215 | attackbotsspam | Oct 4 12:00:00 s64-1 sshd[21899]: Failed password for root from 222.186.173.215 port 24344 ssh2 Oct 4 12:00:04 s64-1 sshd[21899]: Failed password for root from 222.186.173.215 port 24344 ssh2 Oct 4 12:00:16 s64-1 sshd[21899]: error: maximum authentication attempts exceeded for root from 222.186.173.215 port 24344 ssh2 [preauth] ... |
2019-10-04 18:14:11 |
| 222.186.175.161 | attack | Oct 4 11:54:15 dedicated sshd[22469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161 user=root Oct 4 11:54:16 dedicated sshd[22469]: Failed password for root from 222.186.175.161 port 47084 ssh2 |
2019-10-04 17:57:42 |
| 154.236.162.48 | attackspam | Chat Spam |
2019-10-04 18:30:38 |
| 157.55.39.20 | attackbots | Automatic report - Banned IP Access |
2019-10-04 18:16:30 |
| 121.15.2.178 | attack | *Port Scan* detected from 121.15.2.178 (CN/China/-). 4 hits in the last 90 seconds |
2019-10-04 18:15:51 |
| 106.13.34.212 | attackbots | Oct 4 06:02:59 plusreed sshd[4249]: Invalid user 123Grande from 106.13.34.212 ... |
2019-10-04 18:04:06 |
| 51.83.72.243 | attackbotsspam | 2019-10-04T09:20:54.627518abusebot-2.cloudsearch.cf sshd\[9264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=243.ip-51-83-72.eu user=root |
2019-10-04 17:53:06 |
| 36.37.185.97 | attackspam | WordPress wp-login brute force :: 36.37.185.97 0.136 BYPASS [04/Oct/2019:13:51:07 1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-10-04 18:14:34 |
| 2.84.12.129 | attackspam | /Pages/login.htm |
2019-10-04 18:01:17 |
| 41.213.185.182 | attackspam | Wordpress Admin Login attack |
2019-10-04 18:06:31 |
| 83.171.107.216 | attackbotsspam | Oct 3 23:16:37 friendsofhawaii sshd\[32216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216.pppoe.avangarddsl.ru user=root Oct 3 23:16:39 friendsofhawaii sshd\[32216\]: Failed password for root from 83.171.107.216 port 28975 ssh2 Oct 3 23:21:16 friendsofhawaii sshd\[32600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216.pppoe.avangarddsl.ru user=root Oct 3 23:21:18 friendsofhawaii sshd\[32600\]: Failed password for root from 83.171.107.216 port 49030 ssh2 Oct 3 23:25:58 friendsofhawaii sshd\[491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp.83-171-107-216.pppoe.avangarddsl.ru user=root |
2019-10-04 18:02:04 |
| 118.24.143.110 | attack | Unauthorized SSH login attempts |
2019-10-04 18:08:22 |