城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.102.134.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.102.134.190. IN A
;; AUTHORITY SECTION:
. 333 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022101000 1800 900 604800 86400
;; Query time: 186 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 10 18:39:02 CST 2022
;; MSG SIZE rcvd: 108
Host 190.134.102.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 190.134.102.140.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.216.140.180 | attackspambots | 10/27/2019-20:00:54.046970 185.216.140.180 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-28 08:08:10 |
| 118.24.95.153 | attack | Oct 28 05:51:40 www sshd\[106875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.153 user=root Oct 28 05:51:41 www sshd\[106875\]: Failed password for root from 118.24.95.153 port 50012 ssh2 Oct 28 05:55:58 www sshd\[106922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.153 user=root ... |
2019-10-28 12:01:32 |
| 148.72.213.52 | attack | Oct 28 04:52:27 eventyay sshd[8697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.213.52 Oct 28 04:52:29 eventyay sshd[8697]: Failed password for invalid user user3 from 148.72.213.52 port 60374 ssh2 Oct 28 04:57:00 eventyay sshd[8796]: Failed password for root from 148.72.213.52 port 42776 ssh2 ... |
2019-10-28 12:00:17 |
| 89.248.160.178 | attack | firewall-block, port(s): 7748/tcp, 7792/tcp, 7804/tcp, 54996/tcp, 55551/tcp |
2019-10-28 08:25:11 |
| 185.209.0.32 | attackbotsspam | Oct 27 22:37:43 h2177944 kernel: \[5088047.858510\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.32 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=47306 PROTO=TCP SPT=49607 DPT=3471 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 27 22:54:07 h2177944 kernel: \[5089031.724111\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.32 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=40598 PROTO=TCP SPT=49607 DPT=3408 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 27 23:24:08 h2177944 kernel: \[5090832.722714\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.32 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=530 PROTO=TCP SPT=49607 DPT=3449 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 27 23:28:36 h2177944 kernel: \[5091100.619273\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.32 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=51044 PROTO=TCP SPT=49607 DPT=3456 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 27 23:37:44 h2177944 kernel: \[5091648.411065\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.32 DST=85.214.117.9 LEN=40 |
2019-10-28 08:09:09 |
| 185.143.221.186 | attack | 10/27/2019-19:18:36.990609 185.143.221.186 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-28 08:16:34 |
| 92.53.65.123 | attackbotsspam | 7777/tcp 7773/tcp 7780/tcp... [2019-08-27/10-27]306pkt,257pt.(tcp) |
2019-10-28 12:07:40 |
| 185.156.73.27 | attackspambots | Multiport scan : 25 ports scanned 4096 4097 4098 11431 11432 11433 15556 15557 15558 27274 27275 27276 30526 30528 52897 52898 55846 55847 55848 56137 56138 56139 59152 59153 59154 |
2019-10-28 08:14:46 |
| 182.61.185.41 | attackbotsspam | $f2bV_matches |
2019-10-28 12:03:47 |
| 124.156.200.56 | attackbotsspam | php WP PHPmyadamin ABUSE blocked for 12h |
2019-10-28 12:00:36 |
| 162.125.36.1 | attackbots | ET POLICY Dropbox.com Offsite File Backup in Use - port: 52214 proto: TCP cat: Potential Corporate Privacy Violation |
2019-10-28 08:17:50 |
| 43.245.222.176 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 30 - port: 6697 proto: TCP cat: Misc Attack |
2019-10-28 08:31:26 |
| 45.136.109.82 | attackbots | 10/27/2019-19:35:56.593990 45.136.109.82 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-28 08:05:42 |
| 185.176.27.18 | attack | 10/28/2019-01:02:40.701192 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-28 08:11:45 |
| 104.244.73.176 | attackspambots | ET COMPROMISED Known Compromised or Hostile Host Traffic group 1 - port: 22 proto: TCP cat: Misc Attack |
2019-10-28 08:21:14 |