城市(city): Taipei
省份(region): Taipei City
国家(country): Taiwan, China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.112.220.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5284
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.112.220.94. IN A
;; AUTHORITY SECTION:
. 370 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020082301 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 24 08:00:17 CST 2020
;; MSG SIZE rcvd: 118
94.220.112.140.in-addr.arpa domain name pointer F0094.f1.ntu.edu.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
94.220.112.140.in-addr.arpa name = F0094.f1.ntu.edu.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.225.141.15 | attackspambots | Automatic report - Port Scan Attack |
2020-08-09 20:14:22 |
| 49.232.69.39 | attack | Aug 9 02:06:37 web1 sshd\[27109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.69.39 user=root Aug 9 02:06:39 web1 sshd\[27109\]: Failed password for root from 49.232.69.39 port 56766 ssh2 Aug 9 02:09:42 web1 sshd\[27437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.69.39 user=root Aug 9 02:09:44 web1 sshd\[27437\]: Failed password for root from 49.232.69.39 port 49210 ssh2 Aug 9 02:15:39 web1 sshd\[27941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.69.39 user=root |
2020-08-09 20:18:43 |
| 200.247.143.50 | attack | Unauthorized connection attempt from IP address 200.247.143.50 on Port 445(SMB) |
2020-08-09 20:11:24 |
| 78.128.113.116 | attack | 2020-08-09 13:38:33 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data \(set_id=ben@benjaminhauck.com\) 2020-08-09 13:38:39 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data 2020-08-09 13:38:48 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data 2020-08-09 13:38:53 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data 2020-08-09 13:42:21 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data \(set_id=adminadmin@no-server.de\) ... |
2020-08-09 19:47:33 |
| 183.64.214.250 | attack | Attempted connection to port 1433. |
2020-08-09 19:43:05 |
| 180.251.73.210 | attackbots | SSH invalid-user multiple login try |
2020-08-09 20:19:57 |
| 45.248.71.153 | attackbotsspam | Lines containing failures of 45.248.71.153 Aug 5 12:41:12 hal sshd[16166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.71.153 user=r.r Aug 5 12:41:14 hal sshd[16166]: Failed password for r.r from 45.248.71.153 port 34220 ssh2 Aug 5 12:41:15 hal sshd[16166]: Received disconnect from 45.248.71.153 port 34220:11: Bye Bye [preauth] Aug 5 12:41:15 hal sshd[16166]: Disconnected from authenticating user r.r 45.248.71.153 port 34220 [preauth] Aug 5 13:46:23 hal sshd[27500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.71.153 user=r.r Aug 5 13:46:25 hal sshd[27500]: Failed password for r.r from 45.248.71.153 port 39442 ssh2 Aug 5 13:46:27 hal sshd[27500]: Received disconnect from 45.248.71.153 port 39442:11: Bye Bye [preauth] Aug 5 13:46:27 hal sshd[27500]: Disconnected from authenticating user r.r 45.248.71.153 port 39442 [preauth] Aug 5 13:49:37 hal sshd[27983]: pam_u........ ------------------------------ |
2020-08-09 19:45:51 |
| 52.229.160.184 | attackbotsspam |
|
2020-08-09 19:38:05 |
| 34.75.86.157 | attackspambots | 34.75.86.157 - - [09/Aug/2020:14:01:11 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 34.75.86.157 - - [09/Aug/2020:14:15:40 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-09 20:19:26 |
| 79.7.130.44 | attackspam | Automatic report - Banned IP Access |
2020-08-09 19:53:34 |
| 120.92.109.69 | attackspam | Aug 9 11:18:36 ns382633 sshd\[10545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.109.69 user=root Aug 9 11:18:38 ns382633 sshd\[10545\]: Failed password for root from 120.92.109.69 port 43504 ssh2 Aug 9 11:31:53 ns382633 sshd\[13139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.109.69 user=root Aug 9 11:31:55 ns382633 sshd\[13139\]: Failed password for root from 120.92.109.69 port 41270 ssh2 Aug 9 11:37:33 ns382633 sshd\[15503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.109.69 user=root |
2020-08-09 19:52:04 |
| 36.92.152.74 | attackbots | Unauthorized connection attempt from IP address 36.92.152.74 on Port 445(SMB) |
2020-08-09 20:08:16 |
| 193.112.49.125 | attackspam | Aug 9 14:13:57 lnxweb62 sshd[30451]: Failed password for root from 193.112.49.125 port 38380 ssh2 Aug 9 14:13:57 lnxweb62 sshd[30451]: Failed password for root from 193.112.49.125 port 38380 ssh2 |
2020-08-09 20:14:37 |
| 172.68.65.169 | attackspam | Aug 9 06:48:25 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.68.65.169 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=30514 DF PROTO=TCP SPT=61680 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0 Aug 9 06:48:26 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.68.65.169 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=30515 DF PROTO=TCP SPT=61680 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0 Aug 9 06:48:28 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=172.68.65.169 DST=79.143.186.54 LEN=52 TOS=0x00 PREC=0x00 TTL=59 ID=30516 DF PROTO=TCP SPT=61680 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-08-09 20:10:07 |
| 182.72.3.122 | attack | Unauthorized connection attempt from IP address 182.72.3.122 on Port 445(SMB) |
2020-08-09 20:15:48 |