城市(city): Tainan
省份(region): Tainan
国家(country): Taiwan, China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.44.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40949
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.116.44.168. IN A
;; AUTHORITY SECTION:
. 146 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023050601 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 07 09:43:05 CST 2023
;; MSG SIZE rcvd: 107
Host 168.44.116.140.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 168.44.116.140.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 174.16.187.23 | attackbotsspam | firewall-block, port(s): 23/tcp |
2019-09-25 01:54:41 |
| 159.65.24.7 | attackbotsspam | Sep 24 06:54:23 php1 sshd\[8639\]: Invalid user gerrit2 from 159.65.24.7 Sep 24 06:54:23 php1 sshd\[8639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.24.7 Sep 24 06:54:25 php1 sshd\[8639\]: Failed password for invalid user gerrit2 from 159.65.24.7 port 41904 ssh2 Sep 24 06:58:42 php1 sshd\[8979\]: Invalid user blueyes from 159.65.24.7 Sep 24 06:58:42 php1 sshd\[8979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.24.7 |
2019-09-25 01:14:45 |
| 185.176.27.54 | attack | 09/24/2019-17:21:34.616530 185.176.27.54 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-09-25 01:18:49 |
| 185.36.81.242 | attackbotsspam | Rude login attack (12 tries in 1d) |
2019-09-25 01:06:06 |
| 177.157.89.103 | attackbotsspam | SMB Server BruteForce Attack |
2019-09-25 01:03:34 |
| 138.197.67.39 | attackspam | Automatic report - Banned IP Access |
2019-09-25 01:49:26 |
| 114.204.31.12 | attack | 19/9/24@08:40:47: FAIL: Alarm-SSH address from=114.204.31.12 ... |
2019-09-25 01:23:20 |
| 101.255.52.171 | attack | Sep 24 18:54:12 plex sshd[8022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.52.171 user=root Sep 24 18:54:14 plex sshd[8022]: Failed password for root from 101.255.52.171 port 58698 ssh2 |
2019-09-25 01:21:57 |
| 183.89.83.244 | attackspambots | Unauthorized connection attempt from IP address 183.89.83.244 on Port 445(SMB) |
2019-09-25 01:50:09 |
| 180.252.110.4 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 24-09-2019 13:40:20. |
2019-09-25 01:51:52 |
| 128.106.164.206 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 24-09-2019 13:40:17. |
2019-09-25 01:55:06 |
| 79.7.217.174 | attackspambots | Sep 24 16:00:13 game-panel sshd[17365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.7.217.174 Sep 24 16:00:14 game-panel sshd[17365]: Failed password for invalid user system from 79.7.217.174 port 52004 ssh2 Sep 24 16:04:34 game-panel sshd[17556]: Failed password for mysql from 79.7.217.174 port 56826 ssh2 |
2019-09-25 01:52:15 |
| 222.163.139.2 | attackbots | Unauthorised access (Sep 24) SRC=222.163.139.2 LEN=40 TTL=48 ID=17128 TCP DPT=8080 WINDOW=1643 SYN |
2019-09-25 01:11:46 |
| 218.6.145.32 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-09-25 01:35:03 |
| 154.90.8.210 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 24-09-2019 13:40:18. |
2019-09-25 01:53:53 |