城市(city): Tainan
省份(region): Tainan
国家(country): Taiwan, China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.89.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.116.89.126. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400
;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 15:57:40 CST 2023
;; MSG SIZE rcvd: 107
Host 126.89.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 126.89.116.140.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.126.197.132 | attack | Unauthorized connection attempt from IP address 92.126.197.132 on Port 445(SMB) |
2019-11-28 06:42:28 |
| 223.30.218.42 | attack | Unauthorized connection attempt from IP address 223.30.218.42 on Port 445(SMB) |
2019-11-28 06:14:49 |
| 170.238.74.61 | attackbotsspam | Unauthorized connection attempt from IP address 170.238.74.61 on Port 445(SMB) |
2019-11-28 06:10:57 |
| 138.68.178.64 | attackspam | frenzy |
2019-11-28 06:04:51 |
| 171.38.145.233 | attack | Fail2Ban Ban Triggered |
2019-11-28 06:24:11 |
| 172.87.222.17 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-11-28 06:34:01 |
| 181.196.177.20 | attackspambots | Unauthorized connection attempt from IP address 181.196.177.20 on Port 445(SMB) |
2019-11-28 06:33:33 |
| 89.240.226.216 | attackspambots | UTC: 2019-11-26 port: 23/tcp |
2019-11-28 06:39:09 |
| 222.252.124.223 | attackbotsspam | $f2bV_matches |
2019-11-28 06:36:28 |
| 125.115.94.158 | attack | SASL broute force |
2019-11-28 06:34:33 |
| 223.206.245.83 | attackspam | Unauthorized connection attempt from IP address 223.206.245.83 on Port 445(SMB) |
2019-11-28 06:37:23 |
| 96.19.3.46 | attack | 2019-11-27T16:40:36.917877stark.klein-stark.info sshd\[14217\]: Invalid user backup from 96.19.3.46 port 44368 2019-11-27T16:40:36.926134stark.klein-stark.info sshd\[14217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96-19-96-19-3-46.cpe.sparklight.net 2019-11-27T16:40:39.601956stark.klein-stark.info sshd\[14217\]: Failed password for invalid user backup from 96.19.3.46 port 44368 ssh2 ... |
2019-11-28 06:27:58 |
| 51.75.195.25 | attackspam | SSH Brute Force |
2019-11-28 06:26:46 |
| 178.176.19.90 | attack | $f2bV_matches |
2019-11-28 06:23:52 |
| 91.219.140.168 | attackspambots | Port 1433 Scan |
2019-11-28 06:35:16 |