城市(city): unknown
省份(region): unknown
国家(country): Republic of China (ROC)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.124.13.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.124.13.105. IN A
;; AUTHORITY SECTION:
. 142 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:12:47 CST 2022
;; MSG SIZE rcvd: 107
Host 105.13.124.140.in-addr.arpa not found: 2(SERVFAIL)
b';; Truncated, retrying in TCP mode.
105.13.124.140.in-addr.arpa name = www.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = photolab4640.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = ixd.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = rdhd.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = eng.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = www.eecs-aischool.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = jgcampus.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = eecs-aischool.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = news.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = www-en.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = arch1.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = anniversary.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = cttl.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = moeoiac.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = rvrc.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = secc.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = demo.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = ecolife.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = servicecenter.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = isms.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = flexiblepacking.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = service.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = build.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = future-students.
105.13.124.140.in-addr.arpa name = emo.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = clc.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = utaemba.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = dns.rpage.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = first.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = rcec.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = newsletter.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = osausr.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = ece.ntut.edu.tw.
Authoritative answers can be found from:
'
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 180.94.87.74 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 17:17:11,682 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.94.87.74) |
2019-09-12 09:52:59 |
| 188.254.0.197 | attackbotsspam | Sep 12 01:00:45 MK-Soft-VM3 sshd\[21417\]: Invalid user www from 188.254.0.197 port 52189 Sep 12 01:00:45 MK-Soft-VM3 sshd\[21417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.197 Sep 12 01:00:46 MK-Soft-VM3 sshd\[21417\]: Failed password for invalid user www from 188.254.0.197 port 52189 ssh2 ... |
2019-09-12 09:27:36 |
| 185.234.219.124 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-09-12 09:53:56 |
| 212.156.113.194 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 17:21:50,786 INFO [amun_request_handler] PortScan Detected on Port: 445 (212.156.113.194) |
2019-09-12 09:35:00 |
| 71.221.130.196 | attackspambots | v+ssh-bruteforce |
2019-09-12 09:33:38 |
| 189.240.31.34 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 17:26:08,019 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.240.31.34) |
2019-09-12 09:20:04 |
| 193.47.99.4 | attack | law firm spam, honeypot |
2019-09-12 09:52:34 |
| 112.85.42.89 | attackspambots | Sep 12 04:07:56 server sshd\[31187\]: User root from 112.85.42.89 not allowed because listed in DenyUsers Sep 12 04:07:56 server sshd\[31187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89 user=root Sep 12 04:07:58 server sshd\[31187\]: Failed password for invalid user root from 112.85.42.89 port 15033 ssh2 Sep 12 04:08:01 server sshd\[31187\]: Failed password for invalid user root from 112.85.42.89 port 15033 ssh2 Sep 12 04:08:03 server sshd\[31187\]: Failed password for invalid user root from 112.85.42.89 port 15033 ssh2 |
2019-09-12 09:11:08 |
| 79.45.209.149 | attackbotsspam | Sep 12 01:38:22 taivassalofi sshd[171340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.45.209.149 ... |
2019-09-12 09:41:54 |
| 212.174.75.38 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 19:57:21,793 INFO [shellcode_manager] (212.174.75.38) no match, writing hexdump (62fac287814c195fd321eaba9c13180c :6283) - SMB (Unknown) |
2019-09-12 09:18:07 |
| 45.221.80.249 | attackspam | Sep 11 20:51:53 lenivpn01 kernel: \[460715.063399\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.221.80.249 DST=195.201.121.15 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=16853 DF PROTO=TCP SPT=36883 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0 Sep 11 20:51:56 lenivpn01 kernel: \[460718.060026\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.221.80.249 DST=195.201.121.15 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=16854 DF PROTO=TCP SPT=36883 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0 Sep 11 20:52:02 lenivpn01 kernel: \[460724.059537\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=45.221.80.249 DST=195.201.121.15 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=16855 DF PROTO=TCP SPT=36883 DPT=23 WINDOW=5808 RES=0x00 SYN URGP=0 ... |
2019-09-12 09:12:06 |
| 159.65.8.104 | attack | Sep 11 20:33:03 aat-srv002 sshd[8173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.104 Sep 11 20:33:06 aat-srv002 sshd[8173]: Failed password for invalid user admin from 159.65.8.104 port 57542 ssh2 Sep 11 20:39:20 aat-srv002 sshd[8326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.104 Sep 11 20:39:22 aat-srv002 sshd[8326]: Failed password for invalid user cssserver from 159.65.8.104 port 32806 ssh2 ... |
2019-09-12 09:41:31 |
| 31.145.62.170 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-11 19:15:27,174 INFO [amun_request_handler] PortScan Detected on Port: 445 (31.145.62.170) |
2019-09-12 09:22:05 |
| 222.181.11.216 | attackspambots | $f2bV_matches |
2019-09-12 09:05:16 |
| 178.62.54.79 | attackbotsspam | Sep 12 03:28:00 core sshd[5536]: Invalid user user from 178.62.54.79 port 55258 Sep 12 03:28:02 core sshd[5536]: Failed password for invalid user user from 178.62.54.79 port 55258 ssh2 ... |
2019-09-12 09:35:23 |