城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.216.63.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57819
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.216.63.163. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 03:09:11 CST 2025
;; MSG SIZE rcvd: 107
Host 163.63.216.140.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 163.63.216.140.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 199.195.249.6 | attackspambots | Nov 17 06:25:51 *** sshd[643]: Invalid user nakaso from 199.195.249.6 |
2019-11-17 17:37:50 |
| 106.13.223.19 | attack | Failed password for invalid user server from 106.13.223.19 port 58374 ssh2 Invalid user server from 106.13.223.19 port 36970 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.223.19 Failed password for invalid user server from 106.13.223.19 port 36970 ssh2 Invalid user hoffschildt from 106.13.223.19 port 43798 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.223.19 |
2019-11-17 17:45:58 |
| 137.59.148.201 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-17 18:02:11 |
| 119.75.238.24 | attackspam | Automatic report - XMLRPC Attack |
2019-11-17 18:16:54 |
| 14.139.231.130 | attackspam | Nov 17 08:48:40 ns41 sshd[12491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.231.130 |
2019-11-17 17:53:29 |
| 89.34.25.245 | attack | Automatic report - XMLRPC Attack |
2019-11-17 17:42:24 |
| 182.73.245.70 | attack | F2B jail: sshd. Time: 2019-11-17 09:08:13, Reported by: VKReport |
2019-11-17 18:18:37 |
| 154.205.132.157 | attackspam | SASL Brute Force |
2019-11-17 17:44:41 |
| 116.86.149.43 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-17 18:10:50 |
| 106.13.110.74 | attackspambots | Nov 17 09:34:39 sso sshd[29741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.110.74 Nov 17 09:34:41 sso sshd[29741]: Failed password for invalid user johannes from 106.13.110.74 port 38790 ssh2 ... |
2019-11-17 18:01:22 |
| 185.176.27.178 | attackbots | Nov 17 10:43:16 h2177944 kernel: \[6859261.667784\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.178 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=19016 PROTO=TCP SPT=45871 DPT=55314 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 17 10:43:40 h2177944 kernel: \[6859285.251010\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.178 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=40948 PROTO=TCP SPT=45871 DPT=33979 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 17 10:43:55 h2177944 kernel: \[6859300.525184\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.178 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=14517 PROTO=TCP SPT=45871 DPT=7941 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 17 10:46:06 h2177944 kernel: \[6859431.733785\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.178 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=48453 PROTO=TCP SPT=45871 DPT=48900 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 17 10:49:46 h2177944 kernel: \[6859651.702754\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.176.27.178 DST=85.2 |
2019-11-17 17:51:54 |
| 182.182.221.31 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/182.182.221.31/ PK - 1H : (42) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : PK NAME ASN : ASN45595 IP : 182.182.221.31 CIDR : 182.182.192.0/18 PREFIX COUNT : 719 UNIQUE IP COUNT : 3781376 ATTACKS DETECTED ASN45595 : 1H - 2 3H - 4 6H - 8 12H - 11 24H - 32 DateTime : 2019-11-17 07:25:30 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-17 17:50:00 |
| 175.126.38.26 | attackspam | Nov 16 21:35:37 wbs sshd\[22049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.38.26 user=root Nov 16 21:35:38 wbs sshd\[22049\]: Failed password for root from 175.126.38.26 port 45824 ssh2 Nov 16 21:40:25 wbs sshd\[22559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.38.26 user=root Nov 16 21:40:27 wbs sshd\[22559\]: Failed password for root from 175.126.38.26 port 53888 ssh2 Nov 16 21:45:21 wbs sshd\[22944\]: Invalid user skarpenes from 175.126.38.26 |
2019-11-17 18:06:12 |
| 96.95.248.97 | attackspam | *Port Scan* detected from 96.95.248.97 (US/United States/96-95-248-97-static.hfc.comcastbusiness.net). 4 hits in the last 80 seconds |
2019-11-17 18:10:15 |
| 76.67.28.24 | attackbots | Automatic report - Port Scan Attack |
2019-11-17 18:06:26 |