城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.224.83.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12562
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.224.83.168. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 235 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 22:45:34 CST 2025
;; MSG SIZE rcvd: 107
Host 168.83.224.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 168.83.224.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 195.9.216.162 | attackbotsspam | Unauthorized connection attempt from IP address 195.9.216.162 on Port 445(SMB) |
2019-11-06 05:46:35 |
| 222.186.175.217 | attackspambots | Nov 6 00:37:05 server sshd\[16156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217 user=root Nov 6 00:37:07 server sshd\[16156\]: Failed password for root from 222.186.175.217 port 26606 ssh2 Nov 6 00:37:11 server sshd\[16156\]: Failed password for root from 222.186.175.217 port 26606 ssh2 Nov 6 00:37:15 server sshd\[16156\]: Failed password for root from 222.186.175.217 port 26606 ssh2 Nov 6 00:37:19 server sshd\[16156\]: Failed password for root from 222.186.175.217 port 26606 ssh2 ... |
2019-11-06 05:52:24 |
| 94.25.60.71 | attackspambots | Unauthorized connection attempt from IP address 94.25.60.71 on Port 445(SMB) |
2019-11-06 05:26:01 |
| 170.247.112.226 | attackspambots | postfix (unknown user, SPF fail or relay access denied) |
2019-11-06 05:32:00 |
| 37.187.126.17 | attack | Honeypot hit, critical abuseConfidenceScore, incoming Traffic from this IP |
2019-11-06 05:36:14 |
| 62.20.62.211 | attackbotsspam | ssh brute force |
2019-11-06 05:51:57 |
| 220.247.174.14 | attackbotsspam | Nov 5 21:32:28 server sshd\[3272\]: Invalid user ftpuser from 220.247.174.14 Nov 5 21:32:28 server sshd\[3272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.174.14 Nov 5 21:32:30 server sshd\[3272\]: Failed password for invalid user ftpuser from 220.247.174.14 port 54418 ssh2 Nov 5 21:44:22 server sshd\[6018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.174.14 user=root Nov 5 21:44:24 server sshd\[6018\]: Failed password for root from 220.247.174.14 port 47446 ssh2 ... |
2019-11-06 05:46:23 |
| 218.166.162.42 | attackspambots | Unauthorized connection attempt from IP address 218.166.162.42 on Port 445(SMB) |
2019-11-06 05:49:02 |
| 117.215.247.157 | attack | Unauthorized connection attempt from IP address 117.215.247.157 on Port 445(SMB) |
2019-11-06 05:40:35 |
| 49.88.112.111 | attack | Nov 6 02:38:57 gw1 sshd[7321]: Failed password for root from 49.88.112.111 port 38061 ssh2 Nov 6 02:38:59 gw1 sshd[7321]: Failed password for root from 49.88.112.111 port 38061 ssh2 ... |
2019-11-06 05:47:42 |
| 45.71.75.69 | attack | Unauthorized connection attempt from IP address 45.71.75.69 on Port 445(SMB) |
2019-11-06 05:30:16 |
| 201.212.6.97 | attackbotsspam | Unauthorized connection attempt from IP address 201.212.6.97 on Port 445(SMB) |
2019-11-06 05:55:21 |
| 222.64.90.69 | attack | Nov 5 12:29:10 2 sshd[21159]: reverse mapping checking getaddrinfo for 69.90.64.222.broad.xw.sh.dynamic.163data.com.cn [222.64.90.69] failed - POSSIBLE BREAK-IN ATTEMPT! Nov 5 12:33:20 2 sshd[21475]: reverse mapping checking getaddrinfo for 69.90.64.222.broad.xw.sh.dynamic.163data.com.cn [222.64.90.69] failed - POSSIBLE BREAK-IN ATTEMPT! Nov 5 12:37:23 2 sshd[21763]: reverse mapping checking getaddrinfo for 69.90.64.222.broad.xw.sh.dynamic.163data.com.cn [222.64.90.69] failed - POSSIBLE BREAK-IN ATTEMPT! Nov 5 12:41:29 2 sshd[22080]: reverse mapping checking getaddrinfo for 69.90.64.222.broad.xw.sh.dynamic.163data.com.cn [222.64.90.69] failed - POSSIBLE BREAK-IN ATTEMPT! Nov 5 12:54:00 2 sshd[23018]: reverse mapping checking getaddrinfo for 69.90.64.222.broad.xw.sh.dynamic.163data.com.cn [222.64.90.69] failed - POSSIBLE BREAK-IN A |
2019-11-06 05:32:42 |
| 171.25.249.254 | attack | Unauthorized connection attempt from IP address 171.25.249.254 on Port 445(SMB) |
2019-11-06 05:38:21 |
| 73.169.134.184 | attack | Telnet brute force and port scan |
2019-11-06 05:54:29 |