城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.91.10.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9562
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.91.10.100.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:21:30 CST 2022
;; MSG SIZE  rcvd: 106
        b';; connection timed out; no servers could be reached
'
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
100.10.91.145.in-addr.arpa	name = www.hszuid.eu.
100.10.91.145.in-addr.arpa	name = www.zuiduniversity.eu.
100.10.91.145.in-addr.arpa	name = zuyduniversity.eu.
100.10.91.145.in-addr.arpa	name = socialwork.hszuyd.nl.
100.10.91.145.in-addr.arpa	name = zuyd-university.eu.
100.10.91.145.in-addr.arpa	name = www.hogeschoolzuid.nl.
100.10.91.145.in-addr.arpa	name = hogeschoolzuyd.nl.
100.10.91.145.in-addr.arpa	name = www.hsl.nl.
100.10.91.145.in-addr.arpa	name = hsl.nl.
100.10.91.145.in-addr.arpa	name = hszuyd.nl.
100.10.91.145.in-addr.arpa	name = www.zuydweb.nl.
100.10.91.145.in-addr.arpa	name = www.hogeschoolzuyd.nl.
100.10.91.145.in-addr.arpa	name = zuiduniversity.eu.
100.10.91.145.in-addr.arpa	name = zuid-university.eu.
100.10.91.145.in-addr.arpa	name = www.hszuydweb.nl.
100.10.91.145.in-addr.arpa	name = www.hslz.nl.
100.10.91.145.in-addr.arpa	name = www.zuyd-university.nl.
100.10.91.145.in-addr.arpa	name = pabo.zuyd.nl.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 144.172.70.198 | attackbots | fail2ban  | 
                    2019-12-25 13:37:01 | 
| 183.88.47.3 | attack | Unauthorized connection attempt detected from IP address 183.88.47.3 to port 445  | 
                    2019-12-25 13:56:46 | 
| 192.99.70.208 | attack | $f2bV_matches  | 
                    2019-12-25 13:47:42 | 
| 175.213.132.56 | attack | postfix (unknown user, SPF fail or relay access denied)  | 
                    2019-12-25 13:51:01 | 
| 177.22.123.74 | attackspambots | Automatic report - Port Scan Attack  | 
                    2019-12-25 13:43:26 | 
| 79.120.60.206 | attackspambots | firewall-block, port(s): 4589/tcp  | 
                    2019-12-25 13:53:35 | 
| 222.186.175.154 | attackspam | Unauthorized access to SSH at 25/Dec/2019:05:43:22 +0000. Received: (SSH-2.0-PuTTY)  | 
                    2019-12-25 13:46:58 | 
| 222.186.175.161 | attack | Dec 25 06:53:53 ns381471 sshd[23643]: Failed password for root from 222.186.175.161 port 15908 ssh2 Dec 25 06:54:09 ns381471 sshd[23643]: error: maximum authentication attempts exceeded for root from 222.186.175.161 port 15908 ssh2 [preauth]  | 
                    2019-12-25 13:59:58 | 
| 101.78.209.39 | attackbots | Dec 25 05:34:52 zeus sshd[994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39 Dec 25 05:34:54 zeus sshd[994]: Failed password for invalid user roy from 101.78.209.39 port 42243 ssh2 Dec 25 05:37:30 zeus sshd[1062]: Failed password for root from 101.78.209.39 port 56499 ssh2  | 
                    2019-12-25 13:52:27 | 
| 62.122.201.241 | attackspambots | postfix  | 
                    2019-12-25 13:55:34 | 
| 49.52.44.163 | attackspam | Dec 24 23:57:14 Tower sshd[18618]: Connection from 49.52.44.163 port 42771 on 192.168.10.220 port 22 Dec 24 23:57:15 Tower sshd[18618]: Failed password for root from 49.52.44.163 port 42771 ssh2 Dec 24 23:57:16 Tower sshd[18618]: Connection closed by authenticating user root 49.52.44.163 port 42771 [preauth]  | 
                    2019-12-25 13:41:14 | 
| 37.1.218.185 | attack | 12/24/2019-23:57:42.152000 37.1.218.185 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2019-12-25 13:30:26 | 
| 80.82.77.245 | attackbotsspam | UTC: 2019-12-24 pkts: 8 ports(udp): 19, 120, 136, 158, 515, 631, 997, 1022  | 
                    2019-12-25 13:59:18 | 
| 51.83.75.56 | attackspambots | Dec 25 05:52:50 Invalid user drughut from 51.83.75.56 port 47938  | 
                    2019-12-25 13:57:32 | 
| 61.164.248.187 | attackbots | Dec 25 05:57:26 [host] sshd[29358]: Invalid user baoffice from 61.164.248.187 Dec 25 05:57:26 [host] sshd[29358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.164.248.187 Dec 25 05:57:28 [host] sshd[29358]: Failed password for invalid user baoffice from 61.164.248.187 port 57777 ssh2  | 
                    2019-12-25 13:35:52 |