城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.27.12.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;146.27.12.17.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:42:14 CST 2025
;; MSG SIZE  rcvd: 10517.12.27.146.in-addr.arpa domain name pointer non-routed-un-exposed-IP.27.146.in-addr.arpa.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
17.12.27.146.in-addr.arpa	name = non-routed-un-exposed-IP.27.146.in-addr.arpa.
Authoritative answers can be found from:| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 104.131.58.179 | attackspam | 13.05.2020 16:42:13 - Wordpress fail Detected by ELinOX-ALM | 2020-05-14 02:31:38 | 
| 196.52.43.113 | attackspam | Automatic report - Banned IP Access | 2020-05-14 02:18:40 | 
| 86.57.207.113 | attackbotsspam | Unauthorised access (May 13) SRC=86.57.207.113 LEN=52 TTL=118 ID=25257 DF TCP DPT=445 WINDOW=8192 SYN | 2020-05-14 01:58:09 | 
| 213.81.208.23 | attackbots | 213.81.208.23 - - \[13/May/2020:14:33:14 +0200\] "POST /wp-login.php HTTP/1.0" 200 2797 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 213.81.208.23 - - \[13/May/2020:14:33:22 +0200\] "POST /wp-login.php HTTP/1.0" 200 2796 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 213.81.208.23 - - \[13/May/2020:14:33:30 +0200\] "POST /wp-login.php HTTP/1.0" 200 2771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" | 2020-05-14 02:29:16 | 
| 188.163.109.153 | attackbotsspam | 3,41-01/02 [bc01/m18] PostRequest-Spammer scoring: luanda | 2020-05-14 01:57:03 | 
| 187.49.133.220 | attackspam | 2020-05-13 05:22:38 server sshd[60300]: Failed password for invalid user root from 187.49.133.220 port 33575 ssh2 | 2020-05-14 02:31:18 | 
| 34.78.176.66 | attackbots | Malicious/Probing: /util/login.aspx | 2020-05-14 02:03:19 | 
| 138.197.196.221 | attackbots | prod11 ... | 2020-05-14 02:16:47 | 
| 162.243.137.88 | attack | srv02 Mass scanning activity detected Target: 25(smtp) .. | 2020-05-14 02:07:10 | 
| 117.103.2.114 | attackspambots | May 13 16:45:16 vmd48417 sshd[21276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.103.2.114 | 2020-05-14 02:12:35 | 
| 109.244.49.2 | attack | SSH Brute-Force. Ports scanning. | 2020-05-14 02:11:12 | 
| 210.13.96.74 | attackbotsspam | [MK-Root1] Blocked by UFW | 2020-05-14 02:29:37 | 
| 14.175.142.130 | attackbots | Automatic report - Port Scan Attack | 2020-05-14 02:12:20 | 
| 158.69.170.5 | attackbots | May 13 16:45:20 ns382633 sshd\[6315\]: Invalid user ubuntu from 158.69.170.5 port 49568 May 13 16:45:20 ns382633 sshd\[6315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.170.5 May 13 16:45:22 ns382633 sshd\[6315\]: Failed password for invalid user ubuntu from 158.69.170.5 port 49568 ssh2 May 13 16:50:36 ns382633 sshd\[7346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.170.5 user=root May 13 16:50:38 ns382633 sshd\[7346\]: Failed password for root from 158.69.170.5 port 41164 ssh2 | 2020-05-14 02:37:54 | 
| 94.191.70.187 | attackspambots | IP blocked | 2020-05-14 02:13:16 |