城市(city): Merseburg
省份(region): Sachsen-Anhalt
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.205.172.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.205.172.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 04:45:35 CST 2025
;; MSG SIZE rcvd: 107
Host 29.172.205.149.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 29.172.205.149.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.34.237 | attackspam | Unauthorized connection attempt detected from IP address 142.93.34.237 to port 7338 |
2020-08-01 13:54:50 |
| 157.100.33.91 | attack | Invalid user zhangfei from 157.100.33.91 port 51204 |
2020-08-01 13:27:56 |
| 64.64.246.128 | attackbots | Tried sshing with brute force. |
2020-08-01 13:52:13 |
| 138.121.128.19 | attack | Aug 1 07:48:38 buvik sshd[7773]: Failed password for root from 138.121.128.19 port 51614 ssh2 Aug 1 07:52:14 buvik sshd[8385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.128.19 user=root Aug 1 07:52:16 buvik sshd[8385]: Failed password for root from 138.121.128.19 port 46428 ssh2 ... |
2020-08-01 13:53:51 |
| 127.0.0.1 | attackbotsspam | Test Connectivity |
2020-08-01 14:04:56 |
| 192.241.237.158 | attack | port scan and connect, tcp 990 (ftps) |
2020-08-01 13:19:27 |
| 132.232.120.145 | attackspambots | Invalid user luther from 132.232.120.145 port 48540 |
2020-08-01 13:59:16 |
| 40.68.94.141 | attackbotsspam | Invalid user hangsu from 40.68.94.141 port 43292 |
2020-08-01 13:46:08 |
| 85.209.0.6 | attackspambots | Aug 1 06:15:00 choloepus sshd[29177]: Connection closed by invalid user root 85.209.0.6 port 12698 [preauth] Aug 1 06:14:59 choloepus sshd[29178]: User root not allowed because account is locked Aug 1 06:15:00 choloepus sshd[29178]: Connection closed by invalid user root 85.209.0.6 port 12656 [preauth] ... |
2020-08-01 14:01:41 |
| 113.161.25.69 | attack | Attempted connection to port 445. |
2020-08-01 13:57:45 |
| 165.22.122.246 | attack | Aug 1 12:02:52 webhost01 sshd[6221]: Failed password for root from 165.22.122.246 port 48504 ssh2 ... |
2020-08-01 13:22:23 |
| 176.107.133.228 | attackbots | Invalid user tsuji from 176.107.133.228 port 53966 |
2020-08-01 14:11:42 |
| 176.31.31.185 | attackbotsspam | Invalid user huwenp from 176.31.31.185 port 41941 |
2020-08-01 13:49:44 |
| 59.120.154.13 | attackspambots | SMB Server BruteForce Attack |
2020-08-01 13:56:16 |
| 52.31.167.234 | attackbots | 01.08.2020 05:56:35 - Wordpress fail Detected by ELinOX-ALM |
2020-08-01 13:25:54 |