城市(city): unknown
省份(region): unknown
国家(country): France
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.132.138.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.132.138.91. IN A
;; AUTHORITY SECTION:
. 594 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:43:44 CST 2022
;; MSG SIZE rcvd: 107
91.138.132.164.in-addr.arpa domain name pointer ip91.ip-164-132-138.eu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
91.138.132.164.in-addr.arpa name = ip91.ip-164-132-138.eu.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 182.75.82.54 | attackspam | 445/tcp 445/tcp [2019-07-03/08-30]2pkt |
2019-08-30 18:56:06 |
| 165.227.39.71 | attackbotsspam | Aug 30 11:33:08 vps691689 sshd[19959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.39.71 Aug 30 11:33:10 vps691689 sshd[19959]: Failed password for invalid user wq from 165.227.39.71 port 54128 ssh2 ... |
2019-08-30 17:56:44 |
| 35.202.27.205 | attackbotsspam | Aug 30 08:30:06 meumeu sshd[24042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.202.27.205 Aug 30 08:30:08 meumeu sshd[24042]: Failed password for invalid user sonnenschein from 35.202.27.205 port 49170 ssh2 Aug 30 08:34:45 meumeu sshd[24584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.202.27.205 ... |
2019-08-30 19:05:17 |
| 182.31.242.36 | attackspambots | Aug 30 07:45:00 [host] sshd[7984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.31.242.36 user=root Aug 30 07:45:02 [host] sshd[7984]: Failed password for root from 182.31.242.36 port 59617 ssh2 Aug 30 07:45:04 [host] sshd[7984]: Failed password for root from 182.31.242.36 port 59617 ssh2 |
2019-08-30 17:50:26 |
| 182.177.175.165 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-08-30 18:56:36 |
| 139.199.158.14 | attackspambots | Aug 30 08:35:09 vps691689 sshd[16418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.158.14 Aug 30 08:35:12 vps691689 sshd[16418]: Failed password for invalid user saned from 139.199.158.14 port 38238 ssh2 ... |
2019-08-30 19:13:47 |
| 49.51.243.75 | attack | Aug 30 07:05:53 plusreed sshd[16856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.243.75 user=mysql Aug 30 07:05:55 plusreed sshd[16856]: Failed password for mysql from 49.51.243.75 port 45030 ssh2 ... |
2019-08-30 19:16:56 |
| 201.242.154.202 | attackspam | Unauthorized connection attempt from IP address 201.242.154.202 on Port 445(SMB) |
2019-08-30 19:01:13 |
| 91.206.15.246 | attack | Aug 30 09:45:54 mail kernel: [2239970.217615] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=91.206.15.246 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=2468 PROTO=TCP SPT=52885 DPT=19964 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 30 09:46:32 mail kernel: [2240008.098483] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=91.206.15.246 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=48306 PROTO=TCP SPT=52885 DPT=5331 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 30 09:48:34 mail kernel: [2240130.542592] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=91.206.15.246 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=50928 PROTO=TCP SPT=52885 DPT=30280 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 30 09:50:24 mail kernel: [2240240.647582] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=91.206.15.246 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=976 PROTO=TCP SPT=52885 DPT=55110 WINDOW=1024 RES=0x00 SYN |
2019-08-30 18:51:57 |
| 193.171.202.150 | attackspambots | Aug 29 20:01:09 lcdev sshd\[10096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor2r.ins.tor.net.eu.org user=root Aug 29 20:01:11 lcdev sshd\[10096\]: Failed password for root from 193.171.202.150 port 46475 ssh2 Aug 29 20:01:14 lcdev sshd\[10096\]: Failed password for root from 193.171.202.150 port 46475 ssh2 Aug 29 20:01:17 lcdev sshd\[10096\]: Failed password for root from 193.171.202.150 port 46475 ssh2 Aug 29 20:01:19 lcdev sshd\[10096\]: Failed password for root from 193.171.202.150 port 46475 ssh2 |
2019-08-30 17:55:39 |
| 157.230.230.181 | attackbotsspam | Aug 30 10:14:49 lnxweb61 sshd[26301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.230.181 |
2019-08-30 18:47:24 |
| 31.14.142.109 | attackbotsspam | Aug 30 05:34:39 dallas01 sshd[27801]: Failed password for root from 31.14.142.109 port 50971 ssh2 Aug 30 05:40:29 dallas01 sshd[29074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.14.142.109 Aug 30 05:40:31 dallas01 sshd[29074]: Failed password for invalid user db2fenc1 from 31.14.142.109 port 53742 ssh2 |
2019-08-30 18:44:15 |
| 1.203.115.140 | attackbotsspam | Aug 30 09:45:28 ArkNodeAT sshd\[27532\]: Invalid user ts3server from 1.203.115.140 Aug 30 09:45:28 ArkNodeAT sshd\[27532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.140 Aug 30 09:45:30 ArkNodeAT sshd\[27532\]: Failed password for invalid user ts3server from 1.203.115.140 port 53922 ssh2 |
2019-08-30 19:00:50 |
| 61.175.134.190 | attackspambots | Aug 30 11:35:03 vps647732 sshd[5476]: Failed password for root from 61.175.134.190 port 42533 ssh2 Aug 30 11:41:41 vps647732 sshd[5651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.134.190 ... |
2019-08-30 17:49:17 |
| 207.154.230.34 | attackbots | Aug 30 11:49:16 lnxmail61 sshd[16309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.230.34 |
2019-08-30 18:27:33 |