城市(city): unknown
省份(region): unknown
国家(country): France
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.132.191.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56732
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.132.191.54. IN A
;; AUTHORITY SECTION:
. 279 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:23:54 CST 2022
;; MSG SIZE rcvd: 107
54.191.132.164.in-addr.arpa domain name pointer ip54.ip-164-132-191.eu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.191.132.164.in-addr.arpa name = ip54.ip-164-132-191.eu.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 165.22.209.164 | spam | Looks like spam |
2019-09-12 00:18:38 |
| 207.46.13.53 | attackbots | Automatic report - Banned IP Access |
2019-09-11 23:44:25 |
| 193.32.163.44 | attack | Port scan |
2019-09-12 00:56:49 |
| 185.43.209.203 | attack | Sep 10 17:51:25 lenivpn01 kernel: \[363490.543736\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.43.209.203 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=TCP SPT=53888 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0 Sep 10 22:08:57 lenivpn01 kernel: \[378941.910288\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.43.209.203 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=TCP SPT=58391 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0 Sep 11 00:49:06 lenivpn01 kernel: \[388550.450612\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.43.209.203 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=TCP SPT=41792 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0 Sep 11 05:19:44 lenivpn01 kernel: \[404788.068085\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.43.209.203 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID ... |
2019-09-12 00:10:36 |
| 49.234.18.158 | attackbotsspam | Sep 11 05:41:26 web9 sshd\[2735\]: Invalid user test1 from 49.234.18.158 Sep 11 05:41:26 web9 sshd\[2735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 Sep 11 05:41:27 web9 sshd\[2735\]: Failed password for invalid user test1 from 49.234.18.158 port 56200 ssh2 Sep 11 05:46:57 web9 sshd\[3748\]: Invalid user sinusbot from 49.234.18.158 Sep 11 05:46:57 web9 sshd\[3748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 |
2019-09-11 23:54:43 |
| 77.247.108.119 | attack | 5038/tcp 5038/tcp 5038/tcp... [2019-07-11/09-11]1685pkt,1pt.(tcp) |
2019-09-12 01:33:33 |
| 183.129.160.229 | attackspam | Sep 10 17:37:13 lenivpn01 kernel: \[362637.926426\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=183.129.160.229 DST=195.201.121.15 LEN=44 TOS=0x00 PREC=0x00 TTL=109 ID=34115 PROTO=TCP SPT=36548 DPT=48202 WINDOW=29200 RES=0x00 SYN URGP=0 Sep 10 19:02:38 lenivpn01 kernel: \[367763.090103\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=183.129.160.229 DST=195.201.121.15 LEN=44 TOS=0x00 PREC=0x00 TTL=109 ID=60586 PROTO=TCP SPT=34262 DPT=3966 WINDOW=29200 RES=0x00 SYN URGP=0 Sep 10 19:31:45 lenivpn01 kernel: \[369509.605184\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=183.129.160.229 DST=195.201.121.15 LEN=44 TOS=0x00 PREC=0x00 TTL=108 ID=53418 PROTO=TCP SPT=6138 DPT=17018 WINDOW=29200 RES=0x00 SYN URGP=0 Sep 10 19:32:40 lenivpn01 kernel: \[369564.922185\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=183.129.160.229 DST=195.201.121.15 LEN=44 TOS=0x00 PREC=0x00 ... |
2019-09-12 01:53:58 |
| 45.136.109.39 | attackspam | Sep 11 17:01:04 mc1 kernel: \[764629.365862\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.39 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54834 PROTO=TCP SPT=59403 DPT=7729 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 17:03:38 mc1 kernel: \[764783.347683\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.39 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=1598 PROTO=TCP SPT=59403 DPT=7747 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 17:05:24 mc1 kernel: \[764889.518580\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.39 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=5907 PROTO=TCP SPT=59403 DPT=7186 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-09-12 00:38:36 |
| 159.203.199.195 | attackbotsspam | " " |
2019-09-12 00:16:06 |
| 185.176.27.18 | attackbots | Excessive Port-Scanning |
2019-09-12 01:02:27 |
| 207.226.155.196 | attackspambots | Unauthorised access (Sep 11) SRC=207.226.155.196 LEN=40 TTL=243 ID=55254 TCP DPT=445 WINDOW=1024 SYN |
2019-09-12 00:54:29 |
| 94.102.56.181 | attackspam | Sep 10 18:34:25 lenivpn01 kernel: \[366069.807104\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=10021 PROTO=TCP SPT=55512 DPT=6281 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 18:38:04 lenivpn01 kernel: \[366289.451770\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=45618 PROTO=TCP SPT=55512 DPT=6287 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 18:54:44 lenivpn01 kernel: \[367288.503290\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=39251 PROTO=TCP SPT=55512 DPT=6299 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 20:11:37 lenivpn01 kernel: \[371902.186405\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=94.102.56.181 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID= ... |
2019-09-12 00:24:43 |
| 125.64.94.211 | attackspambots | 11.09.2019 17:01:05 Connection to port 6379 blocked by firewall |
2019-09-12 01:56:45 |
| 149.202.164.82 | attackspambots | Sep 11 11:51:56 markkoudstaal sshd[1834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 Sep 11 11:51:57 markkoudstaal sshd[1834]: Failed password for invalid user CumulusLinux! from 149.202.164.82 port 57494 ssh2 Sep 11 11:58:02 markkoudstaal sshd[2380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 |
2019-09-11 23:38:52 |
| 208.115.196.14 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: 14-196-115-208.static.reverse.lstn.net. |
2019-09-12 00:01:47 |