城市(city): unknown
省份(region): unknown
国家(country): Colombia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 179.14.252.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29116
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;179.14.252.135. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:33:58 CST 2025
;; MSG SIZE rcvd: 107
135.252.14.179.in-addr.arpa domain name pointer Dinamic-Tigo-179-14-252-135.tigo.com.co.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
135.252.14.179.in-addr.arpa name = Dinamic-Tigo-179-14-252-135.tigo.com.co.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.86.238.53 | attackspam | Unauthorized connection attempt from IP address 80.86.238.53 on Port 445(SMB) |
2020-01-17 01:09:19 |
| 84.1.30.70 | attackspambots | ssh brute force |
2020-01-17 00:45:03 |
| 212.119.65.133 | attackspambots | Jan 16 14:01:14 debian-2gb-nbg1-2 kernel: \[1438969.808353\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=212.119.65.133 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=65174 PROTO=TCP SPT=56136 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-17 00:43:40 |
| 188.170.80.104 | attackbots | Unauthorized connection attempt detected from IP address 188.170.80.104 to port 445 |
2020-01-17 01:02:03 |
| 132.232.112.217 | attackspambots | 2020-01-16T14:13:04.531829shield sshd\[8458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.217 user=root 2020-01-16T14:13:06.077451shield sshd\[8458\]: Failed password for root from 132.232.112.217 port 60550 ssh2 2020-01-16T14:14:21.157566shield sshd\[8990\]: Invalid user uftp from 132.232.112.217 port 39548 2020-01-16T14:14:21.162029shield sshd\[8990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.217 2020-01-16T14:14:23.605700shield sshd\[8990\]: Failed password for invalid user uftp from 132.232.112.217 port 39548 ssh2 |
2020-01-17 00:26:21 |
| 222.186.175.150 | attackbots | Jan 16 13:45:05 firewall sshd[24196]: Failed password for root from 222.186.175.150 port 24880 ssh2 Jan 16 13:45:08 firewall sshd[24196]: Failed password for root from 222.186.175.150 port 24880 ssh2 Jan 16 13:45:11 firewall sshd[24196]: Failed password for root from 222.186.175.150 port 24880 ssh2 ... |
2020-01-17 00:45:53 |
| 89.221.192.19 | attack | Unauthorized connection attempt from IP address 89.221.192.19 on Port 445(SMB) |
2020-01-17 00:39:52 |
| 61.191.56.231 | attackbots | Unauthorized connection attempt from IP address 61.191.56.231 on Port 3306(MYSQL) |
2020-01-17 00:32:51 |
| 222.186.175.182 | attackspam | Jan 16 17:20:37 MK-Soft-VM7 sshd[21244]: Failed password for root from 222.186.175.182 port 54532 ssh2 Jan 16 17:20:40 MK-Soft-VM7 sshd[21244]: Failed password for root from 222.186.175.182 port 54532 ssh2 ... |
2020-01-17 00:24:34 |
| 156.210.196.230 | attackbots | Unauthorized connection attempt from IP address 156.210.196.230 on Port 445(SMB) |
2020-01-17 01:02:38 |
| 91.243.93.207 | attackbots | B: Magento admin pass test (wrong country) |
2020-01-17 00:37:02 |
| 218.92.0.178 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178 user=root Failed password for root from 218.92.0.178 port 51676 ssh2 Failed password for root from 218.92.0.178 port 51676 ssh2 Failed password for root from 218.92.0.178 port 51676 ssh2 Failed password for root from 218.92.0.178 port 51676 ssh2 |
2020-01-17 00:33:53 |
| 85.97.195.129 | attack | " " |
2020-01-17 01:00:52 |
| 113.181.2.103 | attackspambots | Unauthorized connection attempt from IP address 113.181.2.103 on Port 445(SMB) |
2020-01-17 00:27:39 |
| 186.150.202.152 | attack | Unauthorized connection attempt detected from IP address 186.150.202.152 to port 1433 [J] |
2020-01-17 00:44:40 |