城市(city): unknown
省份(region): unknown
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.18.138.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;185.18.138.164.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:48:08 CST 2025
;; MSG SIZE  rcvd: 107
        164.138.18.185.in-addr.arpa domain name pointer 185.18.138.164.reverse.zengenti.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
164.138.18.185.in-addr.arpa	name = 185.18.138.164.reverse.zengenti.com.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 41.139.130.215 | attackspam | Dovecot Invalid User Login Attempt.  | 
                    2020-04-25 18:02:57 | 
| 104.168.48.101 | attack | [2020-04-25 02:43:19] NOTICE[1170][C-00004fff] chan_sip.c: Call from '' (104.168.48.101:58373) to extension '00801112018982139' rejected because extension not found in context 'public'. [2020-04-25 02:43:19] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-25T02:43:19.991-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00801112018982139",SessionID="0x7f6c083c7058",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/104.168.48.101/58373",ACLName="no_extension_match" [2020-04-25 02:52:00] NOTICE[1170][C-00005012] chan_sip.c: Call from '' (104.168.48.101:61769) to extension '00901112018982139' rejected because extension not found in context 'public'. [2020-04-25 02:52:00] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-25T02:52:00.868-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00901112018982139",SessionID="0x7f6c083b5ae8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress ...  | 
                    2020-04-25 18:02:16 | 
| 122.155.204.153 | attack | Apr 24 23:47:43 NPSTNNYC01T sshd[15609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.204.153 Apr 24 23:47:44 NPSTNNYC01T sshd[15609]: Failed password for invalid user tweety from 122.155.204.153 port 59644 ssh2 Apr 24 23:50:42 NPSTNNYC01T sshd[16040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.204.153 ...  | 
                    2020-04-25 17:57:31 | 
| 193.112.2.1 | attackbotsspam | $f2bV_matches  | 
                    2020-04-25 18:08:42 | 
| 45.248.69.27 | attackbotsspam | $f2bV_matches  | 
                    2020-04-25 18:21:07 | 
| 218.253.69.134 | attackspam | leo_www  | 
                    2020-04-25 17:49:12 | 
| 222.186.180.223 | attack | 2020-04-25T10:16:31.845697shield sshd\[24240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223 user=root 2020-04-25T10:16:34.122135shield sshd\[24240\]: Failed password for root from 222.186.180.223 port 21534 ssh2 2020-04-25T10:16:37.523791shield sshd\[24240\]: Failed password for root from 222.186.180.223 port 21534 ssh2 2020-04-25T10:16:40.668251shield sshd\[24240\]: Failed password for root from 222.186.180.223 port 21534 ssh2 2020-04-25T10:16:43.558682shield sshd\[24240\]: Failed password for root from 222.186.180.223 port 21534 ssh2  | 
                    2020-04-25 18:25:28 | 
| 202.157.176.39 | attackspambots | trying to access non-authorized port  | 
                    2020-04-25 18:11:03 | 
| 139.59.135.84 | attackbotsspam | Apr 25 07:31:18 server sshd[15378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.135.84 Apr 25 07:31:20 server sshd[15378]: Failed password for invalid user elsearch from 139.59.135.84 port 56112 ssh2 Apr 25 07:35:48 server sshd[15805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.135.84 ...  | 
                    2020-04-25 17:58:39 | 
| 185.175.93.18 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 37100 proto: TCP cat: Misc Attack  | 
                    2020-04-25 18:13:46 | 
| 186.5.75.243 | attackbots | Unauthorized connection attempt detected from IP address 186.5.75.243 to port 8089  | 
                    2020-04-25 18:13:21 | 
| 37.49.226.161 | attackbotsspam | Apr 25 04:37:49 vestacp sshd[430]: Did not receive identification string from 37.49.226.161 port 55880 Apr 25 04:37:54 vestacp sshd[431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.161 user=r.r Apr 25 04:37:55 vestacp sshd[431]: Failed password for r.r from 37.49.226.161 port 46334 ssh2 Apr 25 04:37:57 vestacp sshd[431]: Received disconnect from 37.49.226.161 port 46334:11: Normal Shutdown, Thank you for playing [preauth] Apr 25 04:37:57 vestacp sshd[431]: Disconnected from authenticating user r.r 37.49.226.161 port 46334 [preauth] Apr 25 04:38:07 vestacp sshd[449]: Invalid user admin from 37.49.226.161 port 43820 Apr 25 04:38:07 vestacp sshd[449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.226.161 Apr 25 04:38:09 vestacp sshd[449]: Failed password for invalid user admin from 37.49.226.161 port 43820 ssh2 Apr 25 04:38:09 vestacp sshd[449]: Received disconnect from........ -------------------------------  | 
                    2020-04-25 18:10:30 | 
| 118.69.157.179 | attack | Unauthorized connection attempt from IP address 118.69.157.179 on Port 445(SMB)  | 
                    2020-04-25 18:03:50 | 
| 188.131.239.119 | attack | Invalid user rg from 188.131.239.119 port 36352  | 
                    2020-04-25 18:18:51 | 
| 132.232.110.111 | attack | Invalid user test from 132.232.110.111 port 41520  | 
                    2020-04-25 17:50:57 |