城市(city): unknown
省份(region): unknown
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.207.254.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.207.254.104. IN A
;; AUTHORITY SECTION:
. 560 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010100 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 02 00:30:28 CST 2022
;; MSG SIZE rcvd: 108
104.254.207.194.in-addr.arpa domain name pointer 194-207-254-104.static.kc.net.uk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
104.254.207.194.in-addr.arpa name = 194-207-254-104.static.kc.net.uk.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 27.34.68.117 | attackbotsspam | Chat Spam |
2019-09-06 10:56:08 |
| 181.23.71.107 | attackspambots | Unauthorized connection attempt from IP address 181.23.71.107 on Port 445(SMB) |
2019-09-06 10:53:34 |
| 220.177.111.28 | attackspambots | Unauthorised access (Sep 6) SRC=220.177.111.28 LEN=40 TOS=0x10 PREC=0x40 TTL=48 ID=14843 TCP DPT=8080 WINDOW=34852 SYN |
2019-09-06 10:28:09 |
| 118.70.81.87 | attackspam | Unauthorized connection attempt from IP address 118.70.81.87 on Port 445(SMB) |
2019-09-06 10:38:12 |
| 119.196.83.22 | attack | Sep 6 02:59:04 XXX sshd[18922]: Invalid user ofsaa from 119.196.83.22 port 58762 |
2019-09-06 10:42:32 |
| 190.61.61.10 | attack | Unauthorized connection attempt from IP address 190.61.61.10 on Port 445(SMB) |
2019-09-06 11:09:22 |
| 138.68.220.196 | attackspambots | firewall-block, port(s): 27017/tcp |
2019-09-06 10:34:09 |
| 58.150.46.6 | attack | Sep 5 23:27:41 hb sshd\[13129\]: Invalid user test2 from 58.150.46.6 Sep 5 23:27:41 hb sshd\[13129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.150.46.6 Sep 5 23:27:44 hb sshd\[13129\]: Failed password for invalid user test2 from 58.150.46.6 port 42258 ssh2 Sep 5 23:32:12 hb sshd\[13484\]: Invalid user vbox123 from 58.150.46.6 Sep 5 23:32:12 hb sshd\[13484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.150.46.6 |
2019-09-06 10:31:28 |
| 159.192.183.86 | attackspam | Unauthorized connection attempt from IP address 159.192.183.86 on Port 445(SMB) |
2019-09-06 10:46:13 |
| 181.28.94.205 | attack | Sep 5 16:34:30 web9 sshd\[13386\]: Invalid user bots from 181.28.94.205 Sep 5 16:34:30 web9 sshd\[13386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.28.94.205 Sep 5 16:34:31 web9 sshd\[13386\]: Failed password for invalid user bots from 181.28.94.205 port 52294 ssh2 Sep 5 16:39:36 web9 sshd\[14409\]: Invalid user test from 181.28.94.205 Sep 5 16:39:36 web9 sshd\[14409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.28.94.205 |
2019-09-06 10:52:43 |
| 171.43.54.233 | attackspam | 22/tcp [2019-09-05]1pkt |
2019-09-06 10:59:09 |
| 104.248.30.249 | attackbotsspam | Sep 5 22:34:49 ny01 sshd[17352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.30.249 Sep 5 22:34:51 ny01 sshd[17352]: Failed password for invalid user ubuntu from 104.248.30.249 port 38848 ssh2 Sep 5 22:38:25 ny01 sshd[18159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.30.249 |
2019-09-06 10:42:08 |
| 142.0.70.36 | attackspambots | Unauthorized connection attempt from IP address 142.0.70.36 on Port 445(SMB) |
2019-09-06 10:40:49 |
| 190.64.68.178 | attackbots | Sep 6 04:29:11 ns41 sshd[26290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178 |
2019-09-06 10:36:20 |
| 129.213.96.241 | attackbotsspam | Sep 5 16:55:04 php1 sshd\[6380\]: Invalid user admin from 129.213.96.241 Sep 5 16:55:04 php1 sshd\[6380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.96.241 Sep 5 16:55:06 php1 sshd\[6380\]: Failed password for invalid user admin from 129.213.96.241 port 33358 ssh2 Sep 5 16:59:20 php1 sshd\[6749\]: Invalid user mc3 from 129.213.96.241 Sep 5 16:59:20 php1 sshd\[6749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.96.241 |
2019-09-06 11:11:09 |