城市(city): unknown
省份(region): unknown
国家(country): Sweden
运营商(isp): Telia
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.218.75.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.218.75.51. IN A
;; AUTHORITY SECTION:
. 574 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020041901 1800 900 604800 86400
;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 20 06:56:48 CST 2020
;; MSG SIZE rcvd: 117
51.75.218.194.in-addr.arpa domain name pointer 194-218-75-51.customer.telia.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
51.75.218.194.in-addr.arpa name = 194-218-75-51.customer.telia.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.199.202.206 | attackbots | "SSH brute force auth login attempt." |
2020-01-23 21:24:57 |
| 59.108.32.55 | attackspambots | "SSH brute force auth login attempt." |
2020-01-23 21:39:15 |
| 195.84.49.20 | attackbotsspam | Invalid user wc from 195.84.49.20 port 34816 |
2020-01-23 21:30:25 |
| 79.137.73.253 | attack | Jan 23 15:21:34 lukav-desktop sshd\[918\]: Invalid user ian from 79.137.73.253 Jan 23 15:21:34 lukav-desktop sshd\[918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.73.253 Jan 23 15:21:37 lukav-desktop sshd\[918\]: Failed password for invalid user ian from 79.137.73.253 port 37154 ssh2 Jan 23 15:23:47 lukav-desktop sshd\[10519\]: Invalid user test from 79.137.73.253 Jan 23 15:23:47 lukav-desktop sshd\[10519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.73.253 |
2020-01-23 21:52:58 |
| 47.50.246.114 | attack | Invalid user zabbix from 47.50.246.114 port 39836 |
2020-01-23 21:39:57 |
| 107.172.46.12 | attackbots | Unauthorized connection attempt detected from IP address 107.172.46.12 to port 2220 [J] |
2020-01-23 21:57:57 |
| 14.186.14.164 | attackbots | "SMTP brute force auth login attempt." |
2020-01-23 21:43:06 |
| 139.59.18.215 | attackspam | "SSH brute force auth login attempt." |
2020-01-23 21:20:54 |
| 186.183.226.103 | attackbots | Unauthorized connection attempt detected from IP address 186.183.226.103 to port 23 [J] |
2020-01-23 21:55:39 |
| 152.136.72.17 | attack | Jan 23 13:58:30 lnxded63 sshd[10565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.72.17 |
2020-01-23 21:46:18 |
| 176.109.182.172 | attack | " " |
2020-01-23 21:51:03 |
| 212.64.23.30 | attackspambots | $f2bV_matches |
2020-01-23 21:41:23 |
| 49.235.88.96 | attackspam | Unauthorized connection attempt detected from IP address 49.235.88.96 to port 2220 [J] |
2020-01-23 21:36:43 |
| 116.97.45.155 | attack | "SMTP brute force auth login attempt." |
2020-01-23 21:34:44 |
| 51.38.232.93 | attackbots | "SSH brute force auth login attempt." |
2020-01-23 21:21:51 |