城市(city): Wellington
省份(region): Western Cape
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.250.134.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53510
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.250.134.130. IN A
;; AUTHORITY SECTION:
. 496 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020021701 1800 900 604800 86400
;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 07:02:23 CST 2020
;; MSG SIZE rcvd: 119
130.134.250.196.in-addr.arpa domain name pointer 196-250-134-130.ibits.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
130.134.250.196.in-addr.arpa name = 196-250-134-130.ibits.co.za.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
150.242.18.132 | attackbotsspam | DATE:2019-11-07 14:00:54, IP:150.242.18.132, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-11-07 21:46:55 |
91.122.236.183 | attackspambots | Chat Spam |
2019-11-07 21:27:11 |
61.153.209.244 | attack | SSH Brute-Force reported by Fail2Ban |
2019-11-07 21:45:05 |
154.85.39.58 | attackspam | sshd jail - ssh hack attempt |
2019-11-07 22:01:15 |
85.194.102.234 | attackbots | firewall-block, port(s): 445/tcp |
2019-11-07 21:41:24 |
46.151.151.211 | attackspam | [portscan] Port scan |
2019-11-07 21:59:34 |
114.67.109.20 | attack | ssh failed login |
2019-11-07 22:01:57 |
106.75.85.37 | attack | " " |
2019-11-07 21:38:36 |
154.72.193.254 | attack | firewall-block, port(s): 1433/tcp |
2019-11-07 21:37:45 |
132.247.16.76 | attackbots | Nov 7 13:16:01 minden010 sshd[28216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.247.16.76 Nov 7 13:16:02 minden010 sshd[28216]: Failed password for invalid user marje from 132.247.16.76 port 55103 ssh2 Nov 7 13:24:58 minden010 sshd[29946]: Failed password for root from 132.247.16.76 port 47085 ssh2 ... |
2019-11-07 21:38:05 |
5.189.186.191 | attackbots | Unauthorized SSH login attempts |
2019-11-07 21:58:07 |
80.82.77.139 | attackspam | Oct 28 06:26:24 mail postfix/postscreen[15580]: DNSBL rank 4 for [80.82.77.139]:53414 ... |
2019-11-07 21:43:59 |
40.124.4.131 | attackbotsspam | Nov 7 14:07:00 ArkNodeAT sshd\[9398\]: Invalid user oracle from 40.124.4.131 Nov 7 14:07:00 ArkNodeAT sshd\[9398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.124.4.131 Nov 7 14:07:02 ArkNodeAT sshd\[9398\]: Failed password for invalid user oracle from 40.124.4.131 port 43792 ssh2 |
2019-11-07 21:49:04 |
54.37.204.232 | attack | " " |
2019-11-07 21:47:49 |
222.242.104.188 | attack | 2019-11-07T11:11:10.554164scmdmz1 sshd\[29526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.104.188 user=root 2019-11-07T11:11:12.512936scmdmz1 sshd\[29526\]: Failed password for root from 222.242.104.188 port 59924 ssh2 2019-11-07T11:16:01.039682scmdmz1 sshd\[29905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.104.188 user=root ... |
2019-11-07 21:24:17 |