城市(city): unknown
省份(region): unknown
国家(country): Spain
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.140.172.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.140.172.220.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 19:18:54 CST 2025
;; MSG SIZE  rcvd: 106
        220.172.140.2.in-addr.arpa domain name pointer 220.red-2-140-172.dynamicip.rima-tde.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
220.172.140.2.in-addr.arpa	name = 220.red-2-140-172.dynamicip.rima-tde.net.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 139.199.122.96 | attack | 2019-10-06T03:55:16.325079abusebot-3.cloudsearch.cf sshd\[29155\]: Invalid user Driver@123 from 139.199.122.96 port 52557  | 
                    2019-10-06 12:16:19 | 
| 93.80.235.170 | attackspam | 1 pkts, ports: TCP:445  | 
                    2019-10-06 07:43:18 | 
| 178.128.127.171 | attackbotsspam | Oct 5 18:08:08 php1 sshd\[29767\]: Invalid user Automation-123 from 178.128.127.171 Oct 5 18:08:08 php1 sshd\[29767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.127.171 Oct 5 18:08:09 php1 sshd\[29767\]: Failed password for invalid user Automation-123 from 178.128.127.171 port 35046 ssh2 Oct 5 18:12:37 php1 sshd\[30238\]: Invalid user qwert12345 from 178.128.127.171 Oct 5 18:12:37 php1 sshd\[30238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.127.171  | 
                    2019-10-06 12:23:51 | 
| 74.218.189.196 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 06-10-2019 04:55:18.  | 
                    2019-10-06 12:13:18 | 
| 183.131.82.99 | attack | 2019-10-06T03:55:34.476210abusebot-3.cloudsearch.cf sshd\[29160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.82.99 user=root  | 
                    2019-10-06 12:00:08 | 
| 101.99.141.165 | attackspambots | 1 pkts, ports: TCP:5555  | 
                    2019-10-06 07:42:43 | 
| 103.253.107.43 | attackspambots | Oct 6 05:49:30 MK-Soft-VM7 sshd[17588]: Failed password for root from 103.253.107.43 port 48998 ssh2 ...  | 
                    2019-10-06 12:07:11 | 
| 31.43.31.80 | attackbotsspam | WordPress wp-login brute force :: 31.43.31.80 0.128 BYPASS [06/Oct/2019:14:55:29 1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2019-10-06 12:05:31 | 
| 83.169.197.13 | attackspambots | 1 pkts, ports: TCP:445  | 
                    2019-10-06 07:46:06 | 
| 106.12.181.184 | attackspambots | Oct 6 06:52:56 www sshd\[12614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.184 user=root Oct 6 06:52:58 www sshd\[12614\]: Failed password for root from 106.12.181.184 port 50110 ssh2 Oct 6 06:57:06 www sshd\[12683\]: Invalid user 123 from 106.12.181.184 ...  | 
                    2019-10-06 12:07:53 | 
| 103.115.45.38 | attack | 1 pkts, ports: TCP:80  | 
                    2019-10-06 07:42:22 | 
| 100.3.129.59 | attack | 1 pkts, ports: TCP:445  | 
                    2019-10-06 07:43:03 | 
| 134.209.90.220 | attackspambots | Oct 5 18:18:28 php1 sshd\[24860\]: Invalid user Tennis@2017 from 134.209.90.220 Oct 5 18:18:28 php1 sshd\[24860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.90.220 Oct 5 18:18:30 php1 sshd\[24860\]: Failed password for invalid user Tennis@2017 from 134.209.90.220 port 41592 ssh2 Oct 5 18:22:18 php1 sshd\[25315\]: Invalid user qwert@12345 from 134.209.90.220 Oct 5 18:22:18 php1 sshd\[25315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.90.220  | 
                    2019-10-06 12:26:20 | 
| 146.185.181.64 | attack | Oct 6 03:55:19 *** sshd[27272]: User root from 146.185.181.64 not allowed because not listed in AllowUsers  | 
                    2019-10-06 12:10:52 | 
| 110.172.130.238 | attackbotsspam | 1 pkts, ports: TCP:445  | 
                    2019-10-06 07:41:29 |