城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 209.129.16.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;209.129.16.13. IN A
;; AUTHORITY SECTION:
. 419 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:12:29 CST 2022
;; MSG SIZE rcvd: 106
13.16.129.209.in-addr.arpa domain name pointer sdccd.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
13.16.129.209.in-addr.arpa name = sdccd.edu.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 195.138.93.233 | attackbotsspam | Automatic report - Port Scan |
2020-02-02 07:24:54 |
| 186.122.148.216 | attack | Invalid user stoyan from 186.122.148.216 port 39838 |
2020-02-02 07:20:48 |
| 92.118.37.53 | attackspambots | 02/01/2020-17:15:23.431222 92.118.37.53 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-02 07:21:40 |
| 69.158.207.141 | attackspam | 20/2/1@16:57:19: FAIL: IoT-SSH address from=69.158.207.141 ... |
2020-02-02 07:46:33 |
| 54.38.183.181 | attack | Invalid user aws from 54.38.183.181 port 43120 |
2020-02-02 07:25:44 |
| 104.131.58.179 | attackspambots | LGS,WP GET /2020/wp-login.php GET /2020/wp-login.php |
2020-02-02 07:39:14 |
| 129.250.206.86 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2020-02-02 07:29:05 |
| 178.128.24.84 | attack | Invalid user victoria from 178.128.24.84 port 51156 |
2020-02-02 07:11:54 |
| 222.186.30.35 | attackbotsspam | Feb 1 20:23:07 firewall sshd[7339]: Failed password for root from 222.186.30.35 port 18611 ssh2 Feb 1 20:23:10 firewall sshd[7339]: Failed password for root from 222.186.30.35 port 18611 ssh2 Feb 1 20:23:12 firewall sshd[7339]: Failed password for root from 222.186.30.35 port 18611 ssh2 ... |
2020-02-02 07:24:26 |
| 45.80.65.80 | attack | Unauthorized connection attempt detected from IP address 45.80.65.80 to port 2220 [J] |
2020-02-02 07:29:29 |
| 152.136.76.134 | attack | Invalid user devachandra from 152.136.76.134 port 44142 |
2020-02-02 07:10:40 |
| 54.219.186.207 | attackspambots | serveres are UTC Lines containing failures of 54.219.186.207 Feb 1 17:02:06 tux2 sshd[17691]: Invalid user teamspeak3 from 54.219.186.207 port 36558 Feb 1 17:02:06 tux2 sshd[17691]: Failed password for invalid user teamspeak3 from 54.219.186.207 port 36558 ssh2 Feb 1 17:02:06 tux2 sshd[17691]: Received disconnect from 54.219.186.207 port 36558:11: Bye Bye [preauth] Feb 1 17:02:06 tux2 sshd[17691]: Disconnected from invalid user teamspeak3 54.219.186.207 port 36558 [preauth] Feb 1 17:08:13 tux2 sshd[18061]: Failed password for r.r from 54.219.186.207 port 51548 ssh2 Feb 1 17:08:13 tux2 sshd[18061]: Received disconnect from 54.219.186.207 port 51548:11: Bye Bye [preauth] Feb 1 17:08:13 tux2 sshd[18061]: Disconnected from authenticating user r.r 54.219.186.207 port 51548 [preauth] Feb 1 17:10:43 tux2 sshd[18198]: Invalid user minecraft from 54.219.186.207 port 50132 Feb 1 17:10:43 tux2 sshd[18198]: Failed password for invalid user minecraft from 54.219.186.207 por........ ------------------------------ |
2020-02-02 07:21:58 |
| 5.135.253.172 | attackspambots | firewall-block, port(s): 11710/tcp, 11711/tcp |
2020-02-02 07:26:48 |
| 106.13.165.83 | attackspambots | Invalid user yadisa from 106.13.165.83 port 44570 |
2020-02-02 07:48:42 |
| 222.186.30.57 | attack | Feb 2 05:20:14 areeb-Workstation sshd[13535]: Failed password for root from 222.186.30.57 port 57817 ssh2 Feb 2 05:20:18 areeb-Workstation sshd[13535]: Failed password for root from 222.186.30.57 port 57817 ssh2 ... |
2020-02-02 07:51:19 |