城市(city): unknown
省份(region): unknown
国家(country): Portugal
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.30.13.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40785
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.30.13.107. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 23:22:57 CST 2025
;; MSG SIZE rcvd: 106
107.13.30.213.in-addr.arpa domain name pointer 107.13.30.213.rev.vodafone.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
107.13.30.213.in-addr.arpa name = 107.13.30.213.rev.vodafone.pt.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 120.131.3.191 | attackbots | Oct 5 13:51:37 ns3033917 sshd[22336]: Failed password for root from 120.131.3.191 port 63672 ssh2 Oct 5 13:59:37 ns3033917 sshd[22374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.191 user=root Oct 5 13:59:40 ns3033917 sshd[22374]: Failed password for root from 120.131.3.191 port 16436 ssh2 ... |
2020-10-06 00:18:37 |
| 80.82.77.33 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 2761 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-06 00:10:06 |
| 146.0.41.70 | attackspam | 2020-10-05T20:26:36.962237hostname sshd[114720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.41.70 user=root 2020-10-05T20:26:39.026824hostname sshd[114720]: Failed password for root from 146.0.41.70 port 52744 ssh2 ... |
2020-10-06 00:18:03 |
| 47.74.148.237 | attackbots | Port Scan/VNC login attempt ... |
2020-10-06 00:00:59 |
| 178.128.124.89 | attackbots | (sshd) Failed SSH login from 178.128.124.89 (SG/Singapore/-): 5 in the last 3600 secs |
2020-10-06 00:08:13 |
| 80.82.65.90 | attackspambots | 3702/udp 1900/udp 389/udp... [2020-08-04/10-04]543pkt,5pt.(udp) |
2020-10-06 00:15:59 |
| 180.76.98.99 | attack | Oct 5 09:11:56 lanister sshd[3116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.98.99 user=root Oct 5 09:11:57 lanister sshd[3116]: Failed password for root from 180.76.98.99 port 59934 ssh2 Oct 5 09:16:01 lanister sshd[3211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.98.99 user=root Oct 5 09:16:02 lanister sshd[3211]: Failed password for root from 180.76.98.99 port 49540 ssh2 |
2020-10-05 23:56:02 |
| 91.190.232.9 | attack | Icarus honeypot on github |
2020-10-06 00:06:43 |
| 85.209.0.252 | attackspam | Oct 5 17:58:24 ns381471 sshd[15131]: Failed password for root from 85.209.0.252 port 54922 ssh2 |
2020-10-06 00:02:13 |
| 5.157.26.208 | attackbots | Registration form abuse |
2020-10-05 23:56:49 |
| 5.189.176.84 | attackbotsspam | Contabo Hacking |
2020-10-06 00:26:00 |
| 183.109.164.73 | attackbotsspam | DATE:2020-10-04 22:35:16, IP:183.109.164.73, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-10-06 00:22:32 |
| 200.90.125.141 | attackspambots | Oct 5 16:42:21 buvik sshd[17841]: Failed password for root from 200.90.125.141 port 29759 ssh2 Oct 5 16:44:19 buvik sshd[18068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.90.125.141 user=root Oct 5 16:44:22 buvik sshd[18068]: Failed password for root from 200.90.125.141 port 13545 ssh2 ... |
2020-10-05 23:55:39 |
| 104.131.60.112 | attackspambots | Port 22 Scan, PTR: None |
2020-10-06 00:27:11 |
| 49.233.164.146 | attackspambots | Oct 5 13:11:20 ns381471 sshd[9137]: Failed password for root from 49.233.164.146 port 54808 ssh2 |
2020-10-06 00:07:21 |