城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.105.54.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.105.54.99.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:44:41 CST 2025
;; MSG SIZE  rcvd: 106
        Host 99.54.105.214.in-addr.arpa not found: 2(SERVFAIL)
        server can't find 214.105.54.99.in-addr.arpa: SERVFAIL
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 112.85.42.237 | attackspambots | Sep 1 05:59:52 NPSTNNYC01T sshd[29520]: Failed password for root from 112.85.42.237 port 30005 ssh2 Sep 1 05:59:54 NPSTNNYC01T sshd[29520]: Failed password for root from 112.85.42.237 port 30005 ssh2 Sep 1 05:59:56 NPSTNNYC01T sshd[29520]: Failed password for root from 112.85.42.237 port 30005 ssh2 Sep 1 06:00:38 NPSTNNYC01T sshd[29646]: Failed password for root from 112.85.42.237 port 33952 ssh2 ...  | 
                    2020-09-01 18:39:06 | 
| 177.73.47.23 | attackbots | Fail2Ban Ban Triggered Wordpress Sniffing  | 
                    2020-09-01 19:12:19 | 
| 102.165.30.9 | attack | Port Scan/VNC login attempt ...  | 
                    2020-09-01 18:29:46 | 
| 184.22.65.144 | attackspambots | Unauthorized connection attempt from IP address 184.22.65.144 on Port 445(SMB)  | 
                    2020-09-01 18:48:04 | 
| 106.13.136.8 | attack | Failed password for invalid user ubuntu from 106.13.136.8 port 57612 ssh2  | 
                    2020-09-01 18:32:47 | 
| 220.249.114.237 | attackbotsspam | Brute-force attempt banned  | 
                    2020-09-01 19:09:40 | 
| 202.143.120.106 | attack | Unauthorized connection attempt from IP address 202.143.120.106 on Port 445(SMB)  | 
                    2020-09-01 18:56:53 | 
| 218.29.196.186 | attackspam | Invalid user lu from 218.29.196.186 port 42680  | 
                    2020-09-01 18:42:15 | 
| 151.236.59.142 | attackspam | TCP ports : 11162 / 31035  | 
                    2020-09-01 18:28:05 | 
| 14.252.202.134 | attackspam | Unauthorized connection attempt from IP address 14.252.202.134 on Port 445(SMB)  | 
                    2020-09-01 18:52:03 | 
| 138.91.89.115 | attack | Invalid user factura from 138.91.89.115 port 48720  | 
                    2020-09-01 18:35:25 | 
| 46.101.192.154 | attackspam | [Mon Aug 24 18:23:38.082399 2020] [access_compat:error] [pid 842301] [client 46.101.192.154:41548] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php, referer: http://www.lukegirvin.com/wp-login.php ...  | 
                    2020-09-01 19:06:03 | 
| 132.232.49.143 | attack | Sep 1 11:12:38 sshgateway sshd\[32752\]: Invalid user zt from 132.232.49.143 Sep 1 11:12:39 sshgateway sshd\[32752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.49.143 Sep 1 11:12:41 sshgateway sshd\[32752\]: Failed password for invalid user zt from 132.232.49.143 port 51234 ssh2  | 
                    2020-09-01 18:52:55 | 
| 190.211.162.66 | attackbots | Unauthorized connection attempt from IP address 190.211.162.66 on Port 445(SMB)  | 
                    2020-09-01 19:07:13 | 
| 140.213.13.56 | attackbots | SMB Server BruteForce Attack  | 
                    2020-09-01 18:38:01 |