城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.134.80.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.134.80.131. IN A
;; AUTHORITY SECTION:
. 540 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 16:09:31 CST 2022
;; MSG SIZE rcvd: 107
Host 131.80.134.216.in-addr.arpa not found: 2(SERVFAIL)
server can't find 216.134.80.131.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.171.30.16 | attackspambots | Automatic report - SSH Brute-Force Attack |
2019-07-14 13:00:50 |
| 81.163.149.246 | attack | Automatic report - Port Scan Attack |
2019-07-14 12:40:54 |
| 175.173.53.14 | attackspam | Automatic report - Port Scan Attack |
2019-07-14 12:23:55 |
| 31.27.38.242 | attackbotsspam | Jul 14 01:14:46 mail sshd\[17103\]: Invalid user celia from 31.27.38.242 port 54992 Jul 14 01:14:46 mail sshd\[17103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.27.38.242 Jul 14 01:14:48 mail sshd\[17103\]: Failed password for invalid user celia from 31.27.38.242 port 54992 ssh2 Jul 14 01:19:56 mail sshd\[17163\]: Invalid user buildbot from 31.27.38.242 port 58348 Jul 14 01:19:56 mail sshd\[17163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.27.38.242 ... |
2019-07-14 12:25:18 |
| 49.85.79.18 | attackbots | Automatic report - Port Scan Attack |
2019-07-14 12:42:03 |
| 142.4.119.230 | attack | SMB Server BruteForce Attack |
2019-07-14 13:12:09 |
| 112.242.138.86 | attackspambots | Automatic report - Port Scan Attack |
2019-07-14 12:30:51 |
| 36.7.140.77 | attackbotsspam | Jul 14 04:49:19 mail sshd\[19290\]: Invalid user ftpuser from 36.7.140.77\ Jul 14 04:49:21 mail sshd\[19290\]: Failed password for invalid user ftpuser from 36.7.140.77 port 61110 ssh2\ Jul 14 04:53:00 mail sshd\[19340\]: Invalid user srikanth from 36.7.140.77\ Jul 14 04:53:02 mail sshd\[19340\]: Failed password for invalid user srikanth from 36.7.140.77 port 13589 ssh2\ Jul 14 04:56:45 mail sshd\[19360\]: Invalid user myang from 36.7.140.77\ Jul 14 04:56:47 mail sshd\[19360\]: Failed password for invalid user myang from 36.7.140.77 port 30577 ssh2\ |
2019-07-14 12:43:35 |
| 198.71.227.40 | attack | xmlrpc attack |
2019-07-14 12:32:09 |
| 5.29.169.91 | attackspambots | Jul 14 06:41:48 rpi sshd[15396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.29.169.91 Jul 14 06:41:50 rpi sshd[15396]: Failed password for invalid user 12345 from 5.29.169.91 port 41838 ssh2 |
2019-07-14 12:42:27 |
| 191.53.223.124 | attack | $f2bV_matches |
2019-07-14 13:13:15 |
| 51.38.126.92 | attack | Jul 14 05:20:44 SilenceServices sshd[17922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.126.92 Jul 14 05:20:47 SilenceServices sshd[17922]: Failed password for invalid user tutor from 51.38.126.92 port 59100 ssh2 Jul 14 05:25:23 SilenceServices sshd[20917]: Failed password for root from 51.38.126.92 port 59480 ssh2 |
2019-07-14 12:34:33 |
| 182.72.94.146 | attackspambots | Automatic report - Banned IP Access |
2019-07-14 12:23:20 |
| 182.77.58.216 | attack | SMB Server BruteForce Attack |
2019-07-14 13:13:32 |
| 213.159.210.58 | attack | xmlrpc attack |
2019-07-14 12:43:06 |