城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.185.212.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.185.212.142. IN A
;; AUTHORITY SECTION:
. 520 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:48:30 CST 2022
;; MSG SIZE rcvd: 108
Host 142.212.185.216.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.212.185.216.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 181.46.124.48 | attackspambots | Invalid user arkserver from 181.46.124.48 port 45578 |
2020-08-19 14:58:25 |
| 186.10.125.209 | attack | Invalid user nadmin from 186.10.125.209 port 12623 |
2020-08-19 15:22:07 |
| 188.166.5.84 | attackbots | Aug 19 08:11:10 vps647732 sshd[25641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.5.84 Aug 19 08:11:12 vps647732 sshd[25641]: Failed password for invalid user harry from 188.166.5.84 port 47238 ssh2 ... |
2020-08-19 14:44:09 |
| 46.105.227.206 | attack | $f2bV_matches |
2020-08-19 14:49:00 |
| 46.101.113.206 | attackbots | prod6 ... |
2020-08-19 14:42:58 |
| 107.175.158.13 | attackspambots | (From eric@talkwithwebvisitor.com) My name’s Eric and I just came across your website - staytunedchiropractic.com - in the search results. Here’s what that means to me… Your SEO’s working. You’re getting eyeballs – mine at least. Your content’s pretty good, wouldn’t change a thing. BUT… Eyeballs don’t pay the bills. CUSTOMERS do. And studies show that 7 out of 10 visitors to a site like staytunedchiropractic.com will drop by, take a gander, and then head for the hills without doing anything else. It’s like they never were even there. You can fix this. You can make it super-simple for them to raise their hand, say, “okay, let’s talk” without requiring them to even pull their cell phone from their pocket… thanks to Talk With Web Visitor. Talk With Web Visitor is a software widget that sits on your site, ready and waiting to capture any visitor’s Name, Email address and Phone Number. It lets you know immediately – so you can talk to that lead immediately… without delay… BEFOR |
2020-08-19 15:06:42 |
| 40.73.73.244 | attack | 2020-08-19T04:41:31.418335abusebot-4.cloudsearch.cf sshd[4143]: Invalid user zhan from 40.73.73.244 port 52094 2020-08-19T04:41:31.430088abusebot-4.cloudsearch.cf sshd[4143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.73.244 2020-08-19T04:41:31.418335abusebot-4.cloudsearch.cf sshd[4143]: Invalid user zhan from 40.73.73.244 port 52094 2020-08-19T04:41:33.624568abusebot-4.cloudsearch.cf sshd[4143]: Failed password for invalid user zhan from 40.73.73.244 port 52094 ssh2 2020-08-19T04:42:32.984790abusebot-4.cloudsearch.cf sshd[4147]: Invalid user ab from 40.73.73.244 port 34400 2020-08-19T04:42:32.990721abusebot-4.cloudsearch.cf sshd[4147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.73.244 2020-08-19T04:42:32.984790abusebot-4.cloudsearch.cf sshd[4147]: Invalid user ab from 40.73.73.244 port 34400 2020-08-19T04:42:35.225438abusebot-4.cloudsearch.cf sshd[4147]: Failed password for invalid us ... |
2020-08-19 14:56:39 |
| 23.95.97.228 | attackbotsspam | (From eric@talkwithwebvisitor.com) Hey there, I just found your site, quick question… My name’s Eric, I found mccansechiropractic.com after doing a quick search – you showed up near the top of the rankings, so whatever you’re doing for SEO, looks like it’s working well. So here’s my question – what happens AFTER someone lands on your site? Anything? Research tells us at least 70% of the people who find your site, after a quick once-over, they disappear… forever. That means that all the work and effort you put into getting them to show up, goes down the tubes. Why would you want all that good work – and the great site you’ve built – go to waste? Because the odds are they’ll just skip over calling or even grabbing their phone, leaving you high and dry. But here’s a thought… what if you could make it super-simple for someone to raise their hand, say, “okay, let’s talk” without requiring them to even pull their cell phone from their pocket? You can – thanks to revolutionary new software |
2020-08-19 15:10:39 |
| 217.182.23.55 | attackspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-19T06:27:34Z and 2020-08-19T06:33:56Z |
2020-08-19 14:47:58 |
| 51.75.195.25 | attackspambots | Fail2Ban |
2020-08-19 14:58:58 |
| 111.241.174.228 | attackspambots | 1597809165 - 08/19/2020 05:52:45 Host: 111.241.174.228/111.241.174.228 Port: 445 TCP Blocked |
2020-08-19 15:00:37 |
| 109.227.63.3 | attackspam | Aug 19 01:12:10 ny01 sshd[31518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3 Aug 19 01:12:12 ny01 sshd[31518]: Failed password for invalid user eagle from 109.227.63.3 port 47829 ssh2 Aug 19 01:16:24 ny01 sshd[32080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3 |
2020-08-19 14:55:45 |
| 49.176.242.163 | attack | 20/8/18@23:53:02: FAIL: IoT-Telnet address from=49.176.242.163 ... |
2020-08-19 14:49:59 |
| 1.53.190.185 | attack | 1597809147 - 08/19/2020 05:52:27 Host: 1.53.190.185/1.53.190.185 Port: 445 TCP Blocked |
2020-08-19 15:18:59 |
| 165.22.240.63 | attack | 165.22.240.63 - - [19/Aug/2020:04:53:11 +0100] "POST /wp-login.php HTTP/1.1" 200 2435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.22.240.63 - - [19/Aug/2020:04:53:13 +0100] "POST /wp-login.php HTTP/1.1" 200 2408 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.22.240.63 - - [19/Aug/2020:04:53:15 +0100] "POST /wp-login.php HTTP/1.1" 200 2440 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-19 14:44:32 |