城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.254.142.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.254.142.34. IN A
;; AUTHORITY SECTION:
. 402 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 14:02:39 CST 2022
;; MSG SIZE rcvd: 107
34.142.254.216.in-addr.arpa domain name pointer test.as2.primustel.ca.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.142.254.216.in-addr.arpa name = test.as2.primustel.ca.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 212.174.63.119 | attackspam | Automatic report - Port Scan Attack |
2020-02-01 13:12:47 |
| 94.25.177.240 | attack | Unauthorized connection attempt from IP address 94.25.177.240 on Port 445(SMB) |
2020-02-01 11:03:38 |
| 14.232.152.74 | attackbots | Unauthorized connection attempt from IP address 14.232.152.74 on Port 445(SMB) |
2020-02-01 10:46:56 |
| 118.68.118.168 | attack | 1580512626 - 02/01/2020 00:17:06 Host: 118.68.118.168/118.68.118.168 Port: 445 TCP Blocked |
2020-02-01 10:41:01 |
| 118.68.38.66 | attackspambots | Unauthorized connection attempt detected from IP address 118.68.38.66 to port 23 [J] |
2020-02-01 10:49:28 |
| 54.206.114.237 | attackbots | [SatFeb0105:47:49.0300752020][:error][pid24188:tid47392770438912][client54.206.114.237:59080][client54.206.114.237]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\\\\\\\.conf\|boot\\\\\\\\.ini\|web.config\)\\\\\\\\b\|\(\|\^\|\\\\\\\\.\\\\\\\\.\)/etc/\|/\\\\\\\\.\(\?:history\|bash_history\|sh_history\|env\)\$\)"atREQUEST_FILENAME.[file"/usr/local/apache.ea3/conf/modsec_rules/10_asl_rules.conf"][line"211"][id"390709"][rev"30"][msg"Atomicorp.comWAFRules:Attempttoaccessprotectedfileremotely"][data"/.env"][severity"CRITICAL"][hostname"www.robertselitrenny.ch"][uri"/.env"][unique_id"XjUC9JlcfRG8Izvxj6PnLwAAAQU"][SatFeb0105:58:42.9758062020][:error][pid23763:tid47392797755136][client54.206.114.237:44158][client54.206.114.237]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\| |
2020-02-01 13:06:59 |
| 189.148.163.116 | attack | Unauthorized connection attempt from IP address 189.148.163.116 on Port 445(SMB) |
2020-02-01 10:53:34 |
| 50.237.52.250 | attack | SSH Bruteforce attack |
2020-02-01 13:10:40 |
| 45.79.152.7 | attack | Unauthorized connection attempt detected from IP address 45.79.152.7 to port 443 [J] |
2020-02-01 11:01:10 |
| 132.232.108.149 | attackbotsspam | Unauthorized connection attempt detected from IP address 132.232.108.149 to port 2220 [J] |
2020-02-01 10:52:44 |
| 46.101.119.148 | attackbots | Unauthorized connection attempt detected from IP address 46.101.119.148 to port 2220 [J] |
2020-02-01 11:00:56 |
| 222.186.15.158 | attack | Feb 1 03:09:39 ovpn sshd\[7486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158 user=root Feb 1 03:09:41 ovpn sshd\[7486\]: Failed password for root from 222.186.15.158 port 18527 ssh2 Feb 1 03:39:19 ovpn sshd\[15155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158 user=root Feb 1 03:39:21 ovpn sshd\[15155\]: Failed password for root from 222.186.15.158 port 45972 ssh2 Feb 1 03:39:23 ovpn sshd\[15155\]: Failed password for root from 222.186.15.158 port 45972 ssh2 |
2020-02-01 10:45:28 |
| 183.181.168.131 | attack | Automatic report - SSH Brute-Force Attack |
2020-02-01 10:39:27 |
| 212.156.221.69 | attackspambots | Unauthorized connection attempt detected from IP address 212.156.221.69 to port 2220 [J] |
2020-02-01 10:35:32 |
| 159.100.30.145 | attackbotsspam | Invalid user azad from 159.100.30.145 port 49452 |
2020-02-01 10:39:51 |