城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.20.140.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64146
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;218.20.140.169. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:20:25 CST 2025
;; MSG SIZE rcvd: 107
169.140.20.218.in-addr.arpa domain name pointer 169.140.20.218.broad.gz.gd.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
169.140.20.218.in-addr.arpa name = 169.140.20.218.broad.gz.gd.dynamic.163data.com.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.165.136.34 | attackbots | port scan and connect, tcp 23 (telnet) |
2019-06-23 12:44:59 |
| 171.241.57.121 | attackbots | 23/tcp 23/tcp [2019-06-13/22]2pkt |
2019-06-23 12:35:44 |
| 117.3.103.206 | attackspambots | 139/tcp 445/tcp... [2019-06-06/22]6pkt,2pt.(tcp) |
2019-06-23 12:46:22 |
| 170.0.128.10 | attackbots | Jun 22 19:28:13 server1 sshd\[26811\]: Invalid user pegas from 170.0.128.10 Jun 22 19:28:13 server1 sshd\[26811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.0.128.10 Jun 22 19:28:15 server1 sshd\[26811\]: Failed password for invalid user pegas from 170.0.128.10 port 52628 ssh2 Jun 22 19:29:44 server1 sshd\[27162\]: Invalid user gk from 170.0.128.10 Jun 22 19:29:44 server1 sshd\[27162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.0.128.10 ... |
2019-06-23 12:32:36 |
| 76.169.76.172 | attackbotsspam | 81/tcp 23/tcp 81/tcp [2019-04-24/06-22]3pkt |
2019-06-23 12:44:25 |
| 46.43.90.175 | attackbots | Unauthorised access (Jun 23) SRC=46.43.90.175 LEN=52 TTL=118 ID=23080 DF TCP DPT=445 WINDOW=8192 SYN |
2019-06-23 12:47:41 |
| 82.81.89.201 | attackspambots | 23/tcp 23/tcp [2019-05-10/06-22]2pkt |
2019-06-23 12:34:49 |
| 177.69.44.193 | attackbots | Jun 23 04:37:02 rpi sshd\[6420\]: Invalid user ghost from 177.69.44.193 port 39747 Jun 23 04:37:02 rpi sshd\[6420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.44.193 Jun 23 04:37:04 rpi sshd\[6420\]: Failed password for invalid user ghost from 177.69.44.193 port 39747 ssh2 |
2019-06-23 12:50:17 |
| 221.207.32.250 | attackbotsspam | ports scanning |
2019-06-23 12:13:55 |
| 49.75.145.126 | attackbots | Jun 22 23:20:03 vps200512 sshd\[7495\]: Invalid user gozone from 49.75.145.126 Jun 22 23:20:03 vps200512 sshd\[7495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.75.145.126 Jun 22 23:20:06 vps200512 sshd\[7495\]: Failed password for invalid user gozone from 49.75.145.126 port 33958 ssh2 Jun 22 23:20:06 vps200512 sshd\[7497\]: Invalid user gozone from 49.75.145.126 Jun 22 23:20:06 vps200512 sshd\[7497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.75.145.126 |
2019-06-23 12:26:47 |
| 139.59.34.17 | attackspam | Jun 23 06:01:36 vps647732 sshd[28032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.34.17 Jun 23 06:01:39 vps647732 sshd[28032]: Failed password for invalid user octuser2 from 139.59.34.17 port 56660 ssh2 ... |
2019-06-23 12:21:34 |
| 114.7.170.194 | attackspam | 2019-06-23T04:00:09.949040abusebot-7.cloudsearch.cf sshd\[2774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.170.194 user=root |
2019-06-23 12:05:15 |
| 69.42.66.94 | attack | 445/tcp 445/tcp 445/tcp... [2019-04-24/06-22]13pkt,1pt.(tcp) |
2019-06-23 12:21:06 |
| 162.243.142.99 | attack | ¯\_(ツ)_/¯ |
2019-06-23 12:16:15 |
| 189.198.134.2 | attack | 445/tcp 445/tcp [2019-06-18/22]2pkt |
2019-06-23 12:26:10 |