城市(city): unknown
省份(region): Guangdong
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.131.164.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;219.131.164.1. IN A
;; AUTHORITY SECTION:
. 334 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019112501 1800 900 604800 86400
;; Query time: 139 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 26 02:45:17 CST 2019
;; MSG SIZE rcvd: 117
1.164.131.219.in-addr.arpa domain name pointer 1.164.131.219.broad.yf.gd.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
1.164.131.219.in-addr.arpa name = 1.164.131.219.broad.yf.gd.dynamic.163data.com.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 177.0.157.142 | attackspam | Failed password for root from 177.0.157.142 port 34532 ssh2 |
2020-04-30 02:02:05 |
| 212.123.95.131 | attack | Invalid user bk from 212.123.95.131 port 53434 |
2020-04-30 01:54:58 |
| 159.65.13.153 | attackbotsspam | Invalid user ubuntu from 159.65.13.153 port 41570 |
2020-04-30 02:03:52 |
| 129.204.119.178 | attack | Failed password for root from 129.204.119.178 port 36742 ssh2 |
2020-04-30 02:07:58 |
| 51.83.45.93 | attack | 2020-04-27 23:32:43 server sshd[66835]: Failed password for invalid user signature from 51.83.45.93 port 35034 ssh2 |
2020-04-30 02:19:00 |
| 51.144.171.125 | attackbotsspam | Invalid user ubuntu from 51.144.171.125 port 50634 |
2020-04-30 02:17:50 |
| 27.71.227.197 | attackbots | Invalid user um from 27.71.227.197 port 59012 |
2020-04-30 02:22:26 |
| 134.209.242.156 | attackbots | Invalid user rt from 134.209.242.156 port 56448 |
2020-04-30 02:06:35 |
| 27.76.106.0 | attack | Invalid user admin from 27.76.106.0 port 58956 |
2020-04-30 02:28:36 |
| 122.169.244.146 | attack | Invalid user mesos from 122.169.244.146 port 3082 |
2020-04-30 02:24:18 |
| 82.177.95.234 | attackspam | Failed password for sync from 82.177.95.234 port 53016 ssh2 |
2020-04-30 02:14:59 |
| 172.93.4.78 | attackbotsspam | " " |
2020-04-30 02:22:57 |
| 45.55.235.30 | attackspambots | Invalid user ubuntu from 45.55.235.30 port 49081 |
2020-04-30 02:20:16 |
| 27.104.135.156 | attackspam | 2020-04-29T17:36:42.171998struts4.enskede.local sshd\[31010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.104.135.156 user=root 2020-04-29T17:36:45.383628struts4.enskede.local sshd\[31010\]: Failed password for root from 27.104.135.156 port 58387 ssh2 2020-04-29T17:42:56.076615struts4.enskede.local sshd\[31065\]: Invalid user jerald from 27.104.135.156 port 45613 2020-04-29T17:42:56.083804struts4.enskede.local sshd\[31065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.104.135.156 2020-04-29T17:42:59.310524struts4.enskede.local sshd\[31065\]: Failed password for invalid user jerald from 27.104.135.156 port 45613 ssh2 ... |
2020-04-30 01:53:52 |
| 212.64.59.227 | attack | Invalid user yixin from 212.64.59.227 port 16428 |
2020-04-30 01:55:28 |