城市(city): unknown
省份(region): unknown
国家(country): Taiwan, China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.132.249.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;220.132.249.41. IN A
;; AUTHORITY SECTION:
. 379 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019110201 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 04:08:19 CST 2019
;; MSG SIZE rcvd: 118
41.249.132.220.in-addr.arpa domain name pointer 220-132-249-41.HINET-IP.hinet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
41.249.132.220.in-addr.arpa name = 220-132-249-41.HINET-IP.hinet.net.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
103.114.104.140 | attack | Nov 30 22:40:09 heicom postfix/smtpd\[5783\]: warning: unknown\[103.114.104.140\]: SASL LOGIN authentication failed: authentication failure Nov 30 22:40:10 heicom postfix/smtpd\[5783\]: warning: unknown\[103.114.104.140\]: SASL LOGIN authentication failed: authentication failure Nov 30 22:40:11 heicom postfix/smtpd\[5783\]: warning: unknown\[103.114.104.140\]: SASL LOGIN authentication failed: authentication failure Nov 30 22:40:12 heicom postfix/smtpd\[5783\]: warning: unknown\[103.114.104.140\]: SASL LOGIN authentication failed: authentication failure Nov 30 22:40:13 heicom postfix/smtpd\[5783\]: warning: unknown\[103.114.104.140\]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-01 08:06:03 |
46.38.144.179 | attackspambots | Dec 1 01:27:14 mail postfix/smtpd\[2622\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 1 01:28:25 mail postfix/smtpd\[2622\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 1 01:29:39 mail postfix/smtpd\[2622\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-01 08:34:32 |
82.217.67.240 | attack | Nov 27 04:51:48 sip sshd[9963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.217.67.240 Nov 27 04:51:49 sip sshd[9963]: Failed password for invalid user web from 82.217.67.240 port 43942 ssh2 Nov 27 05:02:08 sip sshd[11804]: Failed password for sync from 82.217.67.240 port 33124 ssh2 |
2019-12-01 08:20:28 |
58.65.196.90 | attackspam | firewall-block, port(s): 1433/tcp |
2019-12-01 08:21:29 |
109.92.186.51 | attackbotsspam | Nov 28 17:25:05 server6 sshd[17857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109-92-186-51.dynamic.isp.telekom.rs user=r.r Nov 28 17:25:06 server6 sshd[17857]: Failed password for r.r from 109.92.186.51 port 47706 ssh2 Nov 28 17:25:06 server6 sshd[17857]: Received disconnect from 109.92.186.51: 11: Bye Bye [preauth] Nov 30 05:28:50 server6 sshd[10583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109-92-186-51.dynamic.isp.telekom.rs Nov 30 05:28:52 server6 sshd[10583]: Failed password for invalid user eastjohn from 109.92.186.51 port 49618 ssh2 Nov 30 05:28:52 server6 sshd[10583]: Received disconnect from 109.92.186.51: 11: Bye Bye [preauth] Nov 30 05:43:58 server6 sshd[24302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109-92-186-51.dynamic.isp.telekom.rs user=r.r Nov 30 05:44:00 server6 sshd[24302]: Failed password for r.r from 109......... ------------------------------- |
2019-12-01 08:07:41 |
51.254.143.206 | attackspam | Nov 28 12:36:06 sip sshd[2339]: Failed password for root from 51.254.143.206 port 44316 ssh2 Nov 28 12:36:06 sip sshd[2344]: Failed password for root from 51.254.143.206 port 44317 ssh2 Nov 28 12:36:06 sip sshd[2343]: Failed password for root from 51.254.143.206 port 44315 ssh2 Nov 28 12:36:06 sip sshd[2340]: Failed password for root from 51.254.143.206 port 44311 ssh2 |
2019-12-01 08:42:14 |
123.138.18.11 | attackbotsspam | Dec 1 02:03:18 hosting sshd[23171]: Invalid user test from 123.138.18.11 port 55422 Dec 1 02:03:18 hosting sshd[23171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.11 Dec 1 02:03:18 hosting sshd[23171]: Invalid user test from 123.138.18.11 port 55422 Dec 1 02:03:20 hosting sshd[23171]: Failed password for invalid user test from 123.138.18.11 port 55422 ssh2 Dec 1 02:22:44 hosting sshd[26436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.11 user=adm Dec 1 02:22:46 hosting sshd[26436]: Failed password for adm from 123.138.18.11 port 40598 ssh2 ... |
2019-12-01 08:04:14 |
150.136.152.237 | attackbotsspam | Invalid user ts3 from 150.136.152.237 port 51156 |
2019-12-01 08:19:13 |
89.185.1.175 | attack | Nov 27 19:33:33 sip sshd[10770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.185.1.175 Nov 27 19:33:36 sip sshd[10770]: Failed password for invalid user server from 89.185.1.175 port 42172 ssh2 Nov 27 20:19:46 sip sshd[19253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.185.1.175 |
2019-12-01 08:15:00 |
51.91.249.178 | attackbots | Nov 22 17:50:40 meumeu sshd[1978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.249.178 Nov 22 17:50:42 meumeu sshd[1978]: Failed password for invalid user dockeruser from 51.91.249.178 port 60150 ssh2 Nov 22 17:58:45 meumeu sshd[3250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.249.178 ... |
2019-12-01 08:39:03 |
39.107.124.82 | attack | firewall-block, port(s): 6379/tcp |
2019-12-01 08:35:11 |
129.213.112.98 | attackspambots | Dec 1 01:57:24 taivassalofi sshd[107898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.112.98 Dec 1 01:57:27 taivassalofi sshd[107898]: Failed password for invalid user palengat from 129.213.112.98 port 47692 ssh2 ... |
2019-12-01 08:07:55 |
106.12.95.112 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-01 08:19:26 |
84.91.128.47 | attackbots | Invalid user speitel from 84.91.128.47 port 42512 |
2019-12-01 08:05:22 |
41.93.32.88 | attackbots | $f2bV_matches |
2019-12-01 08:34:51 |