城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.29.21.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;220.29.21.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 05:39:32 CST 2025
;; MSG SIZE rcvd: 105
42.21.29.220.in-addr.arpa domain name pointer softbank220029021042.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.21.29.220.in-addr.arpa name = softbank220029021042.bbtec.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 108.62.103.212 | attack | 06/30/2020-10:56:00.103827 108.62.103.212 Protocol: 17 ET SCAN Sipvicious Scan |
2020-07-01 02:09:48 |
| 176.14.29.129 | attackbotsspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-07-01 02:10:52 |
| 216.218.206.84 | attackbots | srv02 Mass scanning activity detected Target: 5900 .. |
2020-07-01 02:19:46 |
| 190.167.39.163 | attack | Automatic report - Port Scan Attack |
2020-07-01 02:17:31 |
| 217.141.152.174 | attackspam | IP blocked |
2020-07-01 01:50:58 |
| 185.220.101.136 | attackbotsspam | Unauthorized connection attempt detected from IP address 185.220.101.136 to port 7000 |
2020-07-01 02:03:53 |
| 106.13.164.136 | attack | Jun 30 14:09:59 Ubuntu-1404-trusty-64-minimal sshd\[32252\]: Invalid user postgres from 106.13.164.136 Jun 30 14:09:59 Ubuntu-1404-trusty-64-minimal sshd\[32252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.164.136 Jun 30 14:10:01 Ubuntu-1404-trusty-64-minimal sshd\[32252\]: Failed password for invalid user postgres from 106.13.164.136 port 51400 ssh2 Jun 30 14:20:13 Ubuntu-1404-trusty-64-minimal sshd\[12241\]: Invalid user user1 from 106.13.164.136 Jun 30 14:20:13 Ubuntu-1404-trusty-64-minimal sshd\[12241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.164.136 |
2020-07-01 02:14:13 |
| 123.207.211.71 | attack | Jun 30 15:46:57 home sshd[10173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.211.71 Jun 30 15:46:59 home sshd[10173]: Failed password for invalid user aa from 123.207.211.71 port 57300 ssh2 Jun 30 15:50:07 home sshd[10398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.211.71 ... |
2020-07-01 02:11:11 |
| 94.102.57.137 | attackbots | Jun 30 17:52:35 debian-2gb-nbg1-2 kernel: \[15790992.605883\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.57.137 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=58527 PROTO=TCP SPT=50672 DPT=8143 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-01 01:54:28 |
| 62.234.146.45 | attackbotsspam | Jun 30 09:26:55 Host-KLAX-C sshd[18070]: Invalid user sccs from 62.234.146.45 port 51584 ... |
2020-07-01 02:12:22 |
| 64.39.108.61 | attack | 404 NOT FOUND |
2020-07-01 02:15:31 |
| 207.148.86.7 | attackbotsspam | 207.148.86.7 - - [30/Jun/2020:13:20:33 +0100] "POST /wp-login.php HTTP/1.1" 200 1960 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 207.148.86.7 - - [30/Jun/2020:13:20:36 +0100] "POST /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 207.148.86.7 - - [30/Jun/2020:13:20:37 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-01 01:56:58 |
| 103.72.144.228 | attack | $f2bV_matches |
2020-07-01 02:10:04 |
| 85.16.192.11 | attack | Invalid user fp from 85.16.192.11 port 53302 |
2020-07-01 02:27:22 |
| 193.8.83.6 | attack | Jun 30 18:25:00 root sshd[11449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.8.83.6 user=root Jun 30 18:25:03 root sshd[11449]: Failed password for root from 193.8.83.6 port 56764 ssh2 ... |
2020-07-01 01:46:59 |