城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.75.240.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.75.240.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031002 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 11 10:58:14 CST 2025
;; MSG SIZE rcvd: 106
Host 91.240.75.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 91.240.75.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 46.105.244.17 | attack | Aug 10 22:24:08 piServer sshd[17858]: Failed password for root from 46.105.244.17 port 38910 ssh2 Aug 10 22:28:09 piServer sshd[18285]: Failed password for root from 46.105.244.17 port 56070 ssh2 ... |
2020-08-11 04:45:34 |
| 216.104.200.22 | attackbots | web-1 [ssh] SSH Attack |
2020-08-11 04:47:36 |
| 195.54.160.38 | attack | firewall-block, port(s): 3854/tcp, 5632/tcp, 5914/tcp, 8838/tcp, 9925/tcp, 9935/tcp, 10774/tcp, 11485/tcp, 12642/tcp, 14460/tcp, 16000/tcp, 16866/tcp, 16870/tcp, 19964/tcp, 20808/tcp, 21026/tcp, 21034/tcp, 21315/tcp, 21326/tcp, 21358/tcp, 21857/tcp, 21869/tcp, 22046/tcp, 22649/tcp, 22865/tcp, 23285/tcp, 23457/tcp, 24076/tcp, 24161/tcp, 27877/tcp, 28636/tcp, 32128/tcp, 32951/tcp, 36145/tcp, 37032/tcp, 38021/tcp, 38186/tcp, 38241/tcp, 39167/tcp, 39221/tcp, 39677/tcp, 39836/tcp, 42314/tcp, 42425/tcp, 43804/tcp, 45450/tcp, 45712/tcp, 46142/tcp, 46285/tcp, 46289/tcp, 46602/tcp, 47126/tcp, 47130/tcp, 51414/tcp, 52572/tcp, 52609/tcp, 53379/tcp, 53391/tcp, 54138/tcp, 55175/tcp, 55183/tcp, 55199/tcp, 55785/tcp, 58471/tcp, 58479/tcp, 58666/tcp, 59505/tcp, 61241/tcp, 64374/tcp |
2020-08-11 04:30:35 |
| 113.89.12.21 | attack | Aug 10 23:44:10 journals sshd\[102681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.12.21 user=root Aug 10 23:44:12 journals sshd\[102681\]: Failed password for root from 113.89.12.21 port 42375 ssh2 Aug 10 23:46:40 journals sshd\[102932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.12.21 user=root Aug 10 23:46:42 journals sshd\[102932\]: Failed password for root from 113.89.12.21 port 59839 ssh2 Aug 10 23:49:09 journals sshd\[103195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.12.21 user=root ... |
2020-08-11 04:58:00 |
| 139.199.85.241 | attack | 20 attempts against mh-ssh on echoip |
2020-08-11 04:43:52 |
| 35.247.148.211 | attack | viw-Joomla User : try to access forms... |
2020-08-11 04:40:04 |
| 39.88.132.174 | attackbotsspam | Unauthorised access (Aug 10) SRC=39.88.132.174 LEN=40 TTL=47 ID=27624 TCP DPT=23 WINDOW=50432 SYN Unauthorised access (Aug 10) SRC=39.88.132.174 LEN=40 TTL=47 ID=44191 TCP DPT=23 WINDOW=50432 SYN Unauthorised access (Aug 10) SRC=39.88.132.174 LEN=40 TTL=47 ID=33611 TCP DPT=23 WINDOW=50432 SYN |
2020-08-11 04:36:58 |
| 187.237.146.62 | attack | Unauthorized connection attempt from IP address 187.237.146.62 on Port 445(SMB) |
2020-08-11 04:56:10 |
| 183.89.221.37 | attackspam | Unauthorized connection attempt from IP address 183.89.221.37 on Port 445(SMB) |
2020-08-11 04:51:50 |
| 75.131.152.157 | attackspam | AbusiveCrawling |
2020-08-11 04:48:21 |
| 185.220.100.243 | attack | Automatic report - Banned IP Access |
2020-08-11 04:42:08 |
| 45.125.245.231 | attackspambots | Unauthorized access detected from black listed ip! |
2020-08-11 05:03:16 |
| 14.178.157.207 | attackbotsspam | Port Scan ... |
2020-08-11 04:54:28 |
| 167.99.170.83 | attack | Aug 10 22:25:49 PorscheCustomer sshd[8482]: Failed password for root from 167.99.170.83 port 48274 ssh2 Aug 10 22:28:51 PorscheCustomer sshd[8564]: Failed password for root from 167.99.170.83 port 47028 ssh2 ... |
2020-08-11 04:57:36 |
| 41.235.128.144 | attackspam | Unauthorized connection attempt from IP address 41.235.128.144 on Port 445(SMB) |
2020-08-11 04:55:45 |