城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.194.50.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;249.194.50.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 19:27:32 CST 2025
;; MSG SIZE rcvd: 106
Host 91.50.194.249.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 91.50.194.249.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 1.54.77.54 | attack | (Sep 29) LEN=40 TTL=47 ID=55915 TCP DPT=8080 WINDOW=47021 SYN (Sep 29) LEN=40 TTL=47 ID=64899 TCP DPT=8080 WINDOW=26668 SYN (Sep 29) LEN=40 TTL=47 ID=10546 TCP DPT=8080 WINDOW=5701 SYN (Sep 28) LEN=40 TTL=47 ID=17706 TCP DPT=8080 WINDOW=5701 SYN (Sep 28) LEN=40 TTL=47 ID=31635 TCP DPT=8080 WINDOW=26668 SYN (Sep 28) LEN=40 TTL=47 ID=46513 TCP DPT=8080 WINDOW=47021 SYN (Sep 27) LEN=40 TTL=47 ID=50310 TCP DPT=8080 WINDOW=5701 SYN (Sep 27) LEN=40 TTL=47 ID=27416 TCP DPT=8080 WINDOW=5701 SYN (Sep 26) LEN=40 TTL=47 ID=59744 TCP DPT=8080 WINDOW=47021 SYN (Sep 26) LEN=40 TTL=47 ID=5011 TCP DPT=8080 WINDOW=47021 SYN (Sep 25) LEN=40 TTL=50 ID=43420 TCP DPT=8080 WINDOW=5701 SYN (Sep 25) LEN=40 TTL=50 ID=24590 TCP DPT=8080 WINDOW=26668 SYN (Sep 25) LEN=40 TTL=50 ID=15497 TCP DPT=8080 WINDOW=47021 SYN (Sep 25) LEN=40 TTL=47 ID=61224 TCP DPT=8080 WINDOW=5701 SYN (Sep 25) LEN=40 TTL=47 ID=65068 TCP DPT=8080 WINDOW=5701 SYN (Sep 25) LEN=40 TTL=47 ID=14686... |
2019-09-30 01:03:46 |
| 172.68.74.28 | attackspam | 8443/tcp 8080/tcp... [2019-07-31/09-27]15pkt,2pt.(tcp) |
2019-09-30 01:10:53 |
| 110.89.59.87 | attackspam | Automated reporting of FTP Brute Force |
2019-09-30 01:17:14 |
| 94.23.215.90 | attackbotsspam | Sep 29 22:41:56 areeb-Workstation sshd[23806]: Failed password for games from 94.23.215.90 port 63390 ssh2 ... |
2019-09-30 01:35:46 |
| 193.201.224.232 | attackbots | Sep 29 15:56:19 icinga sshd[12829]: Failed none for invalid user admin from 193.201.224.232 port 23854 ssh2 Sep 29 15:56:19 icinga sshd[12829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.201.224.232 ... |
2019-09-30 01:40:34 |
| 160.124.23.24 | attackbots | Threat Management Alert 2: Misc Attack. Signature ET DROP Spamhaus DROP Listed Traffic Inbound group 12. |
2019-09-30 01:07:51 |
| 162.13.137.98 | attackspambots | Sep 28 01:18:50 xb3 sshd[18595]: Failed password for invalid user samuel from 162.13.137.98 port 50216 ssh2 Sep 28 01:18:50 xb3 sshd[18595]: Received disconnect from 162.13.137.98: 11: Bye Bye [preauth] Sep 28 01:25:13 xb3 sshd[3966]: Failed password for invalid user yash from 162.13.137.98 port 52214 ssh2 Sep 28 01:25:13 xb3 sshd[3966]: Received disconnect from 162.13.137.98: 11: Bye Bye [preauth] Sep 28 01:28:57 xb3 sshd[18910]: Failed password for invalid user josefina from 162.13.137.98 port 38534 ssh2 Sep 28 01:28:57 xb3 sshd[18910]: Received disconnect from 162.13.137.98: 11: Bye Bye [preauth] Sep 28 01:32:31 xb3 sshd[16411]: Failed password for invalid user ubuntu123 from 162.13.137.98 port 52918 ssh2 Sep 28 01:32:31 xb3 sshd[16411]: Received disconnect from 162.13.137.98: 11: Bye Bye [preauth] Sep 28 01:36:17 xb3 sshd[14289]: Failed password for invalid user ps from 162.13.137.98 port 39160 ssh2 Sep 28 01:36:17 xb3 sshd[14289]: Received disconnect from 162.13.13........ ------------------------------- |
2019-09-30 01:11:18 |
| 222.186.175.202 | attack | Sep 29 18:32:57 MainVPS sshd[852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Sep 29 18:32:59 MainVPS sshd[852]: Failed password for root from 222.186.175.202 port 26906 ssh2 Sep 29 18:33:16 MainVPS sshd[852]: error: maximum authentication attempts exceeded for root from 222.186.175.202 port 26906 ssh2 [preauth] Sep 29 18:32:57 MainVPS sshd[852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Sep 29 18:32:59 MainVPS sshd[852]: Failed password for root from 222.186.175.202 port 26906 ssh2 Sep 29 18:33:16 MainVPS sshd[852]: error: maximum authentication attempts exceeded for root from 222.186.175.202 port 26906 ssh2 [preauth] Sep 29 18:33:25 MainVPS sshd[886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Sep 29 18:33:27 MainVPS sshd[886]: Failed password for root from 222.186.175.202 port 30086 ssh2 ... |
2019-09-30 01:02:43 |
| 119.29.224.141 | attack | Sep 29 18:31:46 h2177944 sshd\[3897\]: Invalid user admin from 119.29.224.141 port 47528 Sep 29 18:31:46 h2177944 sshd\[3897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.224.141 Sep 29 18:31:48 h2177944 sshd\[3897\]: Failed password for invalid user admin from 119.29.224.141 port 47528 ssh2 Sep 29 18:36:34 h2177944 sshd\[4004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.224.141 user=minecraft ... |
2019-09-30 01:26:51 |
| 51.91.37.197 | attackbots | Sep 29 12:41:59 thevastnessof sshd[4354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.37.197 ... |
2019-09-30 01:34:12 |
| 51.83.74.45 | attackbotsspam | Sep 29 05:05:13 aiointranet sshd\[25647\]: Invalid user antivir from 51.83.74.45 Sep 29 05:05:13 aiointranet sshd\[25647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-51-83-74.eu Sep 29 05:05:16 aiointranet sshd\[25647\]: Failed password for invalid user antivir from 51.83.74.45 port 57096 ssh2 Sep 29 05:09:38 aiointranet sshd\[26074\]: Invalid user eduard from 51.83.74.45 Sep 29 05:09:38 aiointranet sshd\[26074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-51-83-74.eu |
2019-09-30 01:16:21 |
| 36.227.86.203 | attackspam | 23/tcp 23/tcp [2019-09-27]2pkt |
2019-09-30 01:07:11 |
| 102.132.226.213 | attackspam | Automatic report - Port Scan Attack |
2019-09-30 01:25:58 |
| 140.213.24.174 | attackspambots | 445/tcp [2019-09-29]1pkt |
2019-09-30 01:18:34 |
| 219.145.72.255 | attackspambots | Sep 29 13:27:02 xtremcommunity sshd\[1233\]: Invalid user natan from 219.145.72.255 port 5884 Sep 29 13:27:02 xtremcommunity sshd\[1233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.145.72.255 Sep 29 13:27:04 xtremcommunity sshd\[1233\]: Failed password for invalid user natan from 219.145.72.255 port 5884 ssh2 Sep 29 13:32:28 xtremcommunity sshd\[1413\]: Invalid user rl from 219.145.72.255 port 8482 Sep 29 13:32:28 xtremcommunity sshd\[1413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.145.72.255 ... |
2019-09-30 01:38:38 |