城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.199.245.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;254.199.245.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 20:57:58 CST 2025
;; MSG SIZE rcvd: 107
Host 12.245.199.254.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 12.245.199.254.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 167.99.81.101 | attackspam | SSH/22 MH Probe, BF, Hack - |
2019-08-01 19:24:12 |
| 171.229.222.104 | attackspambots | Unauthorised access (Aug 1) SRC=171.229.222.104 LEN=40 TTL=45 ID=33374 TCP DPT=23 WINDOW=39571 SYN |
2019-08-01 19:23:54 |
| 81.213.108.250 | attack | Telnet Server BruteForce Attack |
2019-08-01 19:50:37 |
| 177.23.62.204 | attack | failed_logins |
2019-08-01 19:19:03 |
| 125.167.58.136 | attack | Unauthorised access (Aug 1) SRC=125.167.58.136 LEN=52 TTL=116 ID=8925 DF TCP DPT=445 WINDOW=8192 SYN |
2019-08-01 19:03:12 |
| 122.155.223.58 | attack | Invalid user fw from 122.155.223.58 port 46266 |
2019-08-01 19:25:01 |
| 1.10.222.23 | attackbotsspam | 19/7/31@23:22:41: FAIL: Alarm-Intrusion address from=1.10.222.23 ... |
2019-08-01 19:02:24 |
| 197.55.182.148 | attackbots | Aug 1 06:21:26 srv-4 sshd\[26336\]: Invalid user admin from 197.55.182.148 Aug 1 06:21:26 srv-4 sshd\[26336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.55.182.148 Aug 1 06:21:27 srv-4 sshd\[26336\]: Failed password for invalid user admin from 197.55.182.148 port 45907 ssh2 ... |
2019-08-01 19:40:18 |
| 201.231.89.134 | attack | Aug 1 11:09:28 MK-Soft-VM5 sshd\[4457\]: Invalid user tester from 201.231.89.134 port 40873 Aug 1 11:09:28 MK-Soft-VM5 sshd\[4457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.231.89.134 Aug 1 11:09:30 MK-Soft-VM5 sshd\[4457\]: Failed password for invalid user tester from 201.231.89.134 port 40873 ssh2 ... |
2019-08-01 19:12:13 |
| 192.99.55.200 | attackbotsspam | Aug 1 10:57:02 Ubuntu-1404-trusty-64-minimal sshd\[3774\]: Invalid user mario from 192.99.55.200 Aug 1 10:57:02 Ubuntu-1404-trusty-64-minimal sshd\[3774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.55.200 Aug 1 10:57:03 Ubuntu-1404-trusty-64-minimal sshd\[3774\]: Failed password for invalid user mario from 192.99.55.200 port 47664 ssh2 Aug 1 11:06:12 Ubuntu-1404-trusty-64-minimal sshd\[9396\]: Invalid user kmysclub from 192.99.55.200 Aug 1 11:06:12 Ubuntu-1404-trusty-64-minimal sshd\[9396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.55.200 |
2019-08-01 19:33:14 |
| 106.12.206.53 | attackspam | 2019-08-01T03:22:28.279521abusebot-5.cloudsearch.cf sshd\[12643\]: Invalid user him from 106.12.206.53 port 52690 |
2019-08-01 19:06:32 |
| 111.254.23.122 | attack | Caught in portsentry honeypot |
2019-08-01 19:41:36 |
| 148.66.135.173 | attackspam | $f2bV_matches_ltvn |
2019-08-01 19:34:15 |
| 128.199.136.129 | attackspambots | Aug 1 09:12:05 XXX sshd[14350]: Invalid user langamin from 128.199.136.129 port 57750 |
2019-08-01 19:02:44 |
| 70.24.191.57 | attackbotsspam | Apr 19 08:45:11 ubuntu sshd[11086]: Failed password for invalid user alejos from 70.24.191.57 port 34864 ssh2 Apr 19 08:47:56 ubuntu sshd[11420]: Failed password for backup from 70.24.191.57 port 35028 ssh2 Apr 19 08:50:29 ubuntu sshd[11479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.24.191.57 |
2019-08-01 19:14:04 |