城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.16.45.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61635
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;29.16.45.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 11:07:33 CST 2025
;; MSG SIZE rcvd: 105
Host 139.45.16.29.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.45.16.29.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 200.87.134.84 | attackspambots | Unauthorized connection attempt from IP address 200.87.134.84 on Port 445(SMB) |
2020-10-11 10:15:16 |
| 167.99.137.75 | attack | Oct 11 03:29:32 server sshd[2658]: Failed password for root from 167.99.137.75 port 46630 ssh2 Oct 11 03:32:55 server sshd[4550]: Failed password for root from 167.99.137.75 port 51786 ssh2 Oct 11 03:36:16 server sshd[6339]: Failed password for invalid user db2fenc1 from 167.99.137.75 port 56962 ssh2 |
2020-10-11 10:10:48 |
| 49.234.84.213 | attack | $f2bV_matches |
2020-10-11 10:22:22 |
| 94.23.38.191 | attackspambots | Automatic report BANNED IP |
2020-10-11 10:13:17 |
| 14.161.45.187 | attackspam | $f2bV_matches |
2020-10-11 12:07:15 |
| 79.124.62.66 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 23333 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-11 12:04:36 |
| 167.248.133.27 | attackspambots | Here more information about 167.248.133.27 info: [Unhostnameed States] 209 CENTURYLINK-US-LEGACY-QWEST rDNS: scanner-03.ch1.censys-scanner.com Connected: 10 servere(s) Reason: ssh Portscan/portflood Ports: 23,81,143,993,1433,3306 Services: imaps,telnet,ms-sql-s,mysql,imap,hosts2-ns servere: Europe/Moscow (UTC+3) Found at blocklist: abuseIPDB.com myIP:* [2020-09-14 01:40:43] (tcp) myIP:993 <- 167.248.133.27:43931 [2020-09-15 21:43:09] (tcp) myIP:23 <- 167.248.133.27:22159 [2020-09-16 10:51:37] (tcp) myIP:993 <- 167.248.133.27:8169 [2020-09-17 09:50:18] (tcp) myIP:1433 <- 167.248.133.27:9796 [2020-09-18 16:50:05] (tcp) myIP:23 <- 167.248.133.27:6238 [2020-09-19 20:25:14] (tcp) myIP:993 <- 167.248.133.27:53993 [2020-09-21 23:19:56] (tcp) myIP:3306 <- 167.248.133.27:62890 [2020-09-26 12:08:29] (tcp) myIP:3306 <- 167.248.133.27:17865 [2020-09-29 00:01:45] (tcp) myIP:143 <- 167.248.133.27:35981 [2020-10-03 06:50:28] (tcp) myIP:81 <- 167.248.133.27:62277 ........ ---------------------------------------- |
2020-10-11 12:02:43 |
| 58.56.40.210 | attack | ssh intrusion attempt |
2020-10-11 10:14:11 |
| 67.58.227.49 | attackspam | 1602362710 - 10/10/2020 22:45:10 Host: 67.58.227.49/67.58.227.49 Port: 23 TCP Blocked |
2020-10-11 10:13:44 |
| 118.126.109.155 | attackspambots | SSH brute-force attempt |
2020-10-11 10:21:50 |
| 188.166.225.37 | attack | Oct 11 02:45:35 vps-de sshd[7748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.225.37 Oct 11 02:45:38 vps-de sshd[7748]: Failed password for invalid user eillen from 188.166.225.37 port 51646 ssh2 Oct 11 02:48:22 vps-de sshd[7784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.225.37 user=root Oct 11 02:48:24 vps-de sshd[7784]: Failed password for invalid user root from 188.166.225.37 port 37072 ssh2 Oct 11 02:51:07 vps-de sshd[7819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.225.37 user=root Oct 11 02:51:09 vps-de sshd[7819]: Failed password for invalid user root from 188.166.225.37 port 50736 ssh2 ... |
2020-10-11 10:18:12 |
| 159.65.12.43 | attackspam | $f2bV_matches |
2020-10-11 12:21:31 |
| 185.63.253.200 | attack | Open |
2020-10-11 11:28:57 |
| 49.234.182.99 | attackbots | This client attempted to login to an administrator account on a Website, or abused from another resource. |
2020-10-11 12:16:29 |
| 51.210.40.91 | attack | DATE:2020-10-10 22:52:45,IP:51.210.40.91,MATCHES:10,PORT:ssh |
2020-10-11 10:11:48 |