城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.121.72.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;30.121.72.14. IN A
;; AUTHORITY SECTION:
. 461 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022302 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 08:41:47 CST 2022
;; MSG SIZE rcvd: 105
Host 14.72.121.30.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 14.72.121.30.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 129.211.81.193 | attackspambots | SSH Brute Force |
2020-07-05 21:14:43 |
| 192.241.221.204 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 30001 proto: TCP cat: Misc Attack |
2020-07-05 21:27:29 |
| 79.124.62.55 | attackspambots | scans once in preceeding hours on the ports (in chronological order) 3391 resulting in total of 1 scans from 79.124.62.0/24 block. |
2020-07-05 21:36:50 |
| 113.31.102.201 | attackbots | SSH Brute Force |
2020-07-05 21:17:18 |
| 162.243.131.164 | attack | GPL DNS named version attempt - port: 53 proto: UDP cat: Attempted Information Leak |
2020-07-05 21:31:38 |
| 185.143.75.153 | attack | Jul 4 14:56:11 statusweb1.srvfarm.net postfix/smtpd[22043]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 4 14:56:36 statusweb1.srvfarm.net postfix/smtpd[20523]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 4 14:57:02 statusweb1.srvfarm.net postfix/smtpd[20523]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 4 14:57:28 statusweb1.srvfarm.net postfix/smtpd[22043]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 4 14:57:54 statusweb1.srvfarm.net postfix/smtpd[20523]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-07-05 21:08:59 |
| 103.219.112.1 | attackspam | " " |
2020-07-05 21:33:19 |
| 45.14.150.130 | attackbots | SSH Brute Force |
2020-07-05 21:22:05 |
| 123.21.3.240 | attackbotsspam | SSH Brute Force |
2020-07-05 21:01:20 |
| 185.39.11.57 | attack | Port scan on 8 port(s): 30703 30704 30709 30711 30714 30768 30791 30797 |
2020-07-05 21:30:02 |
| 51.137.134.191 | attackspam | SSH Brute Force |
2020-07-05 21:05:59 |
| 128.199.142.138 | attackspambots | SSH Brute Force |
2020-07-05 21:14:58 |
| 103.83.178.106 | attackbotsspam | Icarus honeypot on github |
2020-07-05 21:19:10 |
| 185.39.11.32 | attackbotsspam | Fail2Ban Ban Triggered |
2020-07-05 21:30:30 |
| 92.63.197.55 | attack | scans 6 times in preceeding hours on the ports (in chronological order) 3522 3531 3477 3490 3522 3542 resulting in total of 14 scans from 92.63.192.0/20 block. |
2020-07-05 21:35:07 |