城市(city): Berkeley
省份(region): California
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.28.138.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43514
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.28.138.148. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 15:41:20 CST 2025
;; MSG SIZE rcvd: 106
148.138.28.45.in-addr.arpa domain name pointer 45-28-138-148.lightspeed.sntcca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
148.138.28.45.in-addr.arpa name = 45-28-138-148.lightspeed.sntcca.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 141.151.20.172 | attackbots | TCP Port Scanning |
2020-09-19 17:59:07 |
| 180.241.134.18 | attackspam | Listed on zen-spamhaus also barracudaCentral / proto=6 . srcport=31619 . dstport=445 . (2846) |
2020-09-19 17:50:48 |
| 85.98.12.241 | attackspam | Unauthorised access (Sep 18) SRC=85.98.12.241 LEN=52 TTL=114 ID=30371 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Sep 17) SRC=85.98.12.241 LEN=52 TTL=114 ID=26316 DF TCP DPT=445 WINDOW=8192 SYN |
2020-09-19 18:06:20 |
| 49.232.168.193 | attackbotsspam | 20 attempts against mh-ssh on sun |
2020-09-19 18:25:36 |
| 35.192.173.189 | attack | plussize.fitness 35.192.173.189 [19/Sep/2020:11:55:00 +0200] "POST /wp-login.php HTTP/1.1" 200 6676 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" plussize.fitness 35.192.173.189 [19/Sep/2020:11:55:01 +0200] "POST /wp-login.php HTTP/1.1" 200 6633 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-09-19 18:08:59 |
| 218.92.0.248 | attackspambots | (sshd) Failed SSH login from 218.92.0.248 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 19 05:38:55 optimus sshd[16487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248 user=root Sep 19 05:38:55 optimus sshd[16490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248 user=root Sep 19 05:38:55 optimus sshd[16492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248 user=root Sep 19 05:38:56 optimus sshd[16494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248 user=root Sep 19 05:38:56 optimus sshd[16487]: Failed password for root from 218.92.0.248 port 41625 ssh2 |
2020-09-19 17:45:26 |
| 107.170.57.221 | attack | <6 unauthorized SSH connections |
2020-09-19 18:24:46 |
| 183.88.33.210 | attackbots | 1600448311 - 09/18/2020 18:58:31 Host: 183.88.33.210/183.88.33.210 Port: 445 TCP Blocked |
2020-09-19 18:17:19 |
| 125.99.5.96 | attack | 1600448331 - 09/18/2020 18:58:51 Host: 125.99.5.96/125.99.5.96 Port: 23 TCP Blocked |
2020-09-19 17:57:07 |
| 35.234.104.185 | attackbotsspam | Automatically reported by fail2ban report script (mx1) |
2020-09-19 17:54:53 |
| 95.188.8.193 | attackbots | Unauthorised access (Sep 18) SRC=95.188.8.193 LEN=40 TTL=244 ID=46 DF TCP DPT=23 WINDOW=14600 SYN |
2020-09-19 17:52:52 |
| 218.92.0.173 | attackbots | Sep 19 12:01:59 ip106 sshd[29951]: Failed password for root from 218.92.0.173 port 5886 ssh2 Sep 19 12:02:04 ip106 sshd[29951]: Failed password for root from 218.92.0.173 port 5886 ssh2 ... |
2020-09-19 18:07:00 |
| 103.130.213.150 | attack | Sep 19 05:40:21 ny01 sshd[23960]: Failed password for root from 103.130.213.150 port 43674 ssh2 Sep 19 05:43:00 ny01 sshd[24293]: Failed password for root from 103.130.213.150 port 36574 ssh2 |
2020-09-19 17:50:11 |
| 194.180.224.103 | attackbots | Sep 19 11:19:44 vps647732 sshd[30376]: Failed password for root from 194.180.224.103 port 39002 ssh2 ... |
2020-09-19 17:46:27 |
| 58.33.107.221 | attack | Sep 19 10:45:58 vps8769 sshd[32472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.107.221 Sep 19 10:46:00 vps8769 sshd[32472]: Failed password for invalid user admin from 58.33.107.221 port 47413 ssh2 ... |
2020-09-19 18:12:35 |