城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.104.103.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.104.103.80.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 06:03:35 CST 2025
;; MSG SIZE  rcvd: 106Host 80.103.104.48.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 80.103.104.48.in-addr.arpa: NXDOMAIN| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 5.133.66.51 | attackbots | Autoban 5.133.66.51 AUTH/CONNECT | 2019-12-13 04:38:58 | 
| 94.23.218.108 | attackbotsspam | k+ssh-bruteforce | 2019-12-13 04:39:49 | 
| 5.133.66.68 | attack | Autoban 5.133.66.68 AUTH/CONNECT | 2019-12-13 04:30:46 | 
| 5.36.234.131 | attackbotsspam | Autoban 5.36.234.131 AUTH/CONNECT | 2019-12-13 04:10:29 | 
| 164.132.57.16 | attackbotsspam | Dec 12 20:30:57 sso sshd[15209]: Failed password for root from 164.132.57.16 port 35212 ssh2 Dec 12 20:38:07 sso sshd[16061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16 ... | 2019-12-13 04:25:58 | 
| 54.38.242.233 | attack | Dec 12 06:44:58 php1 sshd\[8694\]: Invalid user Admin@2017 from 54.38.242.233 Dec 12 06:44:58 php1 sshd\[8694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=233.ip-54-38-242.eu Dec 12 06:45:00 php1 sshd\[8694\]: Failed password for invalid user Admin@2017 from 54.38.242.233 port 35174 ssh2 Dec 12 06:50:28 php1 sshd\[9423\]: Invalid user texmo from 54.38.242.233 Dec 12 06:50:28 php1 sshd\[9423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=233.ip-54-38-242.eu | 2019-12-13 04:09:58 | 
| 200.209.174.92 | attack | Brute-force attempt banned | 2019-12-13 04:04:42 | 
| 43.247.4.52 | attack | Dec 12 21:29:42 lnxded64 sshd[17641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.4.52 | 2019-12-13 04:32:20 | 
| 45.127.133.91 | attackspambots | Dec 12 22:03:16 vibhu-HP-Z238-Microtower-Workstation sshd\[31393\]: Invalid user ubnt from 45.127.133.91 Dec 12 22:03:16 vibhu-HP-Z238-Microtower-Workstation sshd\[31393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.133.91 Dec 12 22:03:17 vibhu-HP-Z238-Microtower-Workstation sshd\[31393\]: Failed password for invalid user ubnt from 45.127.133.91 port 42388 ssh2 Dec 12 22:10:09 vibhu-HP-Z238-Microtower-Workstation sshd\[31886\]: Invalid user katuscha from 45.127.133.91 Dec 12 22:10:09 vibhu-HP-Z238-Microtower-Workstation sshd\[31886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.133.91 ... | 2019-12-13 04:08:08 | 
| 5.43.7.215 | attack | Autoban 5.43.7.215 AUTH/CONNECT | 2019-12-13 04:06:46 | 
| 202.47.115.48 | attackspambots | Unauthorized connection attempt detected from IP address 202.47.115.48 to port 445 | 2019-12-13 04:23:03 | 
| 191.232.189.227 | attack | Dec 12 21:51:56 hosting sshd[18648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.189.227 user=root Dec 12 21:51:58 hosting sshd[18648]: Failed password for root from 191.232.189.227 port 36604 ssh2 ... | 2019-12-13 04:11:23 | 
| 5.133.66.79 | attack | Autoban 5.133.66.79 AUTH/CONNECT | 2019-12-13 04:26:49 | 
| 50.197.38.230 | attackspam | Autoban 50.197.38.230 AUTH/CONNECT | 2019-12-13 04:02:19 | 
| 172.81.250.106 | attack | Too many connections or unauthorized access detected from Arctic banned ip | 2019-12-13 04:43:11 |