城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.50.97.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.50.97.55. IN A
;; AUTHORITY SECTION:
. 565 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 01:52:08 CST 2022
;; MSG SIZE rcvd: 104
Host 55.97.50.48.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 55.97.50.48.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.43.224.105 | attackspam | [portscan] Port scan |
2019-07-05 06:59:37 |
| 178.128.124.83 | attackspambots | Jul 4 23:53:24 srv03 sshd\[14768\]: Invalid user steve from 178.128.124.83 port 41406 Jul 4 23:53:24 srv03 sshd\[14768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.124.83 Jul 4 23:53:26 srv03 sshd\[14768\]: Failed password for invalid user steve from 178.128.124.83 port 41406 ssh2 |
2019-07-05 06:35:00 |
| 42.51.204.24 | attack | Attempted SSH login |
2019-07-05 06:33:14 |
| 109.94.117.210 | attackbots | NAME : BEOTELNETZR CIDR : DDoS attack Serbia "" - block certain countries :) IP: 109.94.117.210 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-07-05 06:40:03 |
| 91.246.130.159 | attackspambots | Jul 4 12:09:37 XXX sshd[39779]: Invalid user admin from 91.246.130.159 port 47798 |
2019-07-05 06:47:57 |
| 142.93.219.126 | attack | www noscript ... |
2019-07-05 06:31:44 |
| 46.101.27.6 | attackspam | Jul 5 00:35:26 XXX sshd[50364]: Invalid user spike from 46.101.27.6 port 36402 |
2019-07-05 07:05:07 |
| 185.220.101.60 | attackspambots | 185.220.101.60 - - [04/Jul/2019:23:34:32 0200] "GET / HTTP/1.1" 301 229 "-" "Mozilla/5.0 (compatible; Googlebot/2.1; http://www.google.com/bot.html)" |
2019-07-05 07:00:05 |
| 61.136.104.131 | attackbotsspam | $f2bV_matches |
2019-07-05 07:10:51 |
| 109.62.206.241 | attackbotsspam | SpamReport |
2019-07-05 07:03:38 |
| 45.55.67.128 | attackspam | Jul 4 17:56:52 aat-srv002 sshd[18589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.67.128 Jul 4 17:56:54 aat-srv002 sshd[18589]: Failed password for invalid user zhouh from 45.55.67.128 port 46045 ssh2 Jul 4 17:59:52 aat-srv002 sshd[18615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.67.128 Jul 4 17:59:54 aat-srv002 sshd[18615]: Failed password for invalid user orange from 45.55.67.128 port 58728 ssh2 ... |
2019-07-05 07:05:52 |
| 144.217.4.14 | attackspambots | Jul 5 00:59:34 vpn01 sshd\[17972\]: Invalid user cloud-user from 144.217.4.14 Jul 5 00:59:34 vpn01 sshd\[17972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.4.14 Jul 5 00:59:36 vpn01 sshd\[17972\]: Failed password for invalid user cloud-user from 144.217.4.14 port 37435 ssh2 |
2019-07-05 07:11:13 |
| 89.208.136.134 | attackspam | [portscan] Port scan |
2019-07-05 06:48:18 |
| 110.49.13.66 | attackbots | Unauthorized connection attempt from IP address 110.49.13.66 on Port 445(SMB) |
2019-07-05 06:39:44 |
| 121.136.156.51 | attackspambots | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-07-05 06:36:52 |