城市(city): Gumi
省份(region): Gyeongsangbuk-do
国家(country): South Korea
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.166.122.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22457
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;49.166.122.78.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 12:05:15 CST 2025
;; MSG SIZE  rcvd: 106Host 78.122.166.49.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 78.122.166.49.in-addr.arpa: NXDOMAIN| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 191.103.252.161 | attackspam | 445/tcp [2020-01-27]1pkt | 2020-01-28 05:40:59 | 
| 223.17.102.64 | attackspam | Honeypot attack, port: 5555, PTR: 64-102-17-223-on-nets.com. | 2020-01-28 05:46:47 | 
| 182.107.225.153 | attackbotsspam | 5500/tcp [2020-01-27]1pkt | 2020-01-28 05:52:13 | 
| 92.19.147.164 | attackspam | 2019-03-11 17:15:50 H=host-92-19-147-164.as13285.net \[92.19.147.164\]:27968 I=\[193.107.88.166\]:25 F=\ | 2020-01-28 05:53:08 | 
| 112.51.255.227 | attackbotsspam | 2020-01-27 dovecot_login authenticator failed for \(**REMOVED**\) \[112.51.255.227\]: 535 Incorrect authentication data \(set_id=nologin\) 2020-01-27 dovecot_login authenticator failed for \(**REMOVED**\) \[112.51.255.227\]: 535 Incorrect authentication data \(set_id=**REMOVED**@**REMOVED**\) 2020-01-27 dovecot_login authenticator failed for \(**REMOVED**\) \[112.51.255.227\]: 535 Incorrect authentication data \(set_id=**REMOVED**\) | 2020-01-28 05:16:34 | 
| 36.78.248.141 | attackbots | Unauthorized connection attempt detected from IP address 36.78.248.141 to port 445 | 2020-01-28 05:44:37 | 
| 187.59.130.93 | attackbotsspam | Honeypot attack, port: 445, PTR: 187.59.130.93.static.host.gvt.net.br. | 2020-01-28 05:42:05 | 
| 87.241.160.23 | attackspambots | Automatic report - Port Scan Attack | 2020-01-28 05:13:57 | 
| 113.119.111.56 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found | 2020-01-28 05:26:29 | 
| 116.127.49.135 | attackbotsspam | 445/tcp 445/tcp [2020-01-27]2pkt | 2020-01-28 05:47:38 | 
| 115.231.181.90 | attack | 2020-01-27T21:18:42.260189shield sshd\[28636\]: Invalid user hduser from 115.231.181.90 port 45478 2020-01-27T21:18:42.265018shield sshd\[28636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.181.90 2020-01-27T21:18:43.431258shield sshd\[28636\]: Failed password for invalid user hduser from 115.231.181.90 port 45478 ssh2 2020-01-27T21:21:27.058360shield sshd\[29887\]: Invalid user jl from 115.231.181.90 port 52091 2020-01-27T21:21:27.065544shield sshd\[29887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.181.90 | 2020-01-28 05:23:59 | 
| 92.53.59.25 | attack | 2019-07-06 12:17:27 1hjhl0-0003pK-H9 SMTP connection from \(ctel-92-53-59-25.cabletel.com.mk\) \[92.53.59.25\]:31186 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 12:17:40 1hjhlE-0003pf-7L SMTP connection from \(ctel-92-53-59-25.cabletel.com.mk\) \[92.53.59.25\]:31367 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 12:17:46 1hjhlJ-0003pi-4Y SMTP connection from \(ctel-92-53-59-25.cabletel.com.mk\) \[92.53.59.25\]:31432 I=\[193.107.88.166\]:25 closed by DROP in ACL ... | 2020-01-28 05:11:05 | 
| 163.172.100.71 | attack | Brute force VPN server | 2020-01-28 05:13:06 | 
| 171.97.154.183 | attack | 23/tcp [2020-01-27]1pkt | 2020-01-28 05:42:32 | 
| 80.82.64.214 | attack | Jan 27 21:41:51 thevastnessof sshd[5100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.82.64.214 ... | 2020-01-28 05:48:27 |