城市(city): unknown
省份(region): unknown
国家(country): Saudi Arabia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.108.90.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50978
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.108.90.193. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:42:36 CST 2025
;; MSG SIZE rcvd: 105
Host 193.90.108.5.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 193.90.108.5.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 194.26.29.80 | attackspambots | Jul 29 01:36:23 debian-2gb-nbg1-2 kernel: \[18237882.043397\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.80 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=10196 PROTO=TCP SPT=41423 DPT=22266 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-29 07:47:11 |
| 40.76.75.137 | attackspam | *Port Scan* detected from 40.76.75.137 (US/United States/-). 5 hits in the last 35 seconds |
2020-07-29 07:40:01 |
| 54.37.68.191 | attack | Invalid user xianwd from 54.37.68.191 port 48980 |
2020-07-29 07:32:20 |
| 20.43.161.240 | attackbotsspam | Spam comment : ZigZag.WiKi ZigZag и команда подобрали для тебя лучших из лучших, в каталоге ты сможешь найти нужного продавца, найти нужную группу(чат), новостной канал магазина. В каталоге присутствует поиск по telegram группам, каналам, найди что пишут в группе про твоего продавана, обсуди с участниками ровность движения. Огромная база СНГ Telegram Каналы, Группы, Чаты, боты, удобный интерфейс хорошая система рейтингов, Рулетки и акции смотри в новостях! Заинтересовали ? заходи к нам в гости будем рады https://zigzag.wiki |
2020-07-29 08:02:50 |
| 75.132.99.197 | attackspambots | 2020-07-28T23:15:34.128470afi-git.jinr.ru sshd[14741]: Failed password for admin from 75.132.99.197 port 51039 ssh2 2020-07-28T23:15:35.791277afi-git.jinr.ru sshd[14749]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=075-132-099-197.res.spectrum.com user=admin 2020-07-28T23:15:37.448782afi-git.jinr.ru sshd[14749]: Failed password for admin from 75.132.99.197 port 51223 ssh2 2020-07-28T23:15:39.216510afi-git.jinr.ru sshd[14757]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=075-132-099-197.res.spectrum.com user=admin 2020-07-28T23:15:40.758915afi-git.jinr.ru sshd[14757]: Failed password for admin from 75.132.99.197 port 51255 ssh2 ... |
2020-07-29 07:47:55 |
| 196.52.84.15 | attackbotsspam | Spam comment : Earning method from $ 15 000 a day After only 30 days, I still have to pinch myself to make sure I'm not dreaming. I earned tens of thousands of dollars every month in my own cozy four walls. Profits grow and grow and grow! http://glc.jmmcraft.xyz/2d101609 It only takes a few minutes With just a few clicks, you can generate $ 15,000 every day for the rest of your life http://yygtr.jmmcraft.xyz/d14 I have created one of the best Training for creating a blog & earning money from Google AdSense that will help you to learn everything from scratch. Paypal Money Online Hack New Update +Euro1.500 $ But, we will also include some opportunities that offer you money for playing video games. You have a great website. Traffic is steadily increasing. Your viewers are happy with your content. But are you making money off that traffic? If you’re like most of us, you are probably doing the normal things like using Adsense, the odd banner ad and hopefully promoting products wit |
2020-07-29 07:51:36 |
| 189.57.167.186 | attackspambots | Unauthorized connection attempt from IP address 189.57.167.186 on Port 445(SMB) |
2020-07-29 07:57:50 |
| 176.37.60.16 | attackbots | SSH Invalid Login |
2020-07-29 07:38:01 |
| 45.160.181.31 | attackbots | Unauthorized connection attempt from IP address 45.160.181.31 on Port 445(SMB) |
2020-07-29 07:32:54 |
| 185.216.34.232 | attack | Spam comment : Antidetect browser is a software innovation with unique methods that change fingerprints in a natural way and remain undetectable to online tracking services. Easily bypass fingerprinting and skip over sms verification from major big data companies like Google, Facebook, Twitter, Amazon, etc. Th tool incorporates 12 independent modules that will change the fingerprints of your computer. Not spoofing - It will not be detected as spoofing because the fingerprint is changed at hardware level and looks natural. Unlimited configurations - Create unlimited browser configurations. Each new browser will have non-unique Canvas prints, WebGL, fonts, etc. https://www.nofingerprinting.com - Download here Because Privacy Matters. Now for a limited time with 10% discount, available only on Nofingerprinting.com. (discount code for Ivanovation.com) |
2020-07-29 07:58:12 |
| 179.191.239.141 | attackspam | Unauthorized connection attempt from IP address 179.191.239.141 on Port 445(SMB) |
2020-07-29 07:35:24 |
| 178.62.6.215 | attackbots | Invalid user cpethe from 178.62.6.215 port 56600 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.6.215 Invalid user cpethe from 178.62.6.215 port 56600 Failed password for invalid user cpethe from 178.62.6.215 port 56600 ssh2 Invalid user xbyang from 178.62.6.215 port 40258 |
2020-07-29 07:28:55 |
| 3.129.64.8 | attack | mue-Direct access to plugin not allowed |
2020-07-29 07:37:46 |
| 45.127.62.55 | attackspam | Invalid user pgadmin from 45.127.62.55 port 36820 |
2020-07-29 07:44:48 |
| 109.167.231.99 | attackbots | Jul 29 03:40:32 dhoomketu sshd[1983374]: Invalid user jmiller from 109.167.231.99 port 27546 Jul 29 03:40:32 dhoomketu sshd[1983374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.231.99 Jul 29 03:40:32 dhoomketu sshd[1983374]: Invalid user jmiller from 109.167.231.99 port 27546 Jul 29 03:40:34 dhoomketu sshd[1983374]: Failed password for invalid user jmiller from 109.167.231.99 port 27546 ssh2 Jul 29 03:44:28 dhoomketu sshd[1983472]: Invalid user huanglu from 109.167.231.99 port 17464 ... |
2020-07-29 07:29:08 |