城市(city): Aalborg
省份(region): Region Nordjylland
国家(country): Denmark
运营商(isp): Telenor
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.33.116.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.33.116.18. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025061700 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 18 00:10:59 CST 2025
;; MSG SIZE rcvd: 104
18.116.33.5.in-addr.arpa domain name pointer 005033116018.mbb.telenor.dk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
18.116.33.5.in-addr.arpa name = 005033116018.mbb.telenor.dk.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 141.255.46.10 | attack | Telnet Server BruteForce Attack |
2019-09-22 22:08:24 |
| 222.186.173.119 | attackspam | Sep 22 20:01:53 areeb-Workstation sshd[6409]: Failed password for root from 222.186.173.119 port 27267 ssh2 Sep 22 20:01:56 areeb-Workstation sshd[6409]: Failed password for root from 222.186.173.119 port 27267 ssh2 ... |
2019-09-22 22:36:28 |
| 91.121.116.65 | attack | 2019-09-17 06:13:37,096 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 2019-09-17 06:46:30,051 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 2019-09-17 07:16:52,012 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 2019-09-17 07:46:55,636 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 2019-09-17 08:17:12,176 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 91.121.116.65 ... |
2019-09-22 22:39:35 |
| 131.196.7.234 | attackspam | Automatic report - Banned IP Access |
2019-09-22 22:35:58 |
| 109.169.65.194 | attackbotsspam | SMB Server BruteForce Attack |
2019-09-22 22:35:44 |
| 139.199.168.184 | attackspambots | Sep 22 14:19:41 localhost sshd\[15792\]: Invalid user east from 139.199.168.184 port 34518 Sep 22 14:19:41 localhost sshd\[15792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.168.184 Sep 22 14:19:44 localhost sshd\[15792\]: Failed password for invalid user east from 139.199.168.184 port 34518 ssh2 Sep 22 14:24:54 localhost sshd\[15897\]: Invalid user postgres from 139.199.168.184 port 37560 Sep 22 14:24:54 localhost sshd\[15897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.168.184 ... |
2019-09-22 22:37:36 |
| 118.89.187.136 | attackbotsspam | Sep 22 15:49:20 tux-35-217 sshd\[32270\]: Invalid user lienhart from 118.89.187.136 port 55144 Sep 22 15:49:20 tux-35-217 sshd\[32270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.187.136 Sep 22 15:49:22 tux-35-217 sshd\[32270\]: Failed password for invalid user lienhart from 118.89.187.136 port 55144 ssh2 Sep 22 15:53:30 tux-35-217 sshd\[32274\]: Invalid user rr from 118.89.187.136 port 54908 Sep 22 15:53:30 tux-35-217 sshd\[32274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.187.136 ... |
2019-09-22 22:14:36 |
| 88.131.107.49 | attackspam | 2019-09-18 20:31:12,661 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 88.131.107.49 2019-09-18 21:06:26,867 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 88.131.107.49 2019-09-18 21:39:49,033 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 88.131.107.49 2019-09-18 22:12:09,738 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 88.131.107.49 2019-09-18 22:45:07,460 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 88.131.107.49 ... |
2019-09-22 22:44:51 |
| 84.242.96.142 | attackbotsspam | Sep 22 08:58:36 ny01 sshd[13300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.242.96.142 Sep 22 08:58:38 ny01 sshd[13300]: Failed password for invalid user rudy from 84.242.96.142 port 57286 ssh2 Sep 22 09:02:52 ny01 sshd[14020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.242.96.142 |
2019-09-22 22:06:03 |
| 113.172.123.225 | attackbots | Sep 22 14:45:45 dev sshd\[27383\]: Invalid user admin from 113.172.123.225 port 42332 Sep 22 14:45:45 dev sshd\[27383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.123.225 Sep 22 14:45:47 dev sshd\[27383\]: Failed password for invalid user admin from 113.172.123.225 port 42332 ssh2 |
2019-09-22 22:35:13 |
| 177.1.213.19 | attackspambots | Sep 22 15:57:35 mail sshd\[3307\]: Invalid user sy from 177.1.213.19 port 27315 Sep 22 15:57:35 mail sshd\[3307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.213.19 Sep 22 15:57:37 mail sshd\[3307\]: Failed password for invalid user sy from 177.1.213.19 port 27315 ssh2 Sep 22 16:03:05 mail sshd\[4428\]: Invalid user mas from 177.1.213.19 port 44395 Sep 22 16:03:05 mail sshd\[4428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.1.213.19 |
2019-09-22 22:19:38 |
| 104.196.131.79 | attack | 09/22/2019-08:45:59.025993 104.196.131.79 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-09-22 22:30:00 |
| 61.126.47.234 | attack | SS5,WP GET /blog/wp-login.php GET /blog/wp-login.php |
2019-09-22 22:09:33 |
| 89.46.101.122 | attackbots | 2019-09-20 03:48:33,655 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 2019-09-20 04:38:59,806 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 2019-09-20 05:23:11,184 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 2019-09-20 06:06:55,618 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 2019-09-20 06:49:35,029 fail2ban.actions \[946\]: NOTICE \[sshd\] Ban 89.46.101.122 ... |
2019-09-22 22:39:46 |
| 41.41.0.10 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 13:45:28. |
2019-09-22 22:48:21 |