城市(city): unknown
省份(region): unknown
国家(country): Korea Republic of
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.5.208.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.5.208.79.			IN	A
;; AUTHORITY SECTION:
.			306	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 09:01:18 CST 2022
;; MSG SIZE  rcvd: 104
        Host 79.208.5.59.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 79.208.5.59.in-addr.arpa: NXDOMAIN
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 1.85.218.237 | attack | Lines containing failures of 1.85.218.237 Apr 13 23:05:35 newdogma sshd[10026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.85.218.237 user=r.r Apr 13 23:05:37 newdogma sshd[10026]: Failed password for r.r from 1.85.218.237 port 35764 ssh2 Apr 13 23:05:39 newdogma sshd[10026]: Received disconnect from 1.85.218.237 port 35764:11: Bye Bye [preauth] Apr 13 23:05:39 newdogma sshd[10026]: Disconnected from authenticating user r.r 1.85.218.237 port 35764 [preauth] Apr 13 23:08:27 newdogma sshd[10048]: Invalid user ghostname from 1.85.218.237 port 46500 Apr 13 23:08:27 newdogma sshd[10048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.85.218.237 Apr 13 23:08:29 newdogma sshd[10048]: Failed password for invalid user ghostname from 1.85.218.237 port 46500 ssh2 Apr 13 23:08:30 newdogma sshd[10048]: Received disconnect from 1.85.218.237 port 46500:11: Bye Bye [preauth] Apr 13 23:08:30 newdo........ ------------------------------  | 
                    2020-04-14 19:27:29 | 
| 67.205.144.244 | attackbotsspam | firewall-block, port(s): 12391/tcp  | 
                    2020-04-14 19:14:03 | 
| 120.31.160.67 | attack | Honeypot attack, port: 445, PTR: ns1.eflydns.net.  | 
                    2020-04-14 19:17:59 | 
| 14.251.141.64 | attackspambots | Unauthorized connection attempt from IP address 14.251.141.64 on Port 445(SMB)  | 
                    2020-04-14 19:36:00 | 
| 89.248.169.12 | attack | firewall-block, port(s): 993/tcp  | 
                    2020-04-14 19:08:54 | 
| 45.143.223.137 | attackbots | Automatically reported by fail2ban report script (powermetal_old)  | 
                    2020-04-14 19:19:46 | 
| 87.107.30.50 | attackbotsspam | Unauthorized connection attempt from IP address 87.107.30.50 on Port 445(SMB)  | 
                    2020-04-14 19:29:43 | 
| 14.249.74.96 | attackspam | Unauthorized connection attempt from IP address 14.249.74.96 on Port 445(SMB)  | 
                    2020-04-14 19:35:02 | 
| 196.27.127.61 | attackspambots | Apr 14 11:11:31  | 
                    2020-04-14 19:07:23 | 
| 182.61.170.65 | attackspam | Apr 14 13:10:35 legacy sshd[22584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.170.65 Apr 14 13:10:37 legacy sshd[22584]: Failed password for invalid user vendeg from 182.61.170.65 port 47062 ssh2 Apr 14 13:13:53 legacy sshd[22695]: Failed password for root from 182.61.170.65 port 45792 ssh2 ...  | 
                    2020-04-14 19:29:23 | 
| 104.237.138.230 | attack | 104.237.138.230 was recorded 5 times by 5 hosts attempting to connect to the following ports: 53. Incident counter (4h, 24h, all-time): 5, 7, 7  | 
                    2020-04-14 19:32:03 | 
| 14.231.119.238 | attack | Unauthorized connection attempt from IP address 14.231.119.238 on Port 445(SMB)  | 
                    2020-04-14 19:20:55 | 
| 14.232.177.143 | attackspam | Unauthorized connection attempt from IP address 14.232.177.143 on Port 445(SMB)  | 
                    2020-04-14 19:23:21 | 
| 172.105.89.161 | attackbotsspam | 04/14/2020-07:15:39.803595 172.105.89.161 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-04-14 19:35:35 | 
| 188.162.132.178 | attack | Unauthorized connection attempt from IP address 188.162.132.178 on Port 445(SMB)  | 
                    2020-04-14 19:10:34 |