城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.54.130.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45048
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.54.130.118. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:28:39 CST 2025
;; MSG SIZE rcvd: 106
118.130.54.59.in-addr.arpa domain name pointer 118.130.54.59.broad.sr.jx.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
118.130.54.59.in-addr.arpa name = 118.130.54.59.broad.sr.jx.dynamic.163data.com.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.82.77.245 | attack | Fail2Ban Ban Triggered |
2020-01-06 23:34:03 |
| 49.49.242.237 | attackbotsspam | Unauthorized connection attempt detected from IP address 49.49.242.237 to port 1022 [T] |
2020-01-07 00:12:50 |
| 163.47.214.158 | attackspam | Jan 6 19:28:56 gw1 sshd[28575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.47.214.158 Jan 6 19:28:58 gw1 sshd[28575]: Failed password for invalid user chipmast from 163.47.214.158 port 33174 ssh2 ... |
2020-01-06 23:49:58 |
| 62.173.151.25 | attackspambots | Jan 6 14:12:46 debian-2gb-nbg1-2 kernel: \[575686.576325\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=62.173.151.25 DST=195.201.40.59 LEN=442 TOS=0x00 PREC=0x00 TTL=56 ID=0 DF PROTO=UDP SPT=5087 DPT=5060 LEN=422 |
2020-01-06 23:47:31 |
| 80.82.64.127 | attackspam | Jan 6 13:31:27 h2177944 kernel: \[1512446.302922\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=39508 PROTO=TCP SPT=8080 DPT=3601 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 6 13:31:27 h2177944 kernel: \[1512446.302934\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=39508 PROTO=TCP SPT=8080 DPT=3601 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 6 13:42:24 h2177944 kernel: \[1513103.323770\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=40434 PROTO=TCP SPT=8080 DPT=3525 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 6 13:42:24 h2177944 kernel: \[1513103.323783\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=40434 PROTO=TCP SPT=8080 DPT=3525 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 6 14:11:43 h2177944 kernel: \[1514861.485192\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 T |
2020-01-06 23:54:40 |
| 47.92.255.230 | attackspam | Unauthorized connection attempt detected from IP address 47.92.255.230 to port 167 [T] |
2020-01-07 00:13:56 |
| 112.124.50.81 | attackspambots | Unauthorized connection attempt detected from IP address 112.124.50.81 to port 445 [T] |
2020-01-07 00:10:20 |
| 222.244.139.34 | attackbotsspam | Unauthorized connection attempt detected from IP address 222.244.139.34 to port 1433 [T] |
2020-01-07 00:03:06 |
| 190.110.212.195 | attackbotsspam | firewall-block, port(s): 1433/tcp |
2020-01-06 23:53:23 |
| 180.167.16.82 | attackspambots | Unauthorized connection attempt detected from IP address 180.167.16.82 to port 22 [T] |
2020-01-07 00:04:44 |
| 183.82.118.71 | attack | 20/1/6@08:12:38: FAIL: Alarm-Network address from=183.82.118.71 ... |
2020-01-06 23:55:24 |
| 89.248.168.112 | attack | Unauthorized connection attempt detected from IP address 89.248.168.112 to port 1723 [T] |
2020-01-06 23:59:19 |
| 112.85.42.180 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180 user=root Failed password for root from 112.85.42.180 port 61680 ssh2 Failed password for root from 112.85.42.180 port 61680 ssh2 Failed password for root from 112.85.42.180 port 61680 ssh2 Failed password for root from 112.85.42.180 port 61680 ssh2 |
2020-01-06 23:50:29 |
| 222.186.180.9 | attack | Jan 6 16:54:18 MK-Soft-Root1 sshd[23690]: Failed password for root from 222.186.180.9 port 8012 ssh2 Jan 6 16:54:20 MK-Soft-Root1 sshd[23690]: Failed password for root from 222.186.180.9 port 8012 ssh2 ... |
2020-01-06 23:56:21 |
| 95.153.78.97 | attack | 1578316343 - 01/06/2020 14:12:23 Host: 95.153.78.97/95.153.78.97 Port: 445 TCP Blocked |
2020-01-06 23:37:39 |