城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.17.129.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;6.17.129.49. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 15:19:59 CST 2025
;; MSG SIZE rcvd: 104
Host 49.129.17.6.in-addr.arpa not found: 2(SERVFAIL)
server can't find 6.17.129.49.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 88.255.84.68 | attackspam | 445/tcp 445/tcp 445/tcp... [2020-02-15/04-05]12pkt,1pt.(tcp) |
2020-04-06 04:35:55 |
| 88.88.40.133 | attackspambots | Apr 5 19:36:52 host5 sshd[26651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ti0107a400-2680.bb.online.no user=root Apr 5 19:36:54 host5 sshd[26651]: Failed password for root from 88.88.40.133 port 34670 ssh2 ... |
2020-04-06 04:23:25 |
| 1.64.208.72 | attack | Port probing on unauthorized port 5555 |
2020-04-06 04:21:59 |
| 206.189.157.183 | attackbotsspam | 206.189.157.183 - - [05/Apr/2020:19:24:06 +0300] "POST /wp-login.php HTTP/1.1" 200 2514 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-06 04:50:47 |
| 113.140.10.134 | attack | Apr 5 14:49:39 lanister sshd[10090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.10.134 user=root Apr 5 14:49:41 lanister sshd[10090]: Failed password for root from 113.140.10.134 port 43452 ssh2 Apr 5 14:54:44 lanister sshd[10159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.140.10.134 user=root Apr 5 14:54:45 lanister sshd[10159]: Failed password for root from 113.140.10.134 port 47200 ssh2 |
2020-04-06 04:21:16 |
| 210.56.60.135 | attack | 1433/tcp 445/tcp... [2020-02-10/04-04]7pkt,2pt.(tcp) |
2020-04-06 04:21:40 |
| 2.139.209.78 | attackbotsspam | Apr 5 16:30:08 ws12vmsma01 sshd[11392]: Failed password for root from 2.139.209.78 port 59763 ssh2 Apr 5 16:33:50 ws12vmsma01 sshd[11998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.red-2-139-209.staticip.rima-tde.net user=root Apr 5 16:33:51 ws12vmsma01 sshd[11998]: Failed password for root from 2.139.209.78 port 36212 ssh2 ... |
2020-04-06 04:52:48 |
| 176.26.22.94 | attack | Honeypot Attack, Port 23 |
2020-04-06 04:53:13 |
| 67.205.138.198 | attackbotsspam | 2020-04-05T14:23:39.555310v22018076590370373 sshd[32379]: Failed password for root from 67.205.138.198 port 53656 ssh2 2020-04-05T14:30:47.668230v22018076590370373 sshd[7372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.198 user=root 2020-04-05T14:30:49.925899v22018076590370373 sshd[7372]: Failed password for root from 67.205.138.198 port 37230 ssh2 2020-04-05T14:37:51.367730v22018076590370373 sshd[10941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.198 user=root 2020-04-05T14:37:53.499544v22018076590370373 sshd[10941]: Failed password for root from 67.205.138.198 port 49032 ssh2 ... |
2020-04-06 04:36:23 |
| 80.211.136.164 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 68 - port: 6192 proto: TCP cat: Misc Attack |
2020-04-06 04:47:56 |
| 155.4.19.42 | attackbots | 2020-03-29 15:55:05 server sshd[14823]: Failed password for invalid user www from 155.4.19.42 port 32862 ssh2 |
2020-04-06 04:54:50 |
| 188.17.153.74 | attack | 445/tcp 1433/tcp... [2020-02-15/04-05]10pkt,2pt.(tcp) |
2020-04-06 04:22:12 |
| 185.22.142.135 | attackspambots | Automatic report - Port Scan Attack |
2020-04-06 04:54:02 |
| 223.247.140.89 | attackbots | $f2bV_matches |
2020-04-06 04:28:52 |
| 148.72.206.225 | attack | Fail2Ban Ban Triggered (2) |
2020-04-06 04:37:29 |