城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.94.246.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18167
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.94.246.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022600 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 18:19:57 CST 2025
;; MSG SIZE rcvd: 105
20.246.94.64.in-addr.arpa domain name pointer s10.4nh.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.246.94.64.in-addr.arpa name = s10.4nh.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 204.48.19.178 | attack | Jul 11 09:43:20 tux-35-217 sshd\[26870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178 user=root Jul 11 09:43:22 tux-35-217 sshd\[26870\]: Failed password for root from 204.48.19.178 port 36984 ssh2 Jul 11 09:45:46 tux-35-217 sshd\[26884\]: Invalid user nagios from 204.48.19.178 port 36474 Jul 11 09:45:46 tux-35-217 sshd\[26884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.19.178 ... |
2019-07-11 17:10:39 |
| 183.249.121.182 | attackspam | 37215/tcp 37215/tcp 23/tcp [2019-06-30/07-11]3pkt |
2019-07-11 17:29:22 |
| 200.207.63.165 | attack | Jul 11 08:51:09 vps647732 sshd[21322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.207.63.165 Jul 11 08:51:11 vps647732 sshd[21322]: Failed password for invalid user google from 200.207.63.165 port 43493 ssh2 ... |
2019-07-11 16:49:57 |
| 201.174.182.159 | attackspam | Jul 11 10:27:41 pornomens sshd\[13205\]: Invalid user linda from 201.174.182.159 port 40685 Jul 11 10:27:41 pornomens sshd\[13205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.182.159 Jul 11 10:27:42 pornomens sshd\[13205\]: Failed password for invalid user linda from 201.174.182.159 port 40685 ssh2 ... |
2019-07-11 16:56:03 |
| 83.103.170.113 | attackspam | 9527/tcp 23/tcp 2323/tcp... [2019-06-09/07-11]4pkt,3pt.(tcp) |
2019-07-11 17:32:20 |
| 61.135.33.50 | attack | SSH Brute Force, server-1 sshd[29078]: Failed password for invalid user nitesh from 61.135.33.50 port 44694 ssh2 |
2019-07-11 17:13:43 |
| 198.100.159.86 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(07111009) |
2019-07-11 17:21:20 |
| 47.223.114.69 | attackbots | SSHScan |
2019-07-11 16:49:22 |
| 186.90.190.190 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 02:18:37,903 INFO [amun_request_handler] PortScan Detected on Port: 445 (186.90.190.190) |
2019-07-11 17:08:52 |
| 159.203.35.91 | attackspam | " " |
2019-07-11 17:16:00 |
| 116.103.233.185 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 02:14:18,505 INFO [amun_request_handler] PortScan Detected on Port: 445 (116.103.233.185) |
2019-07-11 17:22:22 |
| 107.170.192.80 | attackspam | *Port Scan* detected from 107.170.192.80 (US/United States/zg-0301d-65.stretchoid.com). 4 hits in the last 275 seconds |
2019-07-11 16:51:51 |
| 114.31.244.3 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:47:40,956 INFO [amun_request_handler] PortScan Detected on Port: 445 (114.31.244.3) |
2019-07-11 17:14:55 |
| 113.160.183.125 | attackspambots | Unauthorized connection attempt from IP address 113.160.183.125 on Port 445(SMB) |
2019-07-11 17:17:29 |
| 197.60.54.122 | attackspambots | Telnet Server BruteForce Attack |
2019-07-11 17:04:27 |