城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.139.80.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7623
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;69.139.80.189. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 13:49:51 CST 2025
;; MSG SIZE rcvd: 106
189.80.139.69.in-addr.arpa domain name pointer c-69-139-80-189.hsd1.pa.comcast.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
189.80.139.69.in-addr.arpa name = c-69-139-80-189.hsd1.pa.comcast.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 58.209.53.87 | attack | Jan 30 15:26:09 debian-2gb-nbg1-2 kernel: \[2653630.737814\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=58.209.53.87 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=49 ID=37398 PROTO=TCP SPT=64693 DPT=23 WINDOW=61093 RES=0x00 SYN URGP=0 |
2020-01-30 23:39:30 |
| 103.219.112.47 | attack | Unauthorized connection attempt detected from IP address 103.219.112.47 to port 2220 [J] |
2020-01-30 23:20:44 |
| 203.223.44.214 | attack | Unauthorized connection attempt detected from IP address 203.223.44.214 to port 8080 [J] |
2020-01-30 23:12:14 |
| 102.40.238.212 | attackspambots | Unauthorized connection attempt detected from IP address 102.40.238.212 to port 23 [J] |
2020-01-30 23:07:59 |
| 222.186.175.151 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151 user=root Failed password for root from 222.186.175.151 port 46582 ssh2 Failed password for root from 222.186.175.151 port 46582 ssh2 Failed password for root from 222.186.175.151 port 46582 ssh2 Failed password for root from 222.186.175.151 port 46582 ssh2 |
2020-01-30 23:02:55 |
| 101.254.182.206 | attackbots | Unauthorized connection attempt detected from IP address 101.254.182.206 to port 1433 [J] |
2020-01-30 23:21:39 |
| 188.166.24.82 | attack | Unauthorized connection attempt detected from IP address 188.166.24.82 to port 102 [J] |
2020-01-30 23:14:21 |
| 47.185.48.26 | attackspambots | Unauthorized connection attempt detected from IP address 47.185.48.26 to port 23 [J] |
2020-01-30 23:41:26 |
| 36.37.251.129 | attackbotsspam | Unauthorized connection attempt detected from IP address 36.37.251.129 to port 23 [J] |
2020-01-30 23:11:03 |
| 124.156.50.77 | attackbots | Unauthorized connection attempt detected from IP address 124.156.50.77 to port 3311 [J] |
2020-01-30 23:31:39 |
| 94.255.197.15 | attackspam | Unauthorized connection attempt detected from IP address 94.255.197.15 to port 5555 [J] |
2020-01-30 23:34:19 |
| 78.186.35.168 | attackbotsspam | Unauthorized connection attempt detected from IP address 78.186.35.168 to port 4567 [J] |
2020-01-30 23:09:12 |
| 106.54.196.110 | attack | Unauthorized connection attempt detected from IP address 106.54.196.110 to port 2220 [J] |
2020-01-30 23:20:24 |
| 182.176.91.245 | attack | Unauthorized connection attempt detected from IP address 182.176.91.245 to port 2220 [J] |
2020-01-30 23:04:54 |
| 103.95.12.132 | attack | 5x Failed Password |
2020-01-30 23:21:08 |