城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.20.130.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;71.20.130.234. IN A
;; AUTHORITY SECTION:
. 118 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023100500 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 06 00:26:01 CST 2023
;; MSG SIZE rcvd: 106
Host 234.130.20.71.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 234.130.20.71.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.34.63.128 | attack | $f2bV_matches |
2020-07-26 01:14:12 |
| 109.65.67.8 | attackbotsspam | Automatic report - Port Scan Attack |
2020-07-26 01:22:17 |
| 97.64.120.166 | attackspambots | Jul 25 15:53:08 rush sshd[3257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.64.120.166 Jul 25 15:53:10 rush sshd[3257]: Failed password for invalid user ravi from 97.64.120.166 port 35946 ssh2 Jul 25 16:00:58 rush sshd[3401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.64.120.166 ... |
2020-07-26 01:32:52 |
| 200.125.188.188 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-07-26 00:51:16 |
| 103.138.108.48 | attackbotsspam | Jul 25 18:30:27 offspring postfix/smtpd[18303]: connect from unknown[103.138.108.48] Jul 25 18:30:28 offspring postfix/smtpd[18303]: warning: unknown[103.138.108.48]: SASL LOGIN authentication failed: authentication failure Jul 25 18:30:28 offspring postfix/smtpd[18303]: lost connection after AUTH from unknown[103.138.108.48] Jul 25 18:30:28 offspring postfix/smtpd[18303]: disconnect from unknown[103.138.108.48] Jul 25 18:30:29 offspring postfix/smtpd[18303]: connect from unknown[103.138.108.48] Jul 25 18:30:30 offspring postfix/smtpd[18303]: warning: unknown[103.138.108.48]: SASL LOGIN authentication failed: authentication failure Jul 25 18:30:30 offspring postfix/smtpd[18303]: lost connection after AUTH from unknown[103.138.108.48] Jul 25 18:30:30 offspring postfix/smtpd[18303]: disconnect from unknown[103.138.108.48] Jul 25 18:30:31 offspring postfix/smtpd[18303]: connect from unknown[103.138.108.48] Jul 25 18:30:32 offspring postfix/smtpd[18303]: warning: unknown[10........ ------------------------------- |
2020-07-26 01:31:26 |
| 185.129.169.136 | attackbotsspam | Port Scan ... |
2020-07-26 01:32:03 |
| 218.92.0.220 | attackspam | 2020-07-25T20:28:19.078938lavrinenko.info sshd[3646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220 user=root 2020-07-25T20:28:21.322190lavrinenko.info sshd[3646]: Failed password for root from 218.92.0.220 port 15402 ssh2 2020-07-25T20:28:19.078938lavrinenko.info sshd[3646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220 user=root 2020-07-25T20:28:21.322190lavrinenko.info sshd[3646]: Failed password for root from 218.92.0.220 port 15402 ssh2 2020-07-25T20:28:24.768296lavrinenko.info sshd[3646]: Failed password for root from 218.92.0.220 port 15402 ssh2 ... |
2020-07-26 01:29:59 |
| 218.92.0.221 | attack | Jul 25 19:05:07 abendstille sshd\[14741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.221 user=root Jul 25 19:05:09 abendstille sshd\[14741\]: Failed password for root from 218.92.0.221 port 54206 ssh2 Jul 25 19:05:16 abendstille sshd\[14830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.221 user=root Jul 25 19:05:18 abendstille sshd\[14830\]: Failed password for root from 218.92.0.221 port 24904 ssh2 Jul 25 19:05:20 abendstille sshd\[14830\]: Failed password for root from 218.92.0.221 port 24904 ssh2 ... |
2020-07-26 01:07:09 |
| 111.231.190.106 | attackspambots | Invalid user cyn from 111.231.190.106 port 52406 |
2020-07-26 01:03:40 |
| 187.156.84.58 | attack | Honeypot attack, port: 445, PTR: dsl-187-156-84-58-dyn.prod-infinitum.com.mx. |
2020-07-26 01:21:21 |
| 14.48.133.246 | attackspam | Exploited Host. |
2020-07-26 01:24:06 |
| 13.90.150.51 | attack | Jul 25 21:44:50 gw1 sshd[20976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.90.150.51 Jul 25 21:44:52 gw1 sshd[20976]: Failed password for invalid user md from 13.90.150.51 port 58470 ssh2 ... |
2020-07-26 01:19:18 |
| 85.172.38.200 | attackbotsspam | 2020-07-25T19:20:48.633939ks3355764 sshd[30008]: Invalid user jun from 85.172.38.200 port 45995 2020-07-25T19:20:50.644258ks3355764 sshd[30008]: Failed password for invalid user jun from 85.172.38.200 port 45995 ssh2 ... |
2020-07-26 01:28:51 |
| 192.144.185.74 | attackspam | 2020-07-25T18:10:32.016382snf-827550 sshd[15381]: Invalid user ubuntu from 192.144.185.74 port 55174 2020-07-25T18:10:33.693544snf-827550 sshd[15381]: Failed password for invalid user ubuntu from 192.144.185.74 port 55174 ssh2 2020-07-25T18:15:33.272579snf-827550 sshd[15390]: Invalid user noel from 192.144.185.74 port 38886 ... |
2020-07-26 00:59:13 |
| 186.193.5.78 | attackspam | Unauthorized connection attempt from IP address 186.193.5.78 on Port 445(SMB) |
2020-07-26 00:52:46 |