城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.47.208.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.47.208.89. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:57:33 CST 2025
;; MSG SIZE rcvd: 105
89.208.47.74.in-addr.arpa domain name pointer 74-47-208-89.dr01.tntw.in.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
89.208.47.74.in-addr.arpa name = 74-47-208-89.dr01.tntw.in.frontiernet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.248.121.227 | attackspam | " " |
2020-06-11 12:21:15 |
| 51.79.86.174 | attackbotsspam | SSH brute-force attempt |
2020-06-11 12:07:22 |
| 185.175.93.104 | attackbots | =Multiport scan 360 ports : 3 81 135(x2) 139 222 443 445(x2) 678(x2) 999(x2) 1000(x2) 1001(x2) 1003 1021(x2) 1089(x2) 1110 1111 1122(x2) 1189(x2) 1213 1234(x2) 1313(x2) 1314(x2) 1338(x2) 1448 1616(x2) 1718(x2) 1818(x2) 2000 2001 2015 2017 2018 2090 2112(x2) 2222 2289 2300 2389 2512 2525 2828 3001 3003 3020 3073 3080 3090 3129 3192 3200 3202 3232 3262 3301 3302 3303 3306 3309 3322 3323 3331 3333(x2) 3334 3343 3344 3351 3366 3377 3380 3381 3382 3384 3385 3386 3388 3390 3393 3394 3398 3401(x2) 3402(x2) 3403(x2) 3405(x2) 3407(x2) 3409 3410(x2) 3444(x2) 3456 3473 3489 3500(x2) 3501(x2) 3535(x2) 3541 3555(x2) 3589(x2) 3636(x2) 3669(x2) 3777(x2) 3817 3820(x2) 3838(x2) 3839(x2) 3884 3900 3901(x2) 3922(x2) 3939(x2) 3940(x2) 3999(x2) 4000(x2) 4001 4002 4010 4041 4082 4100 4201 4243 4371 4450 4545 4567 4606 4742(x2) 4779 4785 4900 4950 5000 5017(x2) 5050 5051(x2) 5100 5311(x2) 5328 5353 5365(x2) 5432(x3) 5469(x2) 5500 5558 5560 5566 5577 5582(x2) 5775 5999(x2) 6000 6001 6006 6030 6121(x2) 6150(x2).... |
2020-06-11 08:35:24 |
| 51.116.173.70 | attackspambots | SSH brute-force attempt |
2020-06-11 12:04:41 |
| 178.128.248.121 | attackspam | 2020-06-11T00:11:40.749067upcloud.m0sh1x2.com sshd[1410]: Invalid user sanchi from 178.128.248.121 port 45132 |
2020-06-11 08:29:03 |
| 209.97.189.106 | attackspam | Jun 10 11:23:43 zn008 sshd[1670]: Failed password for r.r from 209.97.189.106 port 51180 ssh2 Jun 10 11:23:43 zn008 sshd[1670]: Received disconnect from 209.97.189.106: 11: Bye Bye [preauth] Jun 10 11:37:15 zn008 sshd[3452]: Invalid user mary from 209.97.189.106 Jun 10 11:37:17 zn008 sshd[3452]: Failed password for invalid user mary from 209.97.189.106 port 47254 ssh2 Jun 10 11:37:17 zn008 sshd[3452]: Received disconnect from 209.97.189.106: 11: Bye Bye [preauth] Jun 10 11:42:04 zn008 sshd[4097]: Failed password for r.r from 209.97.189.106 port 55704 ssh2 Jun 10 11:42:04 zn008 sshd[4097]: Received disconnect from 209.97.189.106: 11: Bye Bye [preauth] Jun 10 11:46:13 zn008 sshd[4590]: Invalid user qhsupport from 209.97.189.106 Jun 10 11:46:15 zn008 sshd[4590]: Failed password for invalid user qhsupport from 209.97.189.106 port 35902 ssh2 Jun 10 11:46:15 zn008 sshd[4590]: Received disconnect from 209.97.189.106: 11: Bye Bye [preauth] Jun 10 11:50:24 zn008 sshd[5149]: Inva........ ------------------------------- |
2020-06-11 12:19:32 |
| 106.12.82.217 | attack | Scanned 3 times in the last 24 hours on port 22 |
2020-06-11 08:32:00 |
| 162.243.144.104 | attackbotsspam | " " |
2020-06-11 12:22:29 |
| 138.68.234.162 | attackspambots | Invalid user unix from 138.68.234.162 port 36850 |
2020-06-11 12:03:25 |
| 68.183.110.49 | attackbotsspam | Jun 10 21:21:33 game-panel sshd[13679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.110.49 Jun 10 21:21:35 game-panel sshd[13679]: Failed password for invalid user tfv from 68.183.110.49 port 56524 ssh2 Jun 10 21:24:41 game-panel sshd[13805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.110.49 |
2020-06-11 08:25:54 |
| 49.234.47.124 | attack | 20 attempts against mh-ssh on cloud |
2020-06-11 12:11:59 |
| 144.172.73.45 | attack | Jun 11 05:58:53 vps sshd[19678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.73.45 Jun 11 05:58:54 vps sshd[19678]: Failed password for invalid user honey from 144.172.73.45 port 40404 ssh2 Jun 11 05:58:57 vps sshd[19684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.73.45 ... |
2020-06-11 12:10:26 |
| 46.101.113.206 | attackspambots | (sshd) Failed SSH login from 46.101.113.206 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 11 06:47:48 srv sshd[18063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.113.206 user=root Jun 11 06:47:50 srv sshd[18063]: Failed password for root from 46.101.113.206 port 51082 ssh2 Jun 11 06:57:59 srv sshd[18172]: Invalid user hjm from 46.101.113.206 port 42118 Jun 11 06:58:01 srv sshd[18172]: Failed password for invalid user hjm from 46.101.113.206 port 42118 ssh2 Jun 11 07:00:57 srv sshd[18218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.113.206 user=root |
2020-06-11 12:12:27 |
| 139.99.237.183 | attackspambots | 2020-06-10 14:27:14.779515-0500 localhost sshd[24948]: Failed password for invalid user admin from 139.99.237.183 port 39806 ssh2 |
2020-06-11 08:34:57 |
| 129.204.235.54 | attackspam | Jun 11 06:11:23 legacy sshd[3726]: Failed password for root from 129.204.235.54 port 41308 ssh2 Jun 11 06:15:40 legacy sshd[3810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.235.54 Jun 11 06:15:43 legacy sshd[3810]: Failed password for invalid user gf from 129.204.235.54 port 42310 ssh2 ... |
2020-06-11 12:23:06 |