城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.149.89.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20748
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;81.149.89.57.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 13:39:36 CST 2025
;; MSG SIZE  rcvd: 105
        57.89.149.81.in-addr.arpa domain name pointer host81-149-89-57.in-addr.btopenworld.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
57.89.149.81.in-addr.arpa	name = host81-149-89-57.in-addr.btopenworld.com.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 134.73.129.232 | attackbots | Jul 28 02:07:37 mail sshd\[32448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.129.232 user=root Jul 28 02:07:39 mail sshd\[32448\]: Failed password for root from 134.73.129.232 port 52248 ssh2 ...  | 
                    2019-07-28 15:58:59 | 
| 168.194.86.148 | attackspam | Port scan and direct access per IP instead of hostname  | 
                    2019-07-28 16:00:00 | 
| 14.232.175.130 | attackbots | port scan and connect, tcp 22 (ssh)  | 
                    2019-07-28 16:50:32 | 
| 140.143.16.158 | attackspam | GET /thinkphp/html/public/index.php HTTP/1.1  | 
                    2019-07-28 16:13:13 | 
| 186.220.179.74 | attack | port scan and connect, tcp 23 (telnet)  | 
                    2019-07-28 16:29:13 | 
| 178.62.239.249 | attack | SSH Brute Force, server-1 sshd[13532]: Failed password for root from 178.62.239.249 port 43838 ssh2  | 
                    2019-07-28 16:20:01 | 
| 103.54.250.103 | attackbotsspam | Jul 28 09:57:58 vps647732 sshd[14675]: Failed password for root from 103.54.250.103 port 51122 ssh2 ...  | 
                    2019-07-28 16:16:22 | 
| 162.243.141.204 | attackspam | 21482/tcp 119/tcp 5900/tcp... [2019-05-27/07-27]50pkt,45pt.(tcp),3pt.(udp)  | 
                    2019-07-28 16:03:57 | 
| 13.229.76.34 | attack | GET /manager/html HTTP/1.1  | 
                    2019-07-28 16:32:17 | 
| 77.247.110.15 | attackbots | " "  | 
                    2019-07-28 16:52:35 | 
| 64.20.48.178 | attack | Jul 27 20:50:13 server6 sshd[11423]: reveeclipse mapping checking getaddrinfo for server.newssellprod.club [64.20.48.178] failed - POSSIBLE BREAK-IN ATTEMPT! Jul 27 20:50:13 server6 sshd[11423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.20.48.178 user=r.r Jul 27 20:50:15 server6 sshd[11423]: Failed password for r.r from 64.20.48.178 port 49388 ssh2 Jul 27 20:50:15 server6 sshd[11423]: Received disconnect from 64.20.48.178: 11: Bye Bye [preauth] Jul 27 21:01:45 server6 sshd[25303]: reveeclipse mapping checking getaddrinfo for server.newssellprod.club [64.20.48.178] failed - POSSIBLE BREAK-IN ATTEMPT! Jul 27 21:01:45 server6 sshd[25303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.20.48.178 user=r.r Jul 27 21:01:47 server6 sshd[25303]: Failed password for r.r from 64.20.48.178 port 32920 ssh2 Jul 27 21:01:47 server6 sshd[25303]: Received disconnect from 64.20.48.178: 11: Bye ........ -------------------------------  | 
                    2019-07-28 16:10:24 | 
| 128.14.209.242 | attackspambots | Port scan and direct access per IP instead of hostname  | 
                    2019-07-28 16:40:35 | 
| 139.162.146.15 | attackbots | GET /api/v1/pods HTTP/1.1  | 
                    2019-07-28 16:15:52 | 
| 63.83.73.134 | attack | $f2bV_matches  | 
                    2019-07-28 16:09:22 | 
| 139.162.116.133 | attack | Port scan and direct access per IP instead of hostname  | 
                    2019-07-28 16:20:45 |