城市(city): Walchwil
省份(region): Zug
国家(country): Switzerland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.136.108.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.136.108.80. IN A
;; AUTHORITY SECTION:
. 378 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020061901 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 20 08:43:42 CST 2020
;; MSG SIZE rcvd: 117
80.108.136.82.in-addr.arpa domain name pointer pub082136108080.dh-hfc.datazug.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.108.136.82.in-addr.arpa name = pub082136108080.dh-hfc.datazug.ch.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.40.4.94 | attack | Dec 27 09:20:05 mail kernel: [828499.886699] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=185.40.4.94 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=16143 DF PROTO=TCP SPT=6 DPT=40066 WINDOW=512 RES=0x00 SYN URGP=0 ... |
2019-12-27 19:57:44 |
| 103.200.134.5 | attackspambots | Unauthorized connection attempt detected from IP address 103.200.134.5 to port 445 |
2019-12-27 19:42:11 |
| 74.82.47.16 | attack | Unauthorised access (Dec 27) SRC=74.82.47.16 LEN=40 TTL=242 ID=54321 TCP DPT=445 WINDOW=65535 SYN |
2019-12-27 19:46:06 |
| 178.62.78.183 | attackspam | Dec 27 08:24:22 raspberrypi sshd\[24978\]: Failed password for root from 178.62.78.183 port 38304 ssh2Dec 27 08:27:41 raspberrypi sshd\[25352\]: Failed password for root from 178.62.78.183 port 43700 ssh2Dec 27 08:31:18 raspberrypi sshd\[25709\]: Invalid user seder from 178.62.78.183 ... |
2019-12-27 19:44:56 |
| 45.55.155.224 | attackspam | Dec 27 00:16:42 dallas01 sshd[24499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.224 Dec 27 00:16:44 dallas01 sshd[24499]: Failed password for invalid user guest from 45.55.155.224 port 47121 ssh2 Dec 27 00:23:34 dallas01 sshd[29536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.224 |
2019-12-27 19:51:59 |
| 51.83.104.120 | attack | Invalid user petschi from 51.83.104.120 port 40570 |
2019-12-27 19:38:01 |
| 106.222.73.197 | attackbots | 1577427828 - 12/27/2019 07:23:48 Host: 106.222.73.197/106.222.73.197 Port: 445 TCP Blocked |
2019-12-27 19:48:59 |
| 14.63.174.149 | attackspam | $f2bV_matches |
2019-12-27 20:10:00 |
| 68.183.155.33 | attackbotsspam | Invalid user server from 68.183.155.33 port 42244 |
2019-12-27 20:11:12 |
| 151.84.222.52 | attackspam | Dec 26 22:11:47 php1 sshd\[21225\]: Invalid user Justin from 151.84.222.52 Dec 26 22:11:47 php1 sshd\[21225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.84.222.52 Dec 26 22:11:50 php1 sshd\[21225\]: Failed password for invalid user Justin from 151.84.222.52 port 24137 ssh2 Dec 26 22:19:21 php1 sshd\[21882\]: Invalid user rhg0704 from 151.84.222.52 Dec 26 22:19:21 php1 sshd\[21882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.84.222.52 |
2019-12-27 19:48:23 |
| 46.38.144.117 | attackbotsspam | Dec 27 12:55:09 webserver postfix/smtpd\[2806\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 27 12:56:43 webserver postfix/smtpd\[2806\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 27 12:58:23 webserver postfix/smtpd\[2806\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 27 13:00:05 webserver postfix/smtpd\[2806\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 27 13:01:45 webserver postfix/smtpd\[2806\]: warning: unknown\[46.38.144.117\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-27 20:08:42 |
| 124.205.131.139 | attackbotsspam | Unauthorized connection attempt detected from IP address 124.205.131.139 to port 1433 |
2019-12-27 19:33:14 |
| 185.225.17.99 | attack | Hacking attempt - Drupal user/register |
2019-12-27 19:50:50 |
| 195.244.209.112 | attackspam | Brute forcing RDP port 3389 |
2019-12-27 20:16:25 |
| 141.98.10.73 | attackbotsspam | Dec 27 05:32:06 web1 postfix/smtpd[14509]: warning: unknown[141.98.10.73]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-27 19:35:14 |