城市(city): unknown
省份(region): unknown
国家(country): Netherlands (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.80.128.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27912
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;84.80.128.140. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 05:52:37 CST 2025
;; MSG SIZE rcvd: 106
140.128.80.84.in-addr.arpa domain name pointer 84-80-128-140.fixed.kpn.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.128.80.84.in-addr.arpa name = 84-80-128-140.fixed.kpn.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 195.228.80.166 | attackspam | B: Abusive ssh attack |
2020-08-28 01:46:27 |
| 196.65.124.189 | attack | Spammer_1 |
2020-08-28 01:30:12 |
| 68.183.137.173 | attackbotsspam | 2020-08-27T17:05:27+0200 Failed SSH Authentication/Brute Force Attack. (Server 5) |
2020-08-28 01:17:12 |
| 120.9.84.63 | attackbotsspam | Unauthorised access (Aug 27) SRC=120.9.84.63 LEN=40 TTL=46 ID=4693 TCP DPT=8080 WINDOW=18653 SYN |
2020-08-28 01:16:19 |
| 106.12.22.202 | attack | 6568/tcp 6590/tcp 21201/tcp... [2020-07-07/08-27]12pkt,12pt.(tcp) |
2020-08-28 01:49:11 |
| 171.235.63.174 | attackspam | Aug 27 13:56:05 master sshd[30975]: Failed password for invalid user admin from 171.235.63.174 port 33886 ssh2 Aug 27 13:58:11 master sshd[30977]: Failed password for invalid user support from 171.235.63.174 port 43248 ssh2 Aug 27 13:58:27 master sshd[30979]: Failed password for invalid user user from 171.235.63.174 port 44206 ssh2 Aug 27 13:59:51 master sshd[30981]: Failed password for root from 171.235.63.174 port 41512 ssh2 Aug 27 14:02:54 master sshd[31002]: Failed password for invalid user system from 171.235.63.174 port 60462 ssh2 Aug 27 14:05:58 master sshd[31004]: Failed password for invalid user admin from 171.235.63.174 port 55430 ssh2 Aug 27 14:08:58 master sshd[31007]: Failed password for invalid user admin from 171.235.63.174 port 40848 ssh2 Aug 27 14:13:34 master sshd[31105]: Failed password for invalid user admin from 171.235.63.174 port 54946 ssh2 Aug 27 14:16:11 master sshd[31122]: Failed password for invalid user user from 171.235.63.174 port 42990 ssh2 |
2020-08-28 01:36:31 |
| 106.54.14.42 | attack | Aug 27 08:59:30 Tower sshd[40905]: Connection from 106.54.14.42 port 39222 on 192.168.10.220 port 22 rdomain "" Aug 27 08:59:32 Tower sshd[40905]: Invalid user louwg from 106.54.14.42 port 39222 Aug 27 08:59:32 Tower sshd[40905]: error: Could not get shadow information for NOUSER Aug 27 08:59:32 Tower sshd[40905]: Failed password for invalid user louwg from 106.54.14.42 port 39222 ssh2 Aug 27 08:59:33 Tower sshd[40905]: Received disconnect from 106.54.14.42 port 39222:11: Bye Bye [preauth] Aug 27 08:59:33 Tower sshd[40905]: Disconnected from invalid user louwg 106.54.14.42 port 39222 [preauth] |
2020-08-28 01:42:51 |
| 161.35.37.149 | attackspam | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-28 01:41:25 |
| 5.173.16.12 | attackspambots | Spammer_1 |
2020-08-28 01:26:36 |
| 122.51.204.45 | attack | Aug 27 17:24:46 scw-tender-jepsen sshd[27492]: Failed password for root from 122.51.204.45 port 19624 ssh2 Aug 27 17:26:08 scw-tender-jepsen sshd[27528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.204.45 |
2020-08-28 01:42:27 |
| 168.62.174.233 | attack | 2020-08-27T12:56:03.108479abusebot-4.cloudsearch.cf sshd[28015]: Invalid user leech from 168.62.174.233 port 52768 2020-08-27T12:56:03.113715abusebot-4.cloudsearch.cf sshd[28015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.62.174.233 2020-08-27T12:56:03.108479abusebot-4.cloudsearch.cf sshd[28015]: Invalid user leech from 168.62.174.233 port 52768 2020-08-27T12:56:05.144804abusebot-4.cloudsearch.cf sshd[28015]: Failed password for invalid user leech from 168.62.174.233 port 52768 ssh2 2020-08-27T12:59:51.426979abusebot-4.cloudsearch.cf sshd[28063]: Invalid user zfy from 168.62.174.233 port 33552 2020-08-27T12:59:51.433261abusebot-4.cloudsearch.cf sshd[28063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.62.174.233 2020-08-27T12:59:51.426979abusebot-4.cloudsearch.cf sshd[28063]: Invalid user zfy from 168.62.174.233 port 33552 2020-08-27T12:59:53.765194abusebot-4.cloudsearch.cf sshd[28063]: Fai ... |
2020-08-28 01:41:05 |
| 185.132.1.52 | attackspam | Aug 27 12:01:33 XXX sshd[37022]: Invalid user hdfs from 185.132.1.52 port 27976 |
2020-08-28 01:36:13 |
| 139.162.110.42 | attack | Unauthorised access (Aug 27) SRC=139.162.110.42 LEN=40 TTL=246 ID=54321 TCP DPT=3306 WINDOW=65535 SYN Unauthorised access (Aug 25) SRC=139.162.110.42 LEN=40 TOS=0x10 PREC=0x40 TTL=239 ID=54321 TCP DPT=3306 WINDOW=65535 SYN Unauthorised access (Aug 23) SRC=139.162.110.42 LEN=40 TOS=0x10 PREC=0x40 TTL=239 ID=54321 TCP DPT=3306 WINDOW=65535 SYN |
2020-08-28 01:27:49 |
| 118.27.5.46 | attackspambots | Invalid user xt from 118.27.5.46 port 51754 |
2020-08-28 01:52:43 |
| 51.91.77.103 | attackbots | Aug 27 12:06:34 XXX sshd[37389]: Invalid user avl from 51.91.77.103 port 54080 |
2020-08-28 01:35:09 |