城市(city): Sankt Jakob in Defereggen
省份(region): Tyrol
国家(country): Austria
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.13.6.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50694
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.13.6.205. IN A
;; AUTHORITY SECTION:
. 592 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020081401 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 15 07:44:10 CST 2020
;; MSG SIZE rcvd: 115
205.6.13.85.in-addr.arpa domain name pointer 85.13.6.205.jm-data.at.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
205.6.13.85.in-addr.arpa name = 85.13.6.205.jm-data.at.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
162.243.139.192 | attackspam | 2000/tcp 9042/tcp 1946/tcp... [2020-04-30/05-23]20pkt,17pt.(tcp),3pt.(udp) |
2020-05-24 20:08:23 |
77.247.110.58 | attackbotsspam | 05/24/2020-08:16:45.569374 77.247.110.58 Protocol: 17 ET SCAN Sipvicious Scan |
2020-05-24 20:21:11 |
195.54.160.130 | attackbots | 05/24/2020-08:16:44.793979 195.54.160.130 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-24 20:21:35 |
89.31.46.115 | attack | May 24 05:05:01 mail.srvfarm.net postfix/smtps/smtpd[3860049]: warning: unknown[89.31.46.115]: SASL PLAIN authentication failed: May 24 05:05:01 mail.srvfarm.net postfix/smtps/smtpd[3860049]: lost connection after AUTH from unknown[89.31.46.115] May 24 05:09:12 mail.srvfarm.net postfix/smtpd[3861509]: warning: unknown[89.31.46.115]: SASL PLAIN authentication failed: May 24 05:09:12 mail.srvfarm.net postfix/smtpd[3861509]: lost connection after AUTH from unknown[89.31.46.115] May 24 05:11:10 mail.srvfarm.net postfix/smtps/smtpd[3856794]: warning: unknown[89.31.46.115]: SASL PLAIN authentication failed: May 24 05:11:10 mail.srvfarm.net postfix/smtps/smtpd[3856794]: lost connection after AUTH from unknown[89.31.46.115] |
2020-05-24 20:15:41 |
14.247.185.138 | attack | Unauthorized connection attempt from IP address 14.247.185.138 on Port 445(SMB) |
2020-05-24 19:41:18 |
66.249.66.29 | attack | 66.249.66.29 - - - [24/May/2020:14:16:44 +0200] "GET /wp-login.php HTTP/1.1" 404 564 "-" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.92 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" "-" "-" |
2020-05-24 20:20:40 |
14.49.253.8 | attackbots | Attempted connection to port 2323. |
2020-05-24 19:50:24 |
47.101.193.3 | attackbots | 47.101.193.3 - - \[24/May/2020:10:22:40 +0200\] "POST /wp-login.php HTTP/1.0" 200 2797 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 47.101.193.3 - - \[24/May/2020:10:22:44 +0200\] "POST /wp-login.php HTTP/1.0" 200 2796 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 47.101.193.3 - - \[24/May/2020:10:22:49 +0200\] "POST /wp-login.php HTTP/1.0" 200 2771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-05-24 19:56:35 |
82.117.213.30 | attackspam | May 24 05:44:36 web01.agentur-b-2.de postfix/smtpd[513812]: NOQUEUE: reject: RCPT from unknown[82.117.213.30]: 554 5.7.1 Service unavailable; Client host [82.117.213.30] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/82.117.213.30; from= |
2020-05-24 19:44:56 |
45.142.195.8 | attack | May 24 13:59:26 statusweb1.srvfarm.net postfix/smtps/smtpd[17245]: warning: unknown[45.142.195.8]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 24 13:59:39 statusweb1.srvfarm.net postfix/smtps/smtpd[17245]: lost connection after AUTH from unknown[45.142.195.8] May 24 14:02:16 statusweb1.srvfarm.net postfix/smtps/smtpd[17245]: warning: unknown[45.142.195.8]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 24 14:02:29 statusweb1.srvfarm.net postfix/smtps/smtpd[17245]: lost connection after AUTH from unknown[45.142.195.8] May 24 14:05:07 statusweb1.srvfarm.net postfix/smtps/smtpd[17245]: warning: unknown[45.142.195.8]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-05-24 20:12:07 |
37.49.226.240 | attack | Attempted connection to port 8088. |
2020-05-24 19:40:54 |
170.84.183.2 | attackbotsspam | May 24 05:40:39 web01.agentur-b-2.de postfix/smtpd[514088]: NOQUEUE: reject: RCPT from 170.84.183.2.rrwifi.net.br[170.84.183.2]: 554 5.7.1 Service unavailable; Client host [170.84.183.2] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/170.84.183.2; from= |
2020-05-24 20:07:51 |
134.209.95.125 | attack | " " |
2020-05-24 19:58:56 |
58.213.155.227 | attackspambots | May 24 10:34:14 XXX sshd[64618]: Invalid user otm from 58.213.155.227 port 17767 |
2020-05-24 19:48:20 |
218.92.0.138 | attackspam | May 24 14:16:36 santamaria sshd\[18089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root May 24 14:16:38 santamaria sshd\[18089\]: Failed password for root from 218.92.0.138 port 12722 ssh2 May 24 14:16:48 santamaria sshd\[18089\]: Failed password for root from 218.92.0.138 port 12722 ssh2 ... |
2020-05-24 20:18:50 |