城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.240.207.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.240.207.52. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 131 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 00:54:19 CST 2025
;; MSG SIZE rcvd: 106
52.207.240.89.in-addr.arpa domain name pointer host-89-240-207-52.as13285.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
52.207.240.89.in-addr.arpa name = host-89-240-207-52.as13285.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 36.74.75.31 | attackbots | Jul 11 03:27:24 XXXXXX sshd[58848]: Invalid user stats from 36.74.75.31 port 37857 |
2019-07-11 13:12:44 |
| 58.187.89.39 | attackbotsspam | Unauthorized connection attempt from IP address 58.187.89.39 on Port 445(SMB) |
2019-07-11 13:40:48 |
| 223.130.16.228 | attack | Unauthorised access (Jul 11) SRC=223.130.16.228 LEN=52 TTL=118 ID=21250 DF TCP DPT=445 WINDOW=8192 SYN |
2019-07-11 13:58:04 |
| 186.225.146.170 | attackspam | BR from [186.225.146.170] port=51976 helo=186-225-146-170.customer.sinalbr.com.br |
2019-07-11 13:48:49 |
| 14.172.110.104 | attack | Unauthorized connection attempt from IP address 14.172.110.104 on Port 445(SMB) |
2019-07-11 13:13:08 |
| 200.162.138.42 | attack | Invalid user user from 200.162.138.42 port 51537 |
2019-07-11 13:40:08 |
| 123.207.99.21 | attackspam | Invalid user andrea from 123.207.99.21 port 54400 |
2019-07-11 13:44:31 |
| 89.163.142.102 | attack | Spam (bizers.eu, Jul 10 21:30) |
2019-07-11 13:43:41 |
| 138.197.105.79 | attackbots | Jul 11 07:32:55 srv03 sshd\[26448\]: Invalid user curelea from 138.197.105.79 port 36102 Jul 11 07:32:55 srv03 sshd\[26448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.105.79 Jul 11 07:32:58 srv03 sshd\[26448\]: Failed password for invalid user curelea from 138.197.105.79 port 36102 ssh2 |
2019-07-11 13:55:03 |
| 104.236.239.60 | attackbots | 2019-07-11T05:58:12.043435stark.klein-stark.info sshd\[3803\]: Invalid user administrator from 104.236.239.60 port 43842 2019-07-11T05:58:12.051324stark.klein-stark.info sshd\[3803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.239.60 2019-07-11T05:58:13.958435stark.klein-stark.info sshd\[3803\]: Failed password for invalid user administrator from 104.236.239.60 port 43842 ssh2 ... |
2019-07-11 13:53:27 |
| 114.226.11.177 | attackbotsspam | Jul 11 09:29:44 areeb-Workstation sshd\[16188\]: Invalid user admin from 114.226.11.177 Jul 11 09:29:44 areeb-Workstation sshd\[16188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.226.11.177 Jul 11 09:29:46 areeb-Workstation sshd\[16188\]: Failed password for invalid user admin from 114.226.11.177 port 47008 ssh2 ... |
2019-07-11 13:49:20 |
| 111.204.26.202 | attackspambots | Jul 11 05:16:40 debian sshd\[12859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.204.26.202 user=root Jul 11 05:16:42 debian sshd\[12859\]: Failed password for root from 111.204.26.202 port 56289 ssh2 ... |
2019-07-11 13:18:03 |
| 178.62.117.106 | attack | 2019-07-10T23:58:19.098461WS-Zach sshd[4147]: Invalid user zhou from 178.62.117.106 port 38932 2019-07-10T23:58:19.102610WS-Zach sshd[4147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.117.106 2019-07-10T23:58:19.098461WS-Zach sshd[4147]: Invalid user zhou from 178.62.117.106 port 38932 2019-07-10T23:58:21.636090WS-Zach sshd[4147]: Failed password for invalid user zhou from 178.62.117.106 port 38932 ssh2 2019-07-11T00:00:25.899230WS-Zach sshd[5488]: Invalid user dev from 178.62.117.106 port 50590 ... |
2019-07-11 13:26:26 |
| 110.9.6.12 | attackbotsspam | " " |
2019-07-11 13:23:15 |
| 78.148.138.214 | attackspambots | Jul 11 10:59:25 itv-usvr-01 sshd[12769]: Invalid user pi from 78.148.138.214 Jul 11 10:59:25 itv-usvr-01 sshd[12771]: Invalid user pi from 78.148.138.214 Jul 11 10:59:26 itv-usvr-01 sshd[12771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.148.138.214 Jul 11 10:59:25 itv-usvr-01 sshd[12771]: Invalid user pi from 78.148.138.214 Jul 11 10:59:27 itv-usvr-01 sshd[12771]: Failed password for invalid user pi from 78.148.138.214 port 53211 ssh2 Jul 11 10:59:25 itv-usvr-01 sshd[12769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.148.138.214 Jul 11 10:59:25 itv-usvr-01 sshd[12769]: Invalid user pi from 78.148.138.214 Jul 11 10:59:27 itv-usvr-01 sshd[12769]: Failed password for invalid user pi from 78.148.138.214 port 53209 ssh2 |
2019-07-11 13:54:39 |