城市(city): unknown
省份(region): unknown
国家(country): Romania
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.47.91.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.47.91.56. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:27:59 CST 2025
;; MSG SIZE rcvd: 104
56.91.47.89.in-addr.arpa domain name pointer 89.47.91.56.jointelecom.ro.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
56.91.47.89.in-addr.arpa name = 89.47.91.56.jointelecom.ro.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 116.213.144.93 | attack | $f2bV_matches |
2019-12-24 01:55:31 |
| 218.92.0.138 | attackspam | Dec 23 18:50:41 MK-Soft-Root1 sshd[1381]: Failed password for root from 218.92.0.138 port 17107 ssh2 Dec 23 18:50:44 MK-Soft-Root1 sshd[1381]: Failed password for root from 218.92.0.138 port 17107 ssh2 ... |
2019-12-24 02:03:53 |
| 223.220.250.173 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2019-12-24 01:56:48 |
| 124.156.50.145 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-24 02:05:16 |
| 49.88.112.62 | attackspam | Dec 23 17:47:58 sshgateway sshd\[27239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.62 user=root Dec 23 17:48:00 sshgateway sshd\[27239\]: Failed password for root from 49.88.112.62 port 30135 ssh2 Dec 23 17:48:03 sshgateway sshd\[27239\]: Failed password for root from 49.88.112.62 port 30135 ssh2 |
2019-12-24 02:06:57 |
| 124.156.50.171 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-24 01:50:59 |
| 49.233.142.213 | attackbots | Dec 23 15:50:34 localhost sshd\[2859\]: Invalid user poo from 49.233.142.213 Dec 23 15:50:34 localhost sshd\[2859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.142.213 Dec 23 15:50:36 localhost sshd\[2859\]: Failed password for invalid user poo from 49.233.142.213 port 34994 ssh2 Dec 23 15:57:28 localhost sshd\[3178\]: Invalid user petrosky from 49.233.142.213 Dec 23 15:57:28 localhost sshd\[3178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.142.213 ... |
2019-12-24 02:01:18 |
| 129.211.35.190 | attackspambots | Mar 5 00:26:10 dillonfme sshd\[28799\]: Invalid user tz from 129.211.35.190 port 56470 Mar 5 00:26:10 dillonfme sshd\[28799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.35.190 Mar 5 00:26:12 dillonfme sshd\[28799\]: Failed password for invalid user tz from 129.211.35.190 port 56470 ssh2 Mar 5 00:32:28 dillonfme sshd\[28932\]: Invalid user nagios from 129.211.35.190 port 52518 Mar 5 00:32:28 dillonfme sshd\[28932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.35.190 ... |
2019-12-24 01:58:52 |
| 106.13.63.41 | attackspambots | Dec 23 17:20:20 silence02 sshd[7583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.63.41 Dec 23 17:20:22 silence02 sshd[7583]: Failed password for invalid user jen from 106.13.63.41 port 47908 ssh2 Dec 23 17:27:20 silence02 sshd[11037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.63.41 |
2019-12-24 02:00:58 |
| 202.79.46.37 | attackspambots | 5,33-01/00 [bc01/m68] concatform PostRequest-Spammer scoring: wien2018 |
2019-12-24 01:58:13 |
| 118.163.216.107 | attackbotsspam | Dec 23 18:41:55 vps691689 sshd[31339]: Failed password for root from 118.163.216.107 port 11717 ssh2 Dec 23 18:48:17 vps691689 sshd[31392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.216.107 ... |
2019-12-24 02:02:01 |
| 132.232.42.33 | attackbots | Dec 18 05:18:45 yesfletchmain sshd\[12773\]: Invalid user marlsela from 132.232.42.33 port 33034 Dec 18 05:18:45 yesfletchmain sshd\[12773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.42.33 Dec 18 05:18:47 yesfletchmain sshd\[12773\]: Failed password for invalid user marlsela from 132.232.42.33 port 33034 ssh2 Dec 18 05:25:52 yesfletchmain sshd\[12943\]: Invalid user rubaidah from 132.232.42.33 port 39880 Dec 18 05:25:52 yesfletchmain sshd\[12943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.42.33 ... |
2019-12-24 01:32:13 |
| 190.191.194.9 | attackspambots | Dec 23 07:23:45 home sshd[5658]: Invalid user server from 190.191.194.9 port 50347 Dec 23 07:23:45 home sshd[5658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.194.9 Dec 23 07:23:45 home sshd[5658]: Invalid user server from 190.191.194.9 port 50347 Dec 23 07:23:47 home sshd[5658]: Failed password for invalid user server from 190.191.194.9 port 50347 ssh2 Dec 23 07:34:04 home sshd[5743]: Invalid user dominjon from 190.191.194.9 port 36090 Dec 23 07:34:04 home sshd[5743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.194.9 Dec 23 07:34:04 home sshd[5743]: Invalid user dominjon from 190.191.194.9 port 36090 Dec 23 07:34:06 home sshd[5743]: Failed password for invalid user dominjon from 190.191.194.9 port 36090 ssh2 Dec 23 07:42:00 home sshd[5786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.194.9 user=root Dec 23 07:42:03 home sshd[5786]: Failed password for r |
2019-12-24 01:32:48 |
| 164.132.98.75 | attack | Dec 23 16:58:11 markkoudstaal sshd[23051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75 Dec 23 16:58:13 markkoudstaal sshd[23051]: Failed password for invalid user billie from 164.132.98.75 port 33688 ssh2 Dec 23 17:03:45 markkoudstaal sshd[23509]: Failed password for root from 164.132.98.75 port 36374 ssh2 |
2019-12-24 01:59:58 |
| 124.156.50.158 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-24 01:54:26 |