城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.6.104.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14159
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.6.104.134. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400
;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 11:14:50 CST 2022
;; MSG SIZE rcvd: 105
134.104.6.89.in-addr.arpa domain name pointer static-134-104-6-89.ipcom.comunitel.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.104.6.89.in-addr.arpa name = static-134-104-6-89.ipcom.comunitel.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 36.85.117.183 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 26-09-2019 04:45:33. |
2019-09-26 17:33:32 |
| 113.160.186.50 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 26-09-2019 04:45:20. |
2019-09-26 17:55:35 |
| 123.25.230.198 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 26-09-2019 04:45:24. |
2019-09-26 17:48:23 |
| 94.191.122.49 | attackbots | Automatic report - Banned IP Access |
2019-09-26 17:23:30 |
| 216.244.66.197 | attack | 20 attempts against mh-misbehave-ban on hill.magehost.pro |
2019-09-26 17:41:28 |
| 5.196.67.41 | attackbotsspam | Sep 25 21:39:38 lcprod sshd\[6810\]: Invalid user ding from 5.196.67.41 Sep 25 21:39:38 lcprod sshd\[6810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns378499.ip-5-196-67.eu Sep 25 21:39:41 lcprod sshd\[6810\]: Failed password for invalid user ding from 5.196.67.41 port 58998 ssh2 Sep 25 21:44:14 lcprod sshd\[7168\]: Invalid user dev from 5.196.67.41 Sep 25 21:44:14 lcprod sshd\[7168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns378499.ip-5-196-67.eu |
2019-09-26 17:48:06 |
| 188.136.159.101 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 26-09-2019 04:45:28. |
2019-09-26 17:41:06 |
| 218.92.0.202 | attackspam | Sep 26 10:19:14 vmanager6029 sshd\[16711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202 user=root Sep 26 10:19:16 vmanager6029 sshd\[16711\]: Failed password for root from 218.92.0.202 port 15887 ssh2 Sep 26 10:19:19 vmanager6029 sshd\[16711\]: Failed password for root from 218.92.0.202 port 15887 ssh2 |
2019-09-26 17:13:08 |
| 113.162.14.170 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 26-09-2019 04:45:21. |
2019-09-26 17:54:52 |
| 171.22.148.17 | attackbotsspam | Sep 25 06:24:00 mxgate1 postfix/postscreen[28403]: CONNECT from [171.22.148.17]:59049 to [176.31.12.44]:25 Sep 25 06:24:00 mxgate1 postfix/dnsblog[28538]: addr 171.22.148.17 listed by domain zen.spamhaus.org as 127.0.0.4 Sep 25 06:24:00 mxgate1 postfix/dnsblog[28538]: addr 171.22.148.17 listed by domain zen.spamhaus.org as 127.0.0.3 Sep 25 06:24:00 mxgate1 postfix/dnsblog[28536]: addr 171.22.148.17 listed by domain cbl.abuseat.org as 127.0.0.2 Sep 25 06:24:00 mxgate1 postfix/dnsblog[28537]: addr 171.22.148.17 listed by domain bl.spamcop.net as 127.0.0.2 Sep 25 06:24:01 mxgate1 postfix/postscreen[28403]: PREGREET 17 after 0.61 from [171.22.148.17]:59049: EHLO 009191.com Sep 25 06:24:01 mxgate1 postfix/dnsblog[28784]: addr 171.22.148.17 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Sep 25 06:24:07 mxgate1 postfix/postscreen[28403]: DNSBL rank 5 for [171.22.148.17]:59049 Sep x@x Sep 25 06:24:11 mxgate1 postfix/postscreen[28403]: HANGUP after 3.9 from [171.22.148.17]:5........ ------------------------------- |
2019-09-26 17:20:37 |
| 115.159.237.70 | attackbotsspam | Sep 26 06:36:45 eventyay sshd[1083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.237.70 Sep 26 06:36:48 eventyay sshd[1083]: Failed password for invalid user yp from 115.159.237.70 port 54104 ssh2 Sep 26 06:41:31 eventyay sshd[1178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.237.70 ... |
2019-09-26 17:27:05 |
| 181.48.84.90 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 26-09-2019 04:45:27. |
2019-09-26 17:43:10 |
| 194.67.216.94 | attack | Sep 26 07:51:44 nextcloud sshd\[14450\]: Invalid user dods from 194.67.216.94 Sep 26 07:51:44 nextcloud sshd\[14450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.67.216.94 Sep 26 07:51:46 nextcloud sshd\[14450\]: Failed password for invalid user dods from 194.67.216.94 port 48626 ssh2 ... |
2019-09-26 17:41:57 |
| 175.139.105.174 | attackbotsspam | Sep 25 23:45:32 debian sshd\[2981\]: Invalid user mysql from 175.139.105.174 port 38013 Sep 25 23:45:32 debian sshd\[2981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.105.174 Sep 25 23:45:34 debian sshd\[2981\]: Failed password for invalid user mysql from 175.139.105.174 port 38013 ssh2 ... |
2019-09-26 17:29:52 |
| 189.147.110.167 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 26-09-2019 04:45:29. |
2019-09-26 17:40:17 |