城市(city): unknown
省份(region): unknown
国家(country): Spain
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 90.94.39.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;90.94.39.116. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 12:29:36 CST 2025
;; MSG SIZE rcvd: 105
116.39.94.90.in-addr.arpa domain name pointer 116.39.94.90.dynamic.jazztel.es.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
116.39.94.90.in-addr.arpa name = 116.39.94.90.dynamic.jazztel.es.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.240.234.60 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 07:50:11 |
| 217.58.145.97 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:07:39 |
| 68.183.124.53 | attack | Feb 20 23:46:57 server sshd[2298830]: User postgres from 68.183.124.53 not allowed because not listed in AllowUsers Feb 20 23:46:59 server sshd[2298830]: Failed password for invalid user postgres from 68.183.124.53 port 41842 ssh2 Feb 20 23:49:35 server sshd[2300453]: Failed password for invalid user web from 68.183.124.53 port 41984 ssh2 |
2020-02-21 07:38:15 |
| 216.218.206.99 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:09:41 |
| 223.207.219.15 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 07:45:59 |
| 216.218.206.69 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:10:30 |
| 216.218.206.67 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:10:42 |
| 129.28.188.21 | attackbotsspam | Feb 20 18:22:40 plusreed sshd[4043]: Invalid user qdxx from 129.28.188.21 ... |
2020-02-21 07:36:14 |
| 82.77.68.79 | attackspambots | Unauthorised access (Feb 20) SRC=82.77.68.79 LEN=44 TTL=56 ID=10017 TCP DPT=23 WINDOW=13228 SYN Unauthorised access (Feb 19) SRC=82.77.68.79 LEN=44 TTL=56 ID=5966 TCP DPT=23 WINDOW=32284 SYN |
2020-02-21 07:40:36 |
| 218.250.215.53 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:00:41 |
| 220.121.200.154 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 07:56:50 |
| 123.207.5.190 | attackbots | sshd jail - ssh hack attempt |
2020-02-21 07:37:05 |
| 88.77.94.52 | attackspambots | Feb 20 13:30:21 php1 sshd\[5634\]: Invalid user zhaohongyu from 88.77.94.52 Feb 20 13:30:21 php1 sshd\[5634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.77.94.52 Feb 20 13:30:24 php1 sshd\[5634\]: Failed password for invalid user zhaohongyu from 88.77.94.52 port 39620 ssh2 Feb 20 13:39:47 php1 sshd\[6604\]: Invalid user jiayx from 88.77.94.52 Feb 20 13:39:47 php1 sshd\[6604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.77.94.52 |
2020-02-21 07:42:22 |
| 216.218.206.126 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:08:25 |
| 218.75.62.90 | attack | SMB Server BruteForce Attack |
2020-02-21 08:02:29 |