城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.125.61.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;91.125.61.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 06:10:35 CST 2025
;; MSG SIZE rcvd: 106
142.61.125.91.in-addr.arpa domain name pointer 142.61.125.91.dyn.plus.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.61.125.91.in-addr.arpa name = 142.61.125.91.dyn.plus.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 181.48.23.154 | attackspam | 5x Failed Password |
2020-01-22 06:30:52 |
| 103.231.42.28 | attack | Port 1433 Scan |
2020-01-22 06:56:43 |
| 78.38.241.7 | attackbots | 20/1/21@17:20:47: FAIL: Alarm-Intrusion address from=78.38.241.7 ... |
2020-01-22 06:37:08 |
| 222.186.30.248 | attack | Jan 21 23:32:38 dcd-gentoo sshd[11075]: User root from 222.186.30.248 not allowed because none of user's groups are listed in AllowGroups Jan 21 23:32:41 dcd-gentoo sshd[11075]: error: PAM: Authentication failure for illegal user root from 222.186.30.248 Jan 21 23:32:38 dcd-gentoo sshd[11075]: User root from 222.186.30.248 not allowed because none of user's groups are listed in AllowGroups Jan 21 23:32:41 dcd-gentoo sshd[11075]: error: PAM: Authentication failure for illegal user root from 222.186.30.248 Jan 21 23:32:38 dcd-gentoo sshd[11075]: User root from 222.186.30.248 not allowed because none of user's groups are listed in AllowGroups Jan 21 23:32:41 dcd-gentoo sshd[11075]: error: PAM: Authentication failure for illegal user root from 222.186.30.248 Jan 21 23:32:41 dcd-gentoo sshd[11075]: Failed keyboard-interactive/pam for invalid user root from 222.186.30.248 port 63830 ssh2 ... |
2020-01-22 06:34:10 |
| 163.172.76.77 | attackspam | 1579645255 - 01/21/2020 23:20:55 Host: 163-172-76-77.rev.poneytelecom.eu/163.172.76.77 Port: 5060 UDP Blocked |
2020-01-22 06:31:15 |
| 14.207.215.158 | attackbotsspam | 2020-01-2123:20:061iu1sU-0005Rp-OE\<=info@whatsup2013.chH=mm-249-215-122-178.mgts.dynamic.pppoe.byfly.by\(localhost\)[178.122.215.249]:34545P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3684id=858036656EBA9427FBFEB70FFB55C5E4@whatsup2013.chT="LonelyPolina"fordiabgonzales@yahoo.comwilliamhelmes@yahoo.com2020-01-2123:17:571iu1qO-0005L9-Dg\<=info@whatsup2013.chH=\(localhost\)[197.48.48.152]:44076P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3426id=D0D563303BEFC172AEABE25AAE9DEBDF@whatsup2013.chT="LonelyPolina"forjerryscaggs27@gmail.combtn@jvhj.com2020-01-2123:19:451iu1s9-0005QF-BD\<=info@whatsup2013.chH=\(localhost\)[101.53.249.16]:48189P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3459id=AFAA1C4F4490BE0DD1D49D25D1981166@whatsup2013.chT="LonelyPolina"foraafifarhn@gmail.comchepitopr68@gmail.com2020-01-2123:18:271iu1qs-0005M6-Tr\<=info@whatsup2013.chH=\(localhost\)[14.207. |
2020-01-22 06:58:42 |
| 222.186.175.217 | attackbotsspam | $f2bV_matches |
2020-01-22 06:33:51 |
| 112.85.42.188 | attackspambots | 01/21/2020-17:42:24.018894 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan |
2020-01-22 06:42:35 |
| 104.245.145.38 | attack | (From bunning.delores@outlook.com) Would you like to submit your advertisement on thousands of advertising sites monthly? For one small fee you'll get virtually unlimited traffic to your site forever! To find out more check out our site here: http://www.moreadsposted.xyz |
2020-01-22 06:54:07 |
| 185.176.27.250 | attackspam | firewall-block, port(s): 5901/tcp, 7172/tcp, 51515/tcp |
2020-01-22 06:53:10 |
| 186.225.37.226 | attackbots | invalid login attempt |
2020-01-22 06:47:58 |
| 206.81.24.126 | attackspambots | Jan 21 23:32:19 sd-53420 sshd\[6665\]: User root from 206.81.24.126 not allowed because none of user's groups are listed in AllowGroups Jan 21 23:32:19 sd-53420 sshd\[6665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.126 user=root Jan 21 23:32:21 sd-53420 sshd\[6665\]: Failed password for invalid user root from 206.81.24.126 port 53252 ssh2 Jan 21 23:36:19 sd-53420 sshd\[7301\]: Invalid user wen from 206.81.24.126 Jan 21 23:36:19 sd-53420 sshd\[7301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.126 ... |
2020-01-22 06:40:16 |
| 42.200.78.78 | attackbots | Invalid user oracle from 42.200.78.78 port 60012 |
2020-01-22 06:33:25 |
| 23.83.179.214 | attackbots | 2,55-02/02 [bc02/m32] PostRequest-Spammer scoring: paris |
2020-01-22 06:38:10 |
| 185.164.41.255 | attackbotsspam | Automatic report - Port Scan Attack |
2020-01-22 06:46:20 |