城市(city): Porto
省份(region): Porto
国家(country): Portugal
运营商(isp): NOS
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.102.143.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.102.143.252.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122000 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 01:20:37 CST 2024
;; MSG SIZE  rcvd: 107
        252.143.102.93.in-addr.arpa domain name pointer 93.102.143.252.rev.optimus.pt.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
252.143.102.93.in-addr.arpa	name = 93.102.143.252.rev.optimus.pt.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 159.65.1.166 | attackbots | Sep 16 13:53:33 george sshd[1653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.1.166 user=root Sep 16 13:53:35 george sshd[1653]: Failed password for root from 159.65.1.166 port 45440 ssh2 Sep 16 13:57:53 george sshd[3502]: Invalid user customer from 159.65.1.166 port 55360 Sep 16 13:57:53 george sshd[3502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.1.166 Sep 16 13:57:55 george sshd[3502]: Failed password for invalid user customer from 159.65.1.166 port 55360 ssh2 ...  | 
                    2020-09-17 07:21:25 | 
| 192.241.237.71 | attack | 995/tcp 3050/tcp 45000/tcp... [2020-07-17/09-16]13pkt,13pt.(tcp)  | 
                    2020-09-17 07:39:50 | 
| 85.248.227.164 | attackspambots | CMS (WordPress or Joomla) login attempt.  | 
                    2020-09-17 07:40:56 | 
| 2.57.122.170 | attackspambots | firewall-block, port(s): 22222/tcp  | 
                    2020-09-17 07:19:29 | 
| 5.62.61.105 | attackbots | Forbidden directory scan :: 2020/09/16 20:48:55 [error] 1010#1010: *2698533 access forbidden by rule, client: 5.62.61.105, server: [censored_1], request: "GET /.git//index HTTP/1.1", host: "www.[censored_1]"  | 
                    2020-09-17 07:30:51 | 
| 115.79.139.177 | attackspambots | Honeypot attack, port: 81, PTR: adsl.viettel.vn.  | 
                    2020-09-17 07:20:01 | 
| 14.172.50.160 | attack | Honeypot attack, port: 445, PTR: static.vnpt.vn.  | 
                    2020-09-17 07:25:47 | 
| 66.230.230.230 | attackspambots | 2020-09-16T23:29:13+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)  | 
                    2020-09-17 07:30:22 | 
| 49.232.16.241 | attackspam | Found on CINS badguys / proto=6 . srcport=43106 . dstport=11938 . (1113)  | 
                    2020-09-17 07:20:55 | 
| 65.49.20.119 | attack | Found on CINS badguys / proto=6 . srcport=52065 . dstport=22 . (1110)  | 
                    2020-09-17 07:32:49 | 
| 149.56.132.202 | attackspambots | Sep 17 01:07:50 MainVPS sshd[22068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202 user=root Sep 17 01:07:52 MainVPS sshd[22068]: Failed password for root from 149.56.132.202 port 54784 ssh2 Sep 17 01:11:26 MainVPS sshd[29775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202 user=root Sep 17 01:11:28 MainVPS sshd[29775]: Failed password for root from 149.56.132.202 port 38382 ssh2 Sep 17 01:14:55 MainVPS sshd[4587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202 user=root Sep 17 01:14:57 MainVPS sshd[4587]: Failed password for root from 149.56.132.202 port 50190 ssh2 ...  | 
                    2020-09-17 07:30:07 | 
| 180.71.58.82 | attackspambots | 2020-09-16T22:07:27.029189upcloud.m0sh1x2.com sshd[26401]: Invalid user teamcity from 180.71.58.82 port 37733  | 
                    2020-09-17 07:16:25 | 
| 186.154.37.55 | attackbots | Listed on zen-spamhaus also abuseat.org and dnsbl-sorbs / proto=6 . srcport=54261 . dstport=23 . (1112)  | 
                    2020-09-17 07:22:42 | 
| 168.194.13.4 | attackspam | 2020-09-16T23:00:16.821278dmca.cloudsearch.cf sshd[14640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.13.4 user=root 2020-09-16T23:00:19.062437dmca.cloudsearch.cf sshd[14640]: Failed password for root from 168.194.13.4 port 50470 ssh2 2020-09-16T23:04:42.603600dmca.cloudsearch.cf sshd[14722]: Invalid user http from 168.194.13.4 port 34972 2020-09-16T23:04:42.609190dmca.cloudsearch.cf sshd[14722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.13.4 2020-09-16T23:04:42.603600dmca.cloudsearch.cf sshd[14722]: Invalid user http from 168.194.13.4 port 34972 2020-09-16T23:04:44.699889dmca.cloudsearch.cf sshd[14722]: Failed password for invalid user http from 168.194.13.4 port 34972 ssh2 2020-09-16T23:09:03.502059dmca.cloudsearch.cf sshd[14874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.13.4 user=root 2020-09-16T23:09:05.422338dmca.clouds ...  | 
                    2020-09-17 07:14:27 | 
| 128.199.212.15 | attackspambots | Sep 16 22:01:59 XXXXXX sshd[8063]: Invalid user abcd1234 from 128.199.212.15 port 32932  | 
                    2020-09-17 07:18:12 |