城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.20.81.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;1.20.81.42. IN A
;; AUTHORITY SECTION:
. 329 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 11:42:59 CST 2022
;; MSG SIZE rcvd: 103
Host 42.81.20.1.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.81.20.1.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 203.150.180.73 | attackbotsspam | Sep 11 20:50:12 mc1 kernel: \[778377.517081\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=203.150.180.73 DST=159.69.205.51 LEN=52 TOS=0x00 PREC=0x00 TTL=238 ID=1095 DF PROTO=TCP SPT=33986 DPT=80 WINDOW=8190 RES=0x00 SYN URGP=0 Sep 11 20:50:12 mc1 kernel: \[778377.538808\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=203.150.180.73 DST=159.69.205.51 LEN=44 TOS=0x00 PREC=0x00 TTL=46 ID=0 DF PROTO=TCP SPT=7357 DPT=8080 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 20:50:12 mc1 kernel: \[778377.559535\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=203.150.180.73 DST=159.69.205.51 LEN=44 TOS=0x00 PREC=0x00 TTL=46 ID=0 DF PROTO=TCP SPT=6021 DPT=21 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 20:50:12 mc1 kernel: \[778377.582737\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=203.150.180.73 DST=159.69.205.51 LEN=44 TOS=0x00 PREC=0x00 TTL=46 ID=0 DF PROTO=TCP SPT=7335 DPT=22 WI ... |
2019-09-12 10:40:24 |
| 112.85.42.94 | attackbots | Sep 12 04:56:58 pkdns2 sshd\[61864\]: Failed password for root from 112.85.42.94 port 63533 ssh2Sep 12 04:56:59 pkdns2 sshd\[61864\]: Failed password for root from 112.85.42.94 port 63533 ssh2Sep 12 04:57:01 pkdns2 sshd\[61864\]: Failed password for root from 112.85.42.94 port 63533 ssh2Sep 12 04:59:35 pkdns2 sshd\[61967\]: Failed password for root from 112.85.42.94 port 48208 ssh2Sep 12 04:59:37 pkdns2 sshd\[61967\]: Failed password for root from 112.85.42.94 port 48208 ssh2Sep 12 04:59:40 pkdns2 sshd\[61967\]: Failed password for root from 112.85.42.94 port 48208 ssh2 ... |
2019-09-12 10:33:19 |
| 220.120.106.254 | attackspam | Sep 11 16:47:17 tdfoods sshd\[7969\]: Invalid user 1 from 220.120.106.254 Sep 11 16:47:17 tdfoods sshd\[7969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254 Sep 11 16:47:19 tdfoods sshd\[7969\]: Failed password for invalid user 1 from 220.120.106.254 port 44628 ssh2 Sep 11 16:53:42 tdfoods sshd\[8512\]: Invalid user qwerty from 220.120.106.254 Sep 11 16:53:42 tdfoods sshd\[8512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254 |
2019-09-12 10:55:58 |
| 52.179.180.63 | attackbots | Sep 11 22:16:23 lnxmail61 sshd[19188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.179.180.63 |
2019-09-12 10:44:39 |
| 209.97.167.131 | attackbotsspam | Sep 12 04:29:50 root sshd[23219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.167.131 Sep 12 04:29:53 root sshd[23219]: Failed password for invalid user test2 from 209.97.167.131 port 44952 ssh2 Sep 12 04:37:48 root sshd[23345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.167.131 ... |
2019-09-12 10:38:52 |
| 35.185.0.203 | attackbots | $f2bV_matches |
2019-09-12 10:34:53 |
| 134.209.67.218 | attackbotsspam | 19/9/11@14:50:19: FAIL: IoT-Telnet address from=134.209.67.218 ... |
2019-09-12 10:34:23 |
| 202.188.101.106 | attackspam | Sep 12 04:59:40 vps647732 sshd[17823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.188.101.106 Sep 12 04:59:42 vps647732 sshd[17823]: Failed password for invalid user Oracle from 202.188.101.106 port 48050 ssh2 ... |
2019-09-12 11:00:24 |
| 120.92.102.121 | attack | 2019-09-11T19:22:35.387120abusebot-2.cloudsearch.cf sshd\[28717\]: Invalid user ts3server from 120.92.102.121 port 33874 |
2019-09-12 10:49:28 |
| 125.165.210.37 | attackbotsspam | Unauthorized connection attempt from IP address 125.165.210.37 on Port 445(SMB) |
2019-09-12 11:12:47 |
| 154.118.141.90 | attack | Automatic report |
2019-09-12 10:30:04 |
| 46.32.76.37 | attackbots | SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-09-12 10:42:31 |
| 51.75.247.13 | attackbots | Sep 11 23:43:06 localhost sshd\[13696\]: Invalid user ftptest from 51.75.247.13 port 33058 Sep 11 23:43:06 localhost sshd\[13696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.247.13 Sep 11 23:43:08 localhost sshd\[13696\]: Failed password for invalid user ftptest from 51.75.247.13 port 33058 ssh2 |
2019-09-12 10:39:42 |
| 148.66.142.135 | attackbotsspam | Sep 11 23:38:32 *** sshd[9287]: Failed password for invalid user user2 from 148.66.142.135 port 59086 ssh2 Sep 11 23:49:00 *** sshd[9555]: Failed password for invalid user ubuntu from 148.66.142.135 port 44778 ssh2 Sep 11 23:55:26 *** sshd[9620]: Failed password for invalid user sinusbot from 148.66.142.135 port 52428 ssh2 Sep 12 00:01:41 *** sshd[9726]: Failed password for invalid user debian from 148.66.142.135 port 59988 ssh2 Sep 12 00:08:10 *** sshd[9865]: Failed password for invalid user developer from 148.66.142.135 port 39552 ssh2 Sep 12 00:14:46 *** sshd[9996]: Failed password for invalid user testing from 148.66.142.135 port 47470 ssh2 Sep 12 00:21:07 *** sshd[10090]: Failed password for invalid user vbox from 148.66.142.135 port 55138 ssh2 Sep 12 00:27:43 *** sshd[10225]: Failed password for invalid user tempo from 148.66.142.135 port 34844 ssh2 Sep 12 00:34:21 *** sshd[10306]: Failed password for invalid user vmuser from 148.66.142.135 port 42616 ssh2 Sep 12 00:47:26 *** sshd[10607]: Failed passwor |
2019-09-12 11:16:22 |
| 84.122.18.69 | attackspambots | Sep 11 11:42:08 hpm sshd\[27162\]: Invalid user 123456789 from 84.122.18.69 Sep 11 11:42:08 hpm sshd\[27162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.122.18.69.dyn.user.ono.com Sep 11 11:42:10 hpm sshd\[27162\]: Failed password for invalid user 123456789 from 84.122.18.69 port 53868 ssh2 Sep 11 11:48:31 hpm sshd\[27775\]: Invalid user demo from 84.122.18.69 Sep 11 11:48:31 hpm sshd\[27775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.122.18.69.dyn.user.ono.com |
2019-09-12 11:15:18 |