城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.245.16.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.245.16.142. IN A
;; AUTHORITY SECTION:
. 597 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:51:04 CST 2022
;; MSG SIZE rcvd: 107
142.16.245.104.in-addr.arpa domain name pointer ips142.securednshost.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.16.245.104.in-addr.arpa name = ips142.securednshost.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 167.179.139.19 | attackspambots | k+ssh-bruteforce |
2019-07-11 05:27:38 |
| 27.40.23.221 | attackspam | Automatic report |
2019-07-11 05:29:43 |
| 129.211.52.70 | attack | 2019-07-10T19:24:51.876528abusebot-4.cloudsearch.cf sshd\[27443\]: Invalid user oracle from 129.211.52.70 port 43574 |
2019-07-11 05:21:57 |
| 94.130.55.187 | attack | Spam |
2019-07-11 05:29:10 |
| 142.11.222.183 | attack | TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-10 21:04:45] |
2019-07-11 05:36:48 |
| 123.207.78.83 | attack | $f2bV_matches |
2019-07-11 05:54:05 |
| 185.233.117.156 | attackbotsspam | Jul 10 20:48:24 XXXXXX sshd[52046]: Invalid user hadoop from 185.233.117.156 port 40150 |
2019-07-11 05:47:30 |
| 106.12.88.165 | attack | Jul 10 21:06:17 ks10 sshd[13406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.165 Jul 10 21:06:19 ks10 sshd[13406]: Failed password for invalid user oracle from 106.12.88.165 port 48244 ssh2 ... |
2019-07-11 05:37:44 |
| 78.212.178.81 | attack | (sshd) Failed SSH login from 78.212.178.81 (moh51-1-78-212-178-81.fbx.proxad.net): 5 in the last 3600 secs |
2019-07-11 05:17:22 |
| 98.109.87.148 | attack | Jul 10 21:03:51 www6-3 sshd[27704]: Invalid user dev from 98.109.87.148 port 57844 Jul 10 21:03:51 www6-3 sshd[27704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.109.87.148 Jul 10 21:03:53 www6-3 sshd[27704]: Failed password for invalid user dev from 98.109.87.148 port 57844 ssh2 Jul 10 21:03:53 www6-3 sshd[27704]: Received disconnect from 98.109.87.148 port 57844:11: Bye Bye [preauth] Jul 10 21:03:53 www6-3 sshd[27704]: Disconnected from 98.109.87.148 port 57844 [preauth] Jul 10 21:08:53 www6-3 sshd[27887]: Invalid user john from 98.109.87.148 port 50122 Jul 10 21:08:53 www6-3 sshd[27887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.109.87.148 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=98.109.87.148 |
2019-07-11 05:55:10 |
| 222.252.48.243 | attack | Automatic report - SSH Brute-Force Attack |
2019-07-11 05:26:37 |
| 192.99.12.35 | attackspambots | blogonese.net 192.99.12.35 \[10/Jul/2019:21:06:15 +0200\] "POST /wp-login.php HTTP/1.1" 200 5771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" blogonese.net 192.99.12.35 \[10/Jul/2019:21:06:16 +0200\] "POST /wp-login.php HTTP/1.1" 200 5731 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" blogonese.net 192.99.12.35 \[10/Jul/2019:21:06:17 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4086 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-07-11 05:38:15 |
| 218.92.0.135 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135 user=root Failed password for root from 218.92.0.135 port 63006 ssh2 Failed password for root from 218.92.0.135 port 63006 ssh2 Failed password for root from 218.92.0.135 port 63006 ssh2 Failed password for root from 218.92.0.135 port 63006 ssh2 |
2019-07-11 05:42:00 |
| 177.101.139.136 | attackspam | Invalid user info from 177.101.139.136 port 34828 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.101.139.136 Failed password for invalid user info from 177.101.139.136 port 34828 ssh2 Invalid user aidan from 177.101.139.136 port 56226 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.101.139.136 |
2019-07-11 05:13:42 |
| 117.239.48.242 | attackspam | [ssh] SSH attack |
2019-07-11 05:38:40 |