城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.54.158.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.54.158.10. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:11:51 CST 2025
;; MSG SIZE rcvd: 106
Host 10.158.54.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 10.158.54.106.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.228.208.113 | attackspambots | Sep 24 14:43:05 h2177944 kernel: \[2205293.020642\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=36297 PROTO=TCP SPT=48966 DPT=8081 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 24 14:43:36 h2177944 kernel: \[2205323.932608\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=27967 PROTO=TCP SPT=48966 DPT=808 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 24 14:44:08 h2177944 kernel: \[2205356.563439\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=40235 PROTO=TCP SPT=48966 DPT=8118 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 24 14:44:29 h2177944 kernel: \[2205376.805901\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=38778 PROTO=TCP SPT=48966 DPT=8998 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 24 14:45:04 h2177944 kernel: \[2205411.704908\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=122.228.208.113 DST=85. |
2019-09-24 22:17:50 |
| 145.239.91.88 | attack | Sep 24 14:58:11 eventyay sshd[22179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.91.88 Sep 24 14:58:12 eventyay sshd[22179]: Failed password for invalid user usertest from 145.239.91.88 port 52304 ssh2 Sep 24 15:02:26 eventyay sshd[22307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.91.88 ... |
2019-09-24 22:13:01 |
| 118.68.170.172 | attackbotsspam | Sep 24 04:49:34 hpm sshd\[6951\]: Invalid user informix from 118.68.170.172 Sep 24 04:49:34 hpm sshd\[6951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118-68-170-172.higio.net Sep 24 04:49:36 hpm sshd\[6951\]: Failed password for invalid user informix from 118.68.170.172 port 43588 ssh2 Sep 24 04:54:21 hpm sshd\[7365\]: Invalid user admin from 118.68.170.172 Sep 24 04:54:21 hpm sshd\[7365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118-68-170-172.higio.net |
2019-09-24 23:04:10 |
| 2.168.0.99 | attackbotsspam | Autoban 2.168.0.99 VIRUS |
2019-09-24 22:54:03 |
| 46.38.144.57 | attack | Sep 24 16:07:04 relay postfix/smtpd\[24156\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 24 16:07:21 relay postfix/smtpd\[30495\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 24 16:08:20 relay postfix/smtpd\[25487\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 24 16:08:38 relay postfix/smtpd\[15183\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 24 16:09:37 relay postfix/smtpd\[25487\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-09-24 22:18:55 |
| 173.245.239.249 | attack | Sep 24 14:43:25 xeon cyrus/imap[40471]: badlogin: [173.245.239.249] plain [SASL(-13): authentication failure: Password verification failed] |
2019-09-24 23:03:09 |
| 163.172.61.214 | attack | Sep 24 04:48:40 eddieflores sshd\[10657\]: Invalid user auser from 163.172.61.214 Sep 24 04:48:40 eddieflores sshd\[10657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.61.214 Sep 24 04:48:42 eddieflores sshd\[10657\]: Failed password for invalid user auser from 163.172.61.214 port 32875 ssh2 Sep 24 04:52:54 eddieflores sshd\[10995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.61.214 user=root Sep 24 04:52:56 eddieflores sshd\[10995\]: Failed password for root from 163.172.61.214 port 52560 ssh2 |
2019-09-24 22:57:24 |
| 185.193.126.33 | attackspambots | Forbidden directory scan :: 2019/09/25 00:18:53 [error] 1103#1103: *185666 access forbidden by rule, client: 185.193.126.33, server: [censored_1], request: "GET /wpdump_db.sql HTTP/1.1", host: "[censored_1]", referrer: "http://[censored_1]/wpdump_db.sql" |
2019-09-24 22:24:07 |
| 54.37.158.218 | attackspam | Reported by AbuseIPDB proxy server. |
2019-09-24 22:24:33 |
| 191.82.169.27 | attackspam | Unauthorised access (Sep 24) SRC=191.82.169.27 LEN=40 TOS=0x10 PREC=0x40 TTL=52 ID=10170 TCP DPT=8080 WINDOW=3435 SYN |
2019-09-24 22:37:05 |
| 92.119.160.103 | attackbots | 09/24/2019-09:48:47.723469 92.119.160.103 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-09-24 22:28:59 |
| 185.220.101.7 | attack | Automatic report - Banned IP Access |
2019-09-24 22:13:25 |
| 159.203.198.34 | attackspam | Sep 24 16:49:32 saschabauer sshd[20595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.198.34 Sep 24 16:49:34 saschabauer sshd[20595]: Failed password for invalid user admin from 159.203.198.34 port 58669 ssh2 |
2019-09-24 23:00:26 |
| 218.4.196.178 | attack | Sep 24 16:06:51 vps01 sshd[23737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.196.178 Sep 24 16:06:53 vps01 sshd[23737]: Failed password for invalid user administrator from 218.4.196.178 port 53209 ssh2 |
2019-09-24 22:30:58 |
| 222.186.31.144 | attackbotsspam | Sep 24 10:30:11 TORMINT sshd\[25217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.144 user=root Sep 24 10:30:13 TORMINT sshd\[25217\]: Failed password for root from 222.186.31.144 port 44313 ssh2 Sep 24 10:30:15 TORMINT sshd\[25217\]: Failed password for root from 222.186.31.144 port 44313 ssh2 ... |
2019-09-24 22:30:38 |