城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.103.147.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.103.147.157. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 23:33:43 CST 2025
;; MSG SIZE rcvd: 108
Host 157.147.103.108.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 157.147.103.108.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 46.3.96.66 | attack | 16.07.2019 19:52:00 Connection to port 2485 blocked by firewall |
2019-07-17 04:16:45 |
| 5.188.87.19 | attackspam | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-07-17 04:17:17 |
| 223.31.107.214 | attack | Jul 16 07:01:45 localhost kernel: [14519098.659989] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=223.31.107.214 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=28177 DF PROTO=TCP SPT=55692 DPT=8291 SEQ=2243601688 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405B40103030201010402) Jul 16 07:01:51 localhost kernel: [14519104.672013] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=223.31.107.214 DST=[mungedIP2] LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=203 DF PROTO=TCP SPT=55692 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 Jul 16 07:01:51 localhost kernel: [14519104.672042] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=223.31.107.214 DST=[mungedIP2] LEN=48 TOS=0x00 PREC=0x00 TTL=120 ID=203 DF PROTO=TCP SPT=55692 DPT=8291 SEQ=2243601688 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405B401010402) |
2019-07-17 04:40:00 |
| 177.75.150.54 | attackbotsspam | Total attacks: 2 |
2019-07-17 04:08:34 |
| 185.35.139.72 | attackbots | 2019-07-16T20:23:56.410381abusebot-6.cloudsearch.cf sshd\[4206\]: Invalid user 123456 from 185.35.139.72 port 47280 |
2019-07-17 04:34:25 |
| 75.152.116.190 | attackbotsspam | Jul 16 10:57:34 email sshd\[27952\]: Invalid user xbian from 75.152.116.190 Jul 16 10:57:34 email sshd\[27952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.152.116.190 Jul 16 10:57:36 email sshd\[27952\]: Failed password for invalid user xbian from 75.152.116.190 port 40224 ssh2 Jul 16 11:02:57 email sshd\[29063\]: Invalid user vyatta from 75.152.116.190 Jul 16 11:02:57 email sshd\[29063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.152.116.190 ... |
2019-07-17 04:23:04 |
| 74.141.211.210 | attackbots | Jul 16 14:14:49 aat-srv002 sshd[16070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.141.211.210 Jul 16 14:14:51 aat-srv002 sshd[16070]: Failed password for invalid user mysql from 74.141.211.210 port 43102 ssh2 Jul 16 14:20:05 aat-srv002 sshd[16160]: Failed password for root from 74.141.211.210 port 41480 ssh2 Jul 16 14:25:20 aat-srv002 sshd[16236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.141.211.210 ... |
2019-07-17 04:22:25 |
| 77.247.110.217 | attack | Multiport scan : 43 ports scanned 86 154 355 465 610 620 705 818 1130 3535 5510 5556 7373 7881 8058 8059 8065 8107 8109 8110 8383 8384 8811 9006 9007 9140 9203 10919 14237 16223 18888 23424 24469 24472(x2) 30006(x2) 32707 34960 37035 37167 38081 40405 42482 52710 |
2019-07-17 04:07:10 |
| 185.88.153.241 | attackspambots | WP_xmlrpc_attack |
2019-07-17 04:30:46 |
| 162.193.139.240 | attack | Jul 16 22:40:29 srv-4 sshd\[18303\]: Invalid user gregory from 162.193.139.240 Jul 16 22:40:29 srv-4 sshd\[18303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.193.139.240 Jul 16 22:40:31 srv-4 sshd\[18303\]: Failed password for invalid user gregory from 162.193.139.240 port 50102 ssh2 ... |
2019-07-17 04:32:37 |
| 114.242.245.251 | attack | Jul 16 20:17:27 mail sshd\[4295\]: Invalid user temp from 114.242.245.251 port 57918 Jul 16 20:17:27 mail sshd\[4295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242.245.251 Jul 16 20:17:29 mail sshd\[4295\]: Failed password for invalid user temp from 114.242.245.251 port 57918 ssh2 Jul 16 20:21:46 mail sshd\[4352\]: Invalid user mc2server from 114.242.245.251 port 46354 Jul 16 20:21:46 mail sshd\[4352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.242.245.251 ... |
2019-07-17 04:21:51 |
| 46.3.96.71 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-07-17 04:09:04 |
| 193.189.75.166 | attackbotsspam | WP_xmlrpc_attack |
2019-07-17 04:30:31 |
| 175.162.250.110 | attack | Jul 16 13:02:36 tuxlinux sshd[65207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.162.250.110 user=root Jul 16 13:02:38 tuxlinux sshd[65207]: Failed password for root from 175.162.250.110 port 49122 ssh2 Jul 16 13:02:36 tuxlinux sshd[65207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.162.250.110 user=root Jul 16 13:02:38 tuxlinux sshd[65207]: Failed password for root from 175.162.250.110 port 49122 ssh2 Jul 16 13:02:36 tuxlinux sshd[65207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.162.250.110 user=root Jul 16 13:02:38 tuxlinux sshd[65207]: Failed password for root from 175.162.250.110 port 49122 ssh2 Jul 16 13:02:42 tuxlinux sshd[65207]: Failed password for root from 175.162.250.110 port 49122 ssh2 ... |
2019-07-17 04:32:08 |
| 103.76.252.6 | attack | Jul 16 20:18:46 MK-Soft-VM7 sshd\[3198\]: Invalid user edu from 103.76.252.6 port 28833 Jul 16 20:18:46 MK-Soft-VM7 sshd\[3198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6 Jul 16 20:18:48 MK-Soft-VM7 sshd\[3198\]: Failed password for invalid user edu from 103.76.252.6 port 28833 ssh2 ... |
2019-07-17 04:26:13 |