城市(city): unknown
省份(region): unknown
国家(country): Republic of China (ROC)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.242.143.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;111.242.143.49. IN A
;; AUTHORITY SECTION:
. 250 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 21:56:02 CST 2022
;; MSG SIZE rcvd: 107
49.143.242.111.in-addr.arpa domain name pointer 111-242-143-49.dynamic-ip.hinet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
49.143.242.111.in-addr.arpa name = 111-242-143-49.dynamic-ip.hinet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.118.161.29 | attackspam | 401/tcp 5985/tcp 5908/tcp... [2019-05-20/07-19]57pkt,35pt.(tcp),4pt.(udp),1tp.(icmp) |
2019-07-20 03:53:00 |
| 177.85.62.89 | attackspambots | failed_logins |
2019-07-20 03:40:13 |
| 119.197.77.52 | attackspambots | Jul 19 20:14:21 microserver sshd[28034]: Invalid user marianela from 119.197.77.52 port 47012 Jul 19 20:14:21 microserver sshd[28034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.197.77.52 Jul 19 20:14:24 microserver sshd[28034]: Failed password for invalid user marianela from 119.197.77.52 port 47012 ssh2 Jul 19 20:21:44 microserver sshd[29237]: Invalid user ye from 119.197.77.52 port 44834 Jul 19 20:21:44 microserver sshd[29237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.197.77.52 Jul 19 20:35:58 microserver sshd[31152]: Invalid user kiki from 119.197.77.52 port 40490 Jul 19 20:35:58 microserver sshd[31152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.197.77.52 Jul 19 20:36:00 microserver sshd[31152]: Failed password for invalid user kiki from 119.197.77.52 port 40490 ssh2 Jul 19 20:43:22 microserver sshd[31965]: Invalid user serverpilot from 119.197.77.52 port 38 |
2019-07-20 03:52:37 |
| 180.250.18.197 | attack | Jul 19 19:45:07 MK-Soft-VM3 sshd\[17308\]: Invalid user testlab from 180.250.18.197 port 13635 Jul 19 19:45:07 MK-Soft-VM3 sshd\[17308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.18.197 Jul 19 19:45:10 MK-Soft-VM3 sshd\[17308\]: Failed password for invalid user testlab from 180.250.18.197 port 13635 ssh2 ... |
2019-07-20 04:05:52 |
| 185.94.111.1 | attack | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-07-20 03:54:42 |
| 80.52.199.93 | attackspam | Invalid user iraf from 80.52.199.93 port 32822 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.52.199.93 Failed password for invalid user iraf from 80.52.199.93 port 32822 ssh2 Invalid user anonymous from 80.52.199.93 port 58758 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.52.199.93 |
2019-07-20 03:53:18 |
| 14.169.132.214 | attackbots | Jul 19 18:26:50 seraph sshd[21561]: Invalid user admin from 14.169.132.214 Jul 19 18:26:50 seraph sshd[21561]: pam_unix(sshd:auth): authentication fai= lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D14.169.132.214 Jul 19 18:26:53 seraph sshd[21561]: Failed password for invalid user admin = from 14.169.132.214 port 56526 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.169.132.214 |
2019-07-20 03:37:44 |
| 196.52.43.122 | attack | 987/tcp 20249/tcp 30303/tcp... [2019-05-23/07-19]54pkt,34pt.(tcp),3pt.(udp) |
2019-07-20 03:51:35 |
| 145.239.83.89 | attackbots | Jul 19 21:23:38 SilenceServices sshd[29657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.83.89 Jul 19 21:23:41 SilenceServices sshd[29657]: Failed password for invalid user tiina from 145.239.83.89 port 38508 ssh2 Jul 19 21:28:15 SilenceServices sshd[32038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.83.89 |
2019-07-20 03:46:43 |
| 47.204.197.188 | attack | 2019-07-19T22:13:03.055883ns1.unifynetsol.net webmin\[3629\]: Invalid login as root from 47.204.197.188 2019-07-19T22:13:08.824218ns1.unifynetsol.net webmin\[3630\]: Invalid login as root from 47.204.197.188 2019-07-19T22:13:14.573858ns1.unifynetsol.net webmin\[3631\]: Invalid login as root from 47.204.197.188 2019-07-19T22:13:20.350050ns1.unifynetsol.net webmin\[3637\]: Invalid login as root from 47.204.197.188 2019-07-19T22:13:26.101630ns1.unifynetsol.net webmin\[3643\]: Invalid login as root from 47.204.197.188 |
2019-07-20 03:48:16 |
| 185.220.101.50 | attack | Jul 19 19:41:04 localhost sshd\[57268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.50 user=root Jul 19 19:41:06 localhost sshd\[57268\]: Failed password for root from 185.220.101.50 port 44402 ssh2 Jul 19 19:41:09 localhost sshd\[57268\]: Failed password for root from 185.220.101.50 port 44402 ssh2 Jul 19 19:41:11 localhost sshd\[57268\]: Failed password for root from 185.220.101.50 port 44402 ssh2 Jul 19 19:41:14 localhost sshd\[57268\]: Failed password for root from 185.220.101.50 port 44402 ssh2 ... |
2019-07-20 03:41:17 |
| 168.167.220.64 | attack | Jul 19 16:43:07 *** sshd[25217]: Did not receive identification string from 168.167.220.64 |
2019-07-20 03:59:28 |
| 27.34.245.238 | attackbots | Jul 19 20:59:08 h2177944 sshd\[21513\]: Invalid user elizabeth from 27.34.245.238 port 52752 Jul 19 20:59:08 h2177944 sshd\[21513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.34.245.238 Jul 19 20:59:10 h2177944 sshd\[21513\]: Failed password for invalid user elizabeth from 27.34.245.238 port 52752 ssh2 Jul 19 21:11:03 h2177944 sshd\[22213\]: Invalid user lance from 27.34.245.238 port 42556 ... |
2019-07-20 03:45:32 |
| 184.105.247.244 | attack | 21/tcp 50070/tcp 3389/tcp... [2019-05-20/07-19]49pkt,18pt.(tcp),1pt.(udp) |
2019-07-20 03:44:33 |
| 51.77.28.40 | attackbotsspam | Jul 19 21:12:59 legacy sshd[19700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.28.40 Jul 19 21:13:01 legacy sshd[19700]: Failed password for invalid user csserver from 51.77.28.40 port 43590 ssh2 Jul 19 21:13:19 legacy sshd[19707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.28.40 ... |
2019-07-20 03:32:41 |