城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.213.125.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18258
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;118.213.125.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:46:47 CST 2025
;; MSG SIZE rcvd: 107
Host 21.125.213.118.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.125.213.118.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 198.108.67.90 | attack | firewall-block, port(s): 12380/tcp |
2019-12-16 14:51:30 |
| 104.168.250.71 | attackspambots | Dec 16 07:54:36 lnxmysql61 sshd[9737]: Failed password for root from 104.168.250.71 port 60142 ssh2 Dec 16 07:54:36 lnxmysql61 sshd[9737]: Failed password for root from 104.168.250.71 port 60142 ssh2 Dec 16 08:01:18 lnxmysql61 sshd[11524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.250.71 |
2019-12-16 15:05:09 |
| 200.165.167.10 | attack | Dec 15 19:49:04 eddieflores sshd\[27590\]: Invalid user kaleb from 200.165.167.10 Dec 15 19:49:04 eddieflores sshd\[27590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.165.167.10 Dec 15 19:49:06 eddieflores sshd\[27590\]: Failed password for invalid user kaleb from 200.165.167.10 port 58074 ssh2 Dec 15 19:55:40 eddieflores sshd\[28215\]: Invalid user jeff from 200.165.167.10 Dec 15 19:55:40 eddieflores sshd\[28215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.165.167.10 |
2019-12-16 14:14:15 |
| 112.161.241.30 | attackbots | Dec 16 04:49:52 game-panel sshd[4914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.161.241.30 Dec 16 04:49:55 game-panel sshd[4914]: Failed password for invalid user mri from 112.161.241.30 port 32858 ssh2 Dec 16 04:56:24 game-panel sshd[5301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.161.241.30 |
2019-12-16 14:23:31 |
| 49.233.155.23 | attackbots | Dec 16 05:44:27 ovpn sshd\[23694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.155.23 user=root Dec 16 05:44:29 ovpn sshd\[23694\]: Failed password for root from 49.233.155.23 port 54334 ssh2 Dec 16 05:50:19 ovpn sshd\[25163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.155.23 user=root Dec 16 05:50:22 ovpn sshd\[25163\]: Failed password for root from 49.233.155.23 port 44848 ssh2 Dec 16 05:56:33 ovpn sshd\[26746\]: Invalid user ahile from 49.233.155.23 Dec 16 05:56:33 ovpn sshd\[26746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.155.23 |
2019-12-16 14:15:32 |
| 189.209.252.216 | attackbotsspam | Dec 16 07:35:40 ns37 sshd[16260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.209.252.216 Dec 16 07:35:42 ns37 sshd[16260]: Failed password for invalid user hibrow from 189.209.252.216 port 63366 ssh2 Dec 16 07:41:54 ns37 sshd[16749]: Failed password for root from 189.209.252.216 port 52752 ssh2 |
2019-12-16 14:55:37 |
| 197.251.180.153 | attackbotsspam | Host Scan |
2019-12-16 15:04:40 |
| 118.32.194.213 | attack | Dec 16 08:51:03 sauna sshd[167928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.194.213 Dec 16 08:51:05 sauna sshd[167928]: Failed password for invalid user informix from 118.32.194.213 port 45870 ssh2 ... |
2019-12-16 14:57:42 |
| 182.75.75.26 | attackspam | 2019-12-16T06:29:18.141607scmdmz1 sshd\[26620\]: Invalid user backuppc from 182.75.75.26 port 49191 2019-12-16T06:29:18.448529scmdmz1 sshd\[26620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.75.26 2019-12-16T06:29:20.076773scmdmz1 sshd\[26620\]: Failed password for invalid user backuppc from 182.75.75.26 port 49191 ssh2 ... |
2019-12-16 14:27:33 |
| 106.12.28.232 | attackspambots | Dec 16 07:07:32 mail sshd[22523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.232 Dec 16 07:07:34 mail sshd[22523]: Failed password for invalid user git from 106.12.28.232 port 59652 ssh2 Dec 16 07:13:44 mail sshd[24586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.232 |
2019-12-16 14:23:58 |
| 107.175.70.252 | attackspam | (From edfrez.478@gmail.com) Greetings! I'm an expert with all the different programming languages, website platforms, shopping carts; and my expertise is in the WordPress website platform (I'd love to tell you more info about this if you're not familiar). Have you thought of making some upgrades on your website or building a new one? If so then I'd like to speak with you. I've been creating and both beautiful and efficient websites for over a decade now and I'm a professional at what I do. I do both programming and design work for a cheap price that even small businesses can afford. I also guarantee you that I do all the web design work by myself freelance, and I never outsource. If you'd like to know more, I'll send you my portfolio and some more detailed information about my services, then we can schedule a time for us to talk. Please write back to let me know. Talk soon! Thank you, Edward Frez | Web Designer / Developer |
2019-12-16 14:26:28 |
| 60.249.148.66 | attackspam | Unauthorized connection attempt detected from IP address 60.249.148.66 to port 445 |
2019-12-16 14:16:25 |
| 103.242.56.63 | attackbots | Unauthorized connection attempt detected from IP address 103.242.56.63 to port 445 |
2019-12-16 14:20:36 |
| 54.234.177.32 | attackspambots | Dec 16 07:17:36 server6 sshd[14130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-54-234-177-32.compute-1.amazonaws.com Dec 16 07:17:37 server6 sshd[14130]: Failed password for invalid user loren from 54.234.177.32 port 37876 ssh2 Dec 16 07:17:38 server6 sshd[14130]: Received disconnect from 54.234.177.32: 11: Bye Bye [preauth] Dec 16 07:27:35 server6 sshd[24389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-54-234-177-32.compute-1.amazonaws.com Dec 16 07:27:37 server6 sshd[24389]: Failed password for invalid user test from 54.234.177.32 port 51940 ssh2 Dec 16 07:27:37 server6 sshd[24389]: Received disconnect from 54.234.177.32: 11: Bye Bye [preauth] Dec 16 07:32:55 server6 sshd[29761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-54-234-177-32.compute-1.amazonaws.com user=r.r Dec 16 07:32:56 server6 sshd[29761]: Failed password f........ ------------------------------- |
2019-12-16 14:56:42 |
| 140.246.124.36 | attackspam | Dec 16 04:20:14 ws12vmsma01 sshd[62204]: Failed password for invalid user test from 140.246.124.36 port 39316 ssh2 Dec 16 04:29:08 ws12vmsma01 sshd[63446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.124.36 user=root Dec 16 04:29:11 ws12vmsma01 sshd[63446]: Failed password for root from 140.246.124.36 port 35772 ssh2 ... |
2019-12-16 14:52:12 |