城市(city): unknown
省份(region): unknown
国家(country): New Zealand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.92.180.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;118.92.180.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012701 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 02:21:37 CST 2025
;; MSG SIZE rcvd: 107
142.180.92.118.in-addr.arpa domain name pointer 118-92-180-142.dsl.dyn.ihug.co.nz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.180.92.118.in-addr.arpa name = 118-92-180-142.dsl.dyn.ihug.co.nz.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 95.85.69.50 | attackspam | Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage=" |
2019-07-25 07:49:36 |
| 104.245.144.61 | attackspambots | (From caleb.key78@gmail.com) Would you like to post your ad on 1000's of Advertising sites monthly? Pay one low monthly fee and get virtually unlimited traffic to your site forever!To find out more check out our site here: http://post1000sofads.webhop.me |
2019-07-25 07:27:03 |
| 132.232.104.106 | attackspam | Jul 24 19:14:49 localhost sshd\[16894\]: Invalid user ayub from 132.232.104.106 Jul 24 19:14:49 localhost sshd\[16894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.106 Jul 24 19:14:51 localhost sshd\[16894\]: Failed password for invalid user ayub from 132.232.104.106 port 50662 ssh2 Jul 24 19:21:24 localhost sshd\[17423\]: Invalid user gh from 132.232.104.106 Jul 24 19:21:24 localhost sshd\[17423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.106 ... |
2019-07-25 07:14:02 |
| 125.88.177.12 | attackspam | Jul 25 02:03:13 server sshd\[4333\]: Invalid user ethan from 125.88.177.12 port 62153 Jul 25 02:03:13 server sshd\[4333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.88.177.12 Jul 25 02:03:15 server sshd\[4333\]: Failed password for invalid user ethan from 125.88.177.12 port 62153 ssh2 Jul 25 02:05:30 server sshd\[1735\]: Invalid user sunday from 125.88.177.12 port 14085 Jul 25 02:05:30 server sshd\[1735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.88.177.12 |
2019-07-25 07:19:44 |
| 162.243.144.247 | attack | SPAM Delivery Attempt |
2019-07-25 07:30:01 |
| 177.196.207.139 | attackspam | 2019-07-24T23:34:38.041033enmeeting.mahidol.ac.th sshd\[4671\]: User root from 177.196.207.139 not allowed because not listed in AllowUsers 2019-07-24T23:34:38.594744enmeeting.mahidol.ac.th sshd\[4671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.196.207.139 user=root 2019-07-24T23:34:40.675107enmeeting.mahidol.ac.th sshd\[4671\]: Failed password for invalid user root from 177.196.207.139 port 10385 ssh2 ... |
2019-07-25 07:29:35 |
| 54.36.222.37 | attackspam | Invalid user admin from 54.36.222.37 port 39288 |
2019-07-25 07:51:21 |
| 148.234.93.58 | attack | Unauthorized connection attempt from IP address 148.234.93.58 on Port 445(SMB) |
2019-07-25 08:03:35 |
| 142.93.101.13 | attackspam | Invalid user user from 142.93.101.13 port 60234 |
2019-07-25 07:26:30 |
| 50.17.13.53 | attackbots | Jul 24 16:34:11 TCP Attack: SRC=50.17.13.53 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=234 DF PROTO=TCP SPT=37040 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0 |
2019-07-25 07:39:31 |
| 94.23.62.187 | attackspam | Jul 24 19:39:01 SilenceServices sshd[31207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.62.187 Jul 24 19:39:04 SilenceServices sshd[31207]: Failed password for invalid user ubuntu from 94.23.62.187 port 53130 ssh2 Jul 24 19:44:55 SilenceServices sshd[1828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.62.187 |
2019-07-25 07:46:33 |
| 104.237.228.135 | attack | Unauthorized connection attempt from IP address 104.237.228.135 on Port 445(SMB) |
2019-07-25 07:52:45 |
| 60.2.100.146 | attack | Jul 24 16:34:20 unicornsoft sshd\[13192\]: User mysql from 60.2.100.146 not allowed because not listed in AllowUsers Jul 24 16:34:20 unicornsoft sshd\[13192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.2.100.146 user=mysql Jul 24 16:34:21 unicornsoft sshd\[13192\]: Failed password for invalid user mysql from 60.2.100.146 port 42187 ssh2 |
2019-07-25 07:35:15 |
| 204.17.56.42 | attack | Brute-Force attack detected (85) and blocked by Fail2Ban. |
2019-07-25 07:30:55 |
| 106.12.100.179 | attack | 2019-07-24T23:28:54.651010abusebot-5.cloudsearch.cf sshd\[5951\]: Invalid user terraria from 106.12.100.179 port 38196 |
2019-07-25 07:51:42 |