城市(city): unknown
省份(region): unknown
国家(country): Taiwan (Province of China)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.104.144.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1897
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;120.104.144.130. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:07:40 CST 2025
;; MSG SIZE rcvd: 108
Host 130.144.104.120.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 130.144.104.120.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 167.99.43.81 | attack | Automatic report - XMLRPC Attack |
2019-10-15 20:39:18 |
| 185.90.118.84 | attackspam | 10/15/2019-08:40:37.776157 185.90.118.84 Protocol: 6 ET SCAN Potential SSH Scan |
2019-10-15 20:41:52 |
| 208.97.31.229 | attackspambots | Automatic report - XMLRPC Attack |
2019-10-15 20:57:01 |
| 71.58.196.193 | attack | Oct 15 05:27:07 server3 sshd[24668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-71-58-196-193.hsd1.pa.comcast.net user=r.r Oct 15 05:27:10 server3 sshd[24668]: Failed password for r.r from 71.58.196.193 port 4109 ssh2 Oct 15 05:27:10 server3 sshd[24668]: Received disconnect from 71.58.196.193: 11: Bye Bye [preauth] Oct 15 05:33:48 server3 sshd[24816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-71-58-196-193.hsd1.pa.comcast.net user=r.r Oct 15 05:33:50 server3 sshd[24816]: Failed password for r.r from 71.58.196.193 port 12277 ssh2 Oct 15 05:33:50 server3 sshd[24816]: Received disconnect from 71.58.196.193: 11: Bye Bye [preauth] Oct 15 05:37:57 server3 sshd[24902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-71-58-196-193.hsd1.pa.comcast.net user=r.r Oct 15 05:37:59 server3 sshd[24902]: Failed password for r.r from 71.58.196.193 po........ ------------------------------- |
2019-10-15 20:31:06 |
| 37.114.147.145 | attackspambots | T: f2b postfix sasl 3x |
2019-10-15 20:44:35 |
| 180.101.205.28 | attackspam | Invalid user attack from 180.101.205.28 port 42360 |
2019-10-15 20:43:03 |
| 103.27.238.202 | attack | Oct 15 14:18:04 markkoudstaal sshd[7320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.238.202 Oct 15 14:18:06 markkoudstaal sshd[7320]: Failed password for invalid user qy from 103.27.238.202 port 36182 ssh2 Oct 15 14:24:16 markkoudstaal sshd[7849]: Failed password for root from 103.27.238.202 port 47916 ssh2 |
2019-10-15 20:32:34 |
| 35.188.242.129 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2019-10-15 20:25:54 |
| 207.154.220.13 | attackbotsspam | Oct 15 13:42:23 pornomens sshd\[6549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.220.13 user=root Oct 15 13:42:24 pornomens sshd\[6549\]: Failed password for root from 207.154.220.13 port 47894 ssh2 Oct 15 13:48:33 pornomens sshd\[6562\]: Invalid user a0 from 207.154.220.13 port 45902 Oct 15 13:48:33 pornomens sshd\[6562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.220.13 ... |
2019-10-15 20:45:03 |
| 46.245.179.222 | attack | Oct 15 11:45:50 hcbbdb sshd\[799\]: Invalid user 123456 from 46.245.179.222 Oct 15 11:45:50 hcbbdb sshd\[799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46-245-179-222.static.mivitec.net Oct 15 11:45:53 hcbbdb sshd\[799\]: Failed password for invalid user 123456 from 46.245.179.222 port 33176 ssh2 Oct 15 11:49:53 hcbbdb sshd\[1298\]: Invalid user win\&2014 from 46.245.179.222 Oct 15 11:49:53 hcbbdb sshd\[1298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46-245-179-222.static.mivitec.net |
2019-10-15 20:53:17 |
| 152.136.108.222 | attackbots | Oct 15 02:09:43 sachi sshd\[16870\]: Invalid user com from 152.136.108.222 Oct 15 02:09:43 sachi sshd\[16870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.108.222 Oct 15 02:09:45 sachi sshd\[16870\]: Failed password for invalid user com from 152.136.108.222 port 36084 ssh2 Oct 15 02:15:22 sachi sshd\[17371\]: Invalid user PaSsWoRd from 152.136.108.222 Oct 15 02:15:22 sachi sshd\[17371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.108.222 |
2019-10-15 20:24:44 |
| 102.68.17.48 | attackbots | Oct 15 01:58:19 hpm sshd\[12447\]: Invalid user bwadmin from 102.68.17.48 Oct 15 01:58:19 hpm sshd\[12447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.17.48 Oct 15 01:58:21 hpm sshd\[12447\]: Failed password for invalid user bwadmin from 102.68.17.48 port 54692 ssh2 Oct 15 02:03:42 hpm sshd\[12879\]: Invalid user ts3serverbot from 102.68.17.48 Oct 15 02:03:42 hpm sshd\[12879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.17.48 |
2019-10-15 20:30:48 |
| 49.88.112.71 | attack | 2019-10-15T12:43:29.372611shield sshd\[18692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71 user=root 2019-10-15T12:43:31.006992shield sshd\[18692\]: Failed password for root from 49.88.112.71 port 20741 ssh2 2019-10-15T12:43:33.201582shield sshd\[18692\]: Failed password for root from 49.88.112.71 port 20741 ssh2 2019-10-15T12:43:36.004591shield sshd\[18692\]: Failed password for root from 49.88.112.71 port 20741 ssh2 2019-10-15T12:45:20.958450shield sshd\[18980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71 user=root |
2019-10-15 20:57:36 |
| 185.90.118.52 | attack | 10/15/2019-08:21:48.241375 185.90.118.52 Protocol: 6 ET SCAN Potential SSH Scan |
2019-10-15 20:23:24 |
| 113.173.173.228 | attackspambots | Oct 15 13:41:26 lvps87-230-18-106 sshd[32393]: Address 113.173.173.228 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Oct 15 13:41:26 lvps87-230-18-106 sshd[32393]: Invalid user admin from 113.173.173.228 Oct 15 13:41:26 lvps87-230-18-106 sshd[32393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.173.173.228 Oct 15 13:41:28 lvps87-230-18-106 sshd[32393]: Failed password for invalid user admin from 113.173.173.228 port 60464 ssh2 Oct 15 13:41:28 lvps87-230-18-106 sshd[32393]: Connection closed by 113.173.173.228 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=113.173.173.228 |
2019-10-15 20:47:45 |