城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.12.178.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.12.178.139. IN A
;; AUTHORITY SECTION:
. 309 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 19:56:31 CST 2022
;; MSG SIZE rcvd: 107
Host 139.178.12.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.178.12.121.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.14.180.110 | attack |
|
2020-06-07 02:07:24 |
| 195.54.160.135 | attackbots | 06/06/2020-13:49:57.812295 195.54.160.135 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-07 01:58:28 |
| 106.12.129.167 | attackspam | Lines containing failures of 106.12.129.167 Jun 5 23:14:30 newdogma sshd[32633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.129.167 user=r.r Jun 5 23:14:32 newdogma sshd[32633]: Failed password for r.r from 106.12.129.167 port 37472 ssh2 Jun 5 23:14:33 newdogma sshd[32633]: Received disconnect from 106.12.129.167 port 37472:11: Bye Bye [preauth] Jun 5 23:14:33 newdogma sshd[32633]: Disconnected from authenticating user r.r 106.12.129.167 port 37472 [preauth] Jun 5 23:25:57 newdogma sshd[516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.129.167 user=r.r Jun 5 23:25:59 newdogma sshd[516]: Failed password for r.r from 106.12.129.167 port 42458 ssh2 Jun 5 23:26:00 newdogma sshd[516]: Received disconnect from 106.12.129.167 port 42458:11: Bye Bye [preauth] Jun 5 23:26:00 newdogma sshd[516]: Disconnected from authenticating user r.r 106.12.129.167 port 42458 [preaut........ ------------------------------ |
2020-06-07 01:51:34 |
| 193.37.255.114 | attackbots |
|
2020-06-07 02:08:51 |
| 93.108.242.140 | attack | (sshd) Failed SSH login from 93.108.242.140 (PT/Portugal/140.242.108.93.rev.vodafone.pt): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 6 19:08:57 amsweb01 sshd[13106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root Jun 6 19:08:59 amsweb01 sshd[13106]: Failed password for root from 93.108.242.140 port 13258 ssh2 Jun 6 19:25:48 amsweb01 sshd[15387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root Jun 6 19:25:50 amsweb01 sshd[15387]: Failed password for root from 93.108.242.140 port 36509 ssh2 Jun 6 19:29:14 amsweb01 sshd[15866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.108.242.140 user=root |
2020-06-07 01:50:11 |
| 79.120.54.174 | attackbotsspam | SSH invalid-user multiple login attempts |
2020-06-07 01:50:34 |
| 66.117.140.20 | attackspambots | Ref: mx Logwatch report |
2020-06-07 01:46:51 |
| 183.176.252.22 | attackbots | probes 3 times on the port 17621 |
2020-06-07 02:03:34 |
| 146.158.30.82 | attackbots |
|
2020-06-07 01:45:51 |
| 58.153.210.140 | attackspambots | Brute-force attempt banned |
2020-06-07 01:53:36 |
| 148.251.48.231 | attackspambots |
|
2020-06-07 02:05:29 |
| 142.93.186.206 | attack | firewall-block, port(s): 15699/tcp |
2020-06-07 02:05:59 |
| 139.59.90.0 | attack | scans 2 times in preceeding hours on the ports (in chronological order) 22226 8223 |
2020-06-07 02:06:23 |
| 116.102.21.8 | attackspambots | Automatic report - Port Scan Attack |
2020-06-07 01:38:02 |
| 69.247.97.80 | attack | 2020-06-06T16:17:21.201295abusebot-7.cloudsearch.cf sshd[19098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-247-97-80.hsd1.pa.comcast.net user=root 2020-06-06T16:17:22.686663abusebot-7.cloudsearch.cf sshd[19098]: Failed password for root from 69.247.97.80 port 39034 ssh2 2020-06-06T16:18:37.105565abusebot-7.cloudsearch.cf sshd[19176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-247-97-80.hsd1.pa.comcast.net user=root 2020-06-06T16:18:39.358246abusebot-7.cloudsearch.cf sshd[19176]: Failed password for root from 69.247.97.80 port 59064 ssh2 2020-06-06T16:19:53.559273abusebot-7.cloudsearch.cf sshd[19248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-69-247-97-80.hsd1.pa.comcast.net user=root 2020-06-06T16:19:55.580360abusebot-7.cloudsearch.cf sshd[19248]: Failed password for root from 69.247.97.80 port 50868 ssh2 2020-06-06T16:21:10.760575abuse ... |
2020-06-07 01:47:20 |