城市(city): unknown
省份(region): unknown
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.242.76.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23663
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.242.76.45. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 15:29:08 CST 2025
;; MSG SIZE rcvd: 106
45.76.242.121.in-addr.arpa domain name pointer 121.242.76.45.static-pune.vsnl.net.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
45.76.242.121.in-addr.arpa name = 121.242.76.45.static-pune.vsnl.net.in.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.38.65.208 | attackbots | SSH Brute-Forcing (server2) |
2020-08-03 14:47:58 |
| 109.168.18.114 | attack | sshd jail - ssh hack attempt |
2020-08-03 15:08:49 |
| 115.238.62.154 | attackspam | Aug 3 08:16:40 rotator sshd\[32387\]: Failed password for root from 115.238.62.154 port 9500 ssh2Aug 3 08:18:15 rotator sshd\[32429\]: Failed password for root from 115.238.62.154 port 17574 ssh2Aug 3 08:19:57 rotator sshd\[32461\]: Failed password for root from 115.238.62.154 port 25648 ssh2Aug 3 08:21:27 rotator sshd\[791\]: Failed password for root from 115.238.62.154 port 33723 ssh2Aug 3 08:22:58 rotator sshd\[819\]: Failed password for root from 115.238.62.154 port 41796 ssh2Aug 3 08:24:36 rotator sshd\[839\]: Failed password for root from 115.238.62.154 port 49871 ssh2 ... |
2020-08-03 15:03:29 |
| 58.102.80.115 | attack | Automatic report - Banned IP Access |
2020-08-03 14:53:58 |
| 49.232.162.53 | attackspambots | srv02 Mass scanning activity detected Target: 28425 .. |
2020-08-03 14:46:20 |
| 218.208.155.238 | attack | Automatic report - Port Scan Attack |
2020-08-03 15:28:08 |
| 180.166.117.254 | attack | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-08-03 15:24:45 |
| 123.13.203.67 | attackbotsspam | Aug 3 04:47:04 sigma sshd\[19215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.13.203.67 user=rootAug 3 04:55:00 sigma sshd\[19385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.13.203.67 user=root ... |
2020-08-03 14:50:37 |
| 46.101.100.227 | attackspambots | Aug 3 08:46:01 db sshd[2295]: User root from 46.101.100.227 not allowed because none of user's groups are listed in AllowGroups ... |
2020-08-03 14:56:00 |
| 160.124.157.76 | attackspam | 2020-08-03T08:29:36.329532ks3355764 sshd[25469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.124.157.76 user=root 2020-08-03T08:29:38.356907ks3355764 sshd[25469]: Failed password for root from 160.124.157.76 port 33226 ssh2 ... |
2020-08-03 14:56:56 |
| 188.166.144.207 | attack | 2020-08-03T06:52:30.335855lavrinenko.info sshd[20141]: Failed password for root from 188.166.144.207 port 44318 ssh2 2020-08-03T06:53:39.458446lavrinenko.info sshd[20157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.144.207 user=root 2020-08-03T06:53:41.265989lavrinenko.info sshd[20157]: Failed password for root from 188.166.144.207 port 60902 ssh2 2020-08-03T06:54:48.221425lavrinenko.info sshd[20207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.144.207 user=root 2020-08-03T06:54:50.836768lavrinenko.info sshd[20207]: Failed password for root from 188.166.144.207 port 49254 ssh2 ... |
2020-08-03 14:56:37 |
| 196.27.127.61 | attackbotsspam | Aug 3 08:15:55 nextcloud sshd\[19855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61 user=root Aug 3 08:15:57 nextcloud sshd\[19855\]: Failed password for root from 196.27.127.61 port 39797 ssh2 Aug 3 08:23:03 nextcloud sshd\[27879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61 user=root |
2020-08-03 15:20:48 |
| 122.51.60.39 | attackbots | 2020-08-02 22:51:45.109591-0500 localhost sshd[26055]: Failed password for root from 122.51.60.39 port 39684 ssh2 |
2020-08-03 14:47:32 |
| 54.36.180.236 | attackspambots | Aug 3 05:54:12 ns37 sshd[8369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.180.236 |
2020-08-03 15:27:43 |
| 213.157.50.108 | attack | Unauthorized connection attempt from IP address 213.157.50.108 on Port 445(SMB) |
2020-08-03 14:46:31 |