城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.68.207.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.68.207.39. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 07:31:55 CST 2025
;; MSG SIZE rcvd: 106
Host 39.207.68.124.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 39.207.68.124.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 59.72.122.148 | attackspambots | $f2bV_matches |
2020-09-16 19:29:42 |
| 192.241.228.251 | attackbotsspam | Sep 16 02:25:13 firewall sshd[28953]: Failed password for invalid user sales from 192.241.228.251 port 59246 ssh2 Sep 16 02:28:55 firewall sshd[29050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.228.251 user=root Sep 16 02:28:57 firewall sshd[29050]: Failed password for root from 192.241.228.251 port 34358 ssh2 ... |
2020-09-16 19:26:50 |
| 185.191.171.25 | attack | (mod_security) mod_security (id:980001) triggered by 185.191.171.25 (NL/Netherlands/bot.semrush.com): 5 in the last 14400 secs; ID: rub |
2020-09-16 19:31:01 |
| 189.8.68.56 | attackbotsspam | $f2bV_matches |
2020-09-16 19:25:37 |
| 200.204.174.163 | attackspambots | (sshd) Failed SSH login from 200.204.174.163 (BR/Brazil/200-204-174-163.dsl.telesp.net.br): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 06:01:34 optimus sshd[25785]: Failed password for root from 200.204.174.163 port 10375 ssh2 Sep 16 06:02:21 optimus sshd[26086]: Failed password for root from 200.204.174.163 port 18412 ssh2 Sep 16 06:07:41 optimus sshd[27717]: Failed password for root from 200.204.174.163 port 44396 ssh2 Sep 16 06:08:20 optimus sshd[27923]: Failed password for root from 200.204.174.163 port 52431 ssh2 Sep 16 06:13:36 optimus sshd[29608]: Failed password for root from 200.204.174.163 port 21912 ssh2 |
2020-09-16 19:18:53 |
| 196.216.228.111 | attackbots | Sep 15 10:16:36 xxx sshd[2928]: Failed password for r.r from 196.216.228.111 port 59882 ssh2 Sep 15 10:16:37 xxx sshd[2928]: Received disconnect from 196.216.228.111 port 59882:11: Bye Bye [preauth] Sep 15 10:16:37 xxx sshd[2928]: Disconnected from 196.216.228.111 port 59882 [preauth] Sep 15 10:24:00 xxx sshd[4120]: Failed password for r.r from 196.216.228.111 port 42808 ssh2 Sep 15 10:24:00 xxx sshd[4120]: Received disconnect from 196.216.228.111 port 42808:11: Bye Bye [preauth] Sep 15 10:24:00 xxx sshd[4120]: Disconnected from 196.216.228.111 port 42808 [preauth] Sep 15 10:27:31 xxx sshd[5171]: Failed password for r.r from 196.216.228.111 port 37122 ssh2 Sep 15 10:27:31 xxx sshd[5171]: Received disconnect from 196.216.228.111 port 37122:11: Bye Bye [preauth] Sep 15 10:27:31 xxx sshd[5171]: Disconnected from 196.216.228.111 port 37122 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=196.216.228.111 |
2020-09-16 19:15:33 |
| 83.96.47.178 | attackspam | 1600188905 - 09/15/2020 18:55:05 Host: 83.96.47.178/83.96.47.178 Port: 445 TCP Blocked |
2020-09-16 19:23:03 |
| 183.150.33.140 | attackspambots | Sep 14 22:49:02 clarabelen sshd[6702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.150.33.140 user=r.r Sep 14 22:49:04 clarabelen sshd[6702]: Failed password for r.r from 183.150.33.140 port 36138 ssh2 Sep 14 22:49:05 clarabelen sshd[6702]: Received disconnect from 183.150.33.140: 11: Bye Bye [preauth] Sep 14 23:02:35 clarabelen sshd[8596]: Invalid user oracle from 183.150.33.140 Sep 14 23:02:35 clarabelen sshd[8596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.150.33.140 Sep 14 23:02:38 clarabelen sshd[8596]: Failed password for invalid user oracle from 183.150.33.140 port 60940 ssh2 Sep 14 23:02:38 clarabelen sshd[8596]: Received disconnect from 183.150.33.140: 11: Bye Bye [preauth] Sep 14 23:06:23 clarabelen sshd[8897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.150.33.140 user=r.r Sep 14 23:06:25 clarabelen sshd[8897]: F........ ------------------------------- |
2020-09-16 19:17:23 |
| 62.234.193.119 | attackspambots | Sep 16 10:03:56 localhost sshd[936881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.193.119 Sep 16 10:03:56 localhost sshd[936881]: Invalid user oracle from 62.234.193.119 port 49198 Sep 16 10:03:58 localhost sshd[936881]: Failed password for invalid user oracle from 62.234.193.119 port 49198 ssh2 Sep 16 10:04:48 localhost sshd[938654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.193.119 user=root Sep 16 10:04:50 localhost sshd[938654]: Failed password for root from 62.234.193.119 port 59016 ssh2 ... |
2020-09-16 20:22:43 |
| 118.97.213.194 | attack | SSH auth scanning - multiple failed logins |
2020-09-16 19:21:54 |
| 150.95.31.150 | attackspambots | SSH Brute-Forcing (server1) |
2020-09-16 19:34:46 |
| 67.211.208.83 | attack | SSH auth scanning - multiple failed logins |
2020-09-16 20:19:39 |
| 191.53.196.62 | attackbotsspam | Sep 15 18:24:11 mail.srvfarm.net postfix/smtpd[2805914]: warning: unknown[191.53.196.62]: SASL PLAIN authentication failed: Sep 15 18:24:12 mail.srvfarm.net postfix/smtpd[2805914]: lost connection after AUTH from unknown[191.53.196.62] Sep 15 18:28:50 mail.srvfarm.net postfix/smtps/smtpd[2818213]: warning: unknown[191.53.196.62]: SASL PLAIN authentication failed: Sep 15 18:28:51 mail.srvfarm.net postfix/smtps/smtpd[2818213]: lost connection after AUTH from unknown[191.53.196.62] Sep 15 18:29:02 mail.srvfarm.net postfix/smtpd[2820536]: warning: unknown[191.53.196.62]: SASL PLAIN authentication failed: |
2020-09-16 19:37:40 |
| 152.32.167.129 | attack | Sep 16 12:55:24 OPSO sshd\[14671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.167.129 user=root Sep 16 12:55:26 OPSO sshd\[14671\]: Failed password for root from 152.32.167.129 port 57802 ssh2 Sep 16 12:59:17 OPSO sshd\[15588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.167.129 user=admin Sep 16 12:59:19 OPSO sshd\[15588\]: Failed password for admin from 152.32.167.129 port 59498 ssh2 Sep 16 13:03:03 OPSO sshd\[16263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.167.129 user=root |
2020-09-16 19:17:58 |
| 106.54.111.75 | attackspambots | (sshd) Failed SSH login from 106.54.111.75 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 07:39:14 jbs1 sshd[21766]: Invalid user unison from 106.54.111.75 Sep 16 07:39:14 jbs1 sshd[21766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.111.75 Sep 16 07:39:16 jbs1 sshd[21766]: Failed password for invalid user unison from 106.54.111.75 port 36034 ssh2 Sep 16 07:53:50 jbs1 sshd[28703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.111.75 user=root Sep 16 07:53:53 jbs1 sshd[28703]: Failed password for root from 106.54.111.75 port 45156 ssh2 |
2020-09-16 20:05:19 |