城市(city): Shanghai
省份(region): Shanghai
国家(country): China
运营商(isp): China Telecom
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.76.194.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;124.76.194.42. IN A
;; AUTHORITY SECTION:
. 210 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020081203 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 13 07:42:21 CST 2020
;; MSG SIZE rcvd: 117
Host 42.194.76.124.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.194.76.124.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
125.69.68.125 | attackspambots | detected by Fail2Ban |
2020-10-03 02:49:40 |
49.233.185.157 | attack | Oct 2 13:59:00 inter-technics sshd[12283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.185.157 user=root Oct 2 13:59:02 inter-technics sshd[12283]: Failed password for root from 49.233.185.157 port 43374 ssh2 Oct 2 14:03:10 inter-technics sshd[12529]: Invalid user glenn from 49.233.185.157 port 60128 Oct 2 14:03:10 inter-technics sshd[12529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.185.157 Oct 2 14:03:10 inter-technics sshd[12529]: Invalid user glenn from 49.233.185.157 port 60128 Oct 2 14:03:12 inter-technics sshd[12529]: Failed password for invalid user glenn from 49.233.185.157 port 60128 ssh2 ... |
2020-10-03 02:52:25 |
218.241.134.34 | attack | Oct 2 20:17:49 h1745522 sshd[1007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.134.34 user=root Oct 2 20:17:51 h1745522 sshd[1007]: Failed password for root from 218.241.134.34 port 44523 ssh2 Oct 2 20:21:45 h1745522 sshd[1394]: Invalid user oracle from 218.241.134.34 port 17117 Oct 2 20:21:45 h1745522 sshd[1394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.134.34 Oct 2 20:21:45 h1745522 sshd[1394]: Invalid user oracle from 218.241.134.34 port 17117 Oct 2 20:21:46 h1745522 sshd[1394]: Failed password for invalid user oracle from 218.241.134.34 port 17117 ssh2 Oct 2 20:25:33 h1745522 sshd[1881]: Invalid user jboss from 218.241.134.34 port 43005 Oct 2 20:25:33 h1745522 sshd[1881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.134.34 Oct 2 20:25:33 h1745522 sshd[1881]: Invalid user jboss from 218.241.134.34 port 43005 Oct 2 2 ... |
2020-10-03 02:57:52 |
125.119.43.254 | attackspam | Oct 1 20:33:58 CT3029 sshd[7727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.119.43.254 user=r.r Oct 1 20:34:00 CT3029 sshd[7727]: Failed password for r.r from 125.119.43.254 port 60634 ssh2 Oct 1 20:34:01 CT3029 sshd[7727]: Received disconnect from 125.119.43.254 port 60634:11: Bye Bye [preauth] Oct 1 20:34:01 CT3029 sshd[7727]: Disconnected from 125.119.43.254 port 60634 [preauth] Oct 1 20:34:26 CT3029 sshd[7729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.119.43.254 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=125.119.43.254 |
2020-10-03 02:59:35 |
179.52.187.206 | attackbotsspam | Oct 1 16:31:51 cumulus sshd[30705]: Did not receive identification string from 179.52.187.206 port 63289 Oct 1 16:31:53 cumulus sshd[30706]: Did not receive identification string from 179.52.187.206 port 63477 Oct 1 16:31:53 cumulus sshd[30708]: Did not receive identification string from 179.52.187.206 port 63485 Oct 1 16:31:53 cumulus sshd[30707]: Did not receive identification string from 179.52.187.206 port 63480 Oct 1 16:31:53 cumulus sshd[30709]: Did not receive identification string from 179.52.187.206 port 63483 Oct 1 16:31:53 cumulus sshd[30710]: Invalid user nagesh from 179.52.187.206 port 63492 Oct 1 16:31:54 cumulus sshd[30712]: Did not receive identification string from 179.52.187.206 port 63484 Oct 1 16:31:54 cumulus sshd[30713]: Did not receive identification string from 179.52.187.206 port 63481 Oct 1 16:31:54 cumulus sshd[30710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.52.187.206 Oct 1 16:31:5........ ------------------------------- |
2020-10-03 02:37:14 |
14.63.125.204 | attack | Found on Alienvault / proto=6 . srcport=30883 . dstport=5555 . (3848) |
2020-10-03 03:02:35 |
180.76.141.221 | attack | Oct 2 18:21:05 ip106 sshd[22211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.141.221 Oct 2 18:21:07 ip106 sshd[22211]: Failed password for invalid user master from 180.76.141.221 port 47180 ssh2 ... |
2020-10-03 02:56:52 |
129.126.240.243 | attackspambots | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-10-03 03:10:18 |
45.148.122.20 | attack | Sep 30 19:17:45 kunden sshd[4130]: Invalid user fake from 45.148.122.20 Sep 30 19:17:45 kunden sshd[4130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.122.20 Sep 30 19:17:47 kunden sshd[4130]: Failed password for invalid user fake from 45.148.122.20 port 44306 ssh2 Sep 30 19:17:47 kunden sshd[4130]: Received disconnect from 45.148.122.20: 11: Bye Bye [preauth] Sep 30 19:17:51 kunden sshd[4138]: Invalid user admin from 45.148.122.20 Sep 30 19:17:51 kunden sshd[4138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.122.20 Sep 30 19:17:54 kunden sshd[4138]: Failed password for invalid user admin from 45.148.122.20 port 51340 ssh2 Sep 30 19:17:54 kunden sshd[4138]: Received disconnect from 45.148.122.20: 11: Bye Bye [preauth] Sep 30 19:17:55 kunden sshd[4168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.122.20 user=r.r Sep 3........ ------------------------------- |
2020-10-03 03:11:29 |
180.76.135.15 | attackspam | 2020-10-01T20:34:24.869738hostname sshd[4630]: Failed password for invalid user test from 180.76.135.15 port 53992 ssh2 ... |
2020-10-03 02:49:55 |
118.40.248.20 | attackspambots | Oct 2 15:30:53 sip sshd[3193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.40.248.20 Oct 2 15:30:55 sip sshd[3193]: Failed password for invalid user Test from 118.40.248.20 port 54541 ssh2 Oct 2 15:38:44 sip sshd[5222]: Failed password for root from 118.40.248.20 port 45957 ssh2 |
2020-10-03 02:41:13 |
62.112.11.8 | attack | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-10-02T16:56:24Z and 2020-10-02T18:06:32Z |
2020-10-03 02:39:20 |
167.99.172.154 | attack | Brute-force attempt banned |
2020-10-03 02:50:07 |
124.207.98.213 | attack | $f2bV_matches |
2020-10-03 02:48:03 |
219.136.65.109 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-10-03 03:11:54 |