城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.110.79.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;125.110.79.142. IN A
;; AUTHORITY SECTION:
. 574 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030801 1800 900 604800 86400
;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 01:03:42 CST 2022
;; MSG SIZE rcvd: 107
Host 142.79.110.125.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.79.110.125.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.29.177.90 | attack | Feb 4 15:39:23 xeon sshd[21554]: Failed password for root from 14.29.177.90 port 60671 ssh2 |
2020-02-04 23:07:58 |
| 104.248.158.95 | attack | xmlrpc attack |
2020-02-04 22:21:38 |
| 71.6.146.185 | attackspam | Honeypot hit. |
2020-02-04 22:40:49 |
| 190.64.204.140 | attackbotsspam | 2020-02-04T15:17:06.286775scmdmz1 sshd[6004]: Invalid user julios from 190.64.204.140 port 52105 2020-02-04T15:17:06.290639scmdmz1 sshd[6004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.204.140 2020-02-04T15:17:06.286775scmdmz1 sshd[6004]: Invalid user julios from 190.64.204.140 port 52105 2020-02-04T15:17:07.811924scmdmz1 sshd[6004]: Failed password for invalid user julios from 190.64.204.140 port 52105 ssh2 2020-02-04T15:20:28.712730scmdmz1 sshd[6321]: Invalid user user3 from 190.64.204.140 port 35886 ... |
2020-02-04 22:34:23 |
| 158.69.205.87 | attack | Feb 4 14:52:31 mail sshd\[5141\]: Invalid user murp from 158.69.205.87 Feb 4 14:52:31 mail sshd\[5141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.205.87 Feb 4 14:52:32 mail sshd\[5141\]: Failed password for invalid user murp from 158.69.205.87 port 44774 ssh2 |
2020-02-04 22:48:06 |
| 41.109.25.15 | attackspam | Feb 4 14:52:20 andromeda sshd\[39209\]: Invalid user ubnt from 41.109.25.15 port 59867 Feb 4 14:52:20 andromeda sshd\[39209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.109.25.15 Feb 4 14:52:21 andromeda sshd\[39209\]: Failed password for invalid user ubnt from 41.109.25.15 port 59867 ssh2 |
2020-02-04 23:06:03 |
| 213.82.88.180 | attackbots | Feb 4 05:04:07 web1 sshd\[4075\]: Invalid user zzz from 213.82.88.180 Feb 4 05:04:07 web1 sshd\[4075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.82.88.180 Feb 4 05:04:09 web1 sshd\[4075\]: Failed password for invalid user zzz from 213.82.88.180 port 39777 ssh2 Feb 4 05:07:02 web1 sshd\[4361\]: Invalid user fattysam from 213.82.88.180 Feb 4 05:07:02 web1 sshd\[4361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.82.88.180 |
2020-02-04 23:08:19 |
| 14.166.174.72 | attackspam | 2019-07-07 08:54:51 1hk14U-0000fT-N5 SMTP connection from \(static.vnpt.vn\) \[14.166.174.72\]:11105 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 08:55:20 1hk14x-0000hJ-6r SMTP connection from \(static.vnpt.vn\) \[14.166.174.72\]:11272 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 08:55:41 1hk15H-0000ha-O7 SMTP connection from \(static.vnpt.vn\) \[14.166.174.72\]:11394 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 23:03:04 |
| 14.181.30.100 | attack | 2019-07-06 16:16:58 1hjlUm-0001Hm-IS SMTP connection from \(static.vnpt.vn\) \[14.181.30.100\]:35558 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 16:17:08 1hjlUw-0001I6-TK SMTP connection from \(static.vnpt.vn\) \[14.181.30.100\]:35627 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 16:17:15 1hjlV4-0001I9-CY SMTP connection from \(static.vnpt.vn\) \[14.181.30.100\]:35673 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 22:36:20 |
| 14.170.214.234 | attack | 2019-09-16 08:38:18 1i9keP-0002IF-V1 SMTP connection from \(static.vnpt.vn\) \[14.170.214.234\]:14582 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 08:38:23 1i9keU-0002IL-5s SMTP connection from \(static.vnpt.vn\) \[14.170.214.234\]:14648 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 08:38:25 1i9keW-0002IS-DP SMTP connection from \(static.vnpt.vn\) \[14.170.214.234\]:14674 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 22:57:00 |
| 178.128.59.245 | attackbotsspam | Feb 4 14:52:40 ArkNodeAT sshd\[7183\]: Invalid user shai from 178.128.59.245 Feb 4 14:52:40 ArkNodeAT sshd\[7183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.59.245 Feb 4 14:52:42 ArkNodeAT sshd\[7183\]: Failed password for invalid user shai from 178.128.59.245 port 43312 ssh2 |
2020-02-04 22:29:04 |
| 42.119.212.82 | attackbots | Feb 4 14:52:44 grey postfix/smtpd\[10805\]: NOQUEUE: reject: RCPT from unknown\[42.119.212.82\]: 554 5.7.1 Service unavailable\; Client host \[42.119.212.82\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=42.119.212.82\; from=\ |
2020-02-04 22:35:21 |
| 14.165.107.213 | attack | 2019-03-01 12:32:39 H=\(static.vnpt.vn\) \[14.165.107.213\]:25277 I=\[193.107.88.166\]:25 F=\ |
2020-02-04 23:08:57 |
| 189.89.94.242 | attackbots | Feb 4 14:48:26 legacy sshd[12354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.89.94.242 Feb 4 14:48:28 legacy sshd[12354]: Failed password for invalid user sftp from 189.89.94.242 port 46862 ssh2 Feb 4 14:52:37 legacy sshd[12715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.89.94.242 ... |
2020-02-04 22:44:19 |
| 91.121.11.70 | attackspambots | 02/04/2020-08:52:39.247269 91.121.11.70 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-02-04 22:42:07 |