城市(city): unknown
省份(region): unknown
国家(country): Norway
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.242.141.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.242.141.44. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 15:11:38 CST 2025
;; MSG SIZE rcvd: 107
Host 44.141.242.129.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 44.141.242.129.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 114.7.124.134 | attack | Dec 12 16:45:35 vibhu-HP-Z238-Microtower-Workstation sshd\[30343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.124.134 user=root Dec 12 16:45:36 vibhu-HP-Z238-Microtower-Workstation sshd\[30343\]: Failed password for root from 114.7.124.134 port 53156 ssh2 Dec 12 16:52:29 vibhu-HP-Z238-Microtower-Workstation sshd\[32133\]: Invalid user pi from 114.7.124.134 Dec 12 16:52:29 vibhu-HP-Z238-Microtower-Workstation sshd\[32133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.124.134 Dec 12 16:52:30 vibhu-HP-Z238-Microtower-Workstation sshd\[32133\]: Failed password for invalid user pi from 114.7.124.134 port 34350 ssh2 ... |
2019-12-12 20:58:07 |
| 200.30.245.125 | attackspambots | Honeypot attack, port: 23, PTR: pc-125-245-30-200.cm.vtr.net. |
2019-12-12 21:28:46 |
| 46.109.74.206 | attackbots | Port 1433 Scan |
2019-12-12 21:22:25 |
| 202.29.221.202 | attackspambots | Dec 12 03:04:45 kapalua sshd\[31545\]: Invalid user tamasuke from 202.29.221.202 Dec 12 03:04:45 kapalua sshd\[31545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.221.202 Dec 12 03:04:46 kapalua sshd\[31545\]: Failed password for invalid user tamasuke from 202.29.221.202 port 53921 ssh2 Dec 12 03:12:51 kapalua sshd\[32534\]: Invalid user guest from 202.29.221.202 Dec 12 03:12:51 kapalua sshd\[32534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.221.202 |
2019-12-12 21:21:40 |
| 118.27.31.188 | attackbots | Dec 12 07:52:11 TORMINT sshd\[28046\]: Invalid user ablazed from 118.27.31.188 Dec 12 07:52:11 TORMINT sshd\[28046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.31.188 Dec 12 07:52:12 TORMINT sshd\[28046\]: Failed password for invalid user ablazed from 118.27.31.188 port 56142 ssh2 ... |
2019-12-12 21:07:04 |
| 37.151.106.178 | attack | Unauthorized connection attempt detected from IP address 37.151.106.178 to port 445 |
2019-12-12 20:59:54 |
| 91.165.50.161 | attackspambots | Port 1433 Scan |
2019-12-12 21:12:42 |
| 61.164.216.178 | attack | Honeypot attack, port: 445, PTR: 178.216.164.61.dial.wz.zj.dynamic.163data.com.cn. |
2019-12-12 21:10:06 |
| 158.69.160.191 | attack | Dec 12 13:58:40 srv206 sshd[13654]: Invalid user vonderweidt from 158.69.160.191 Dec 12 13:58:40 srv206 sshd[13654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip191.ip-158-69-160.net Dec 12 13:58:40 srv206 sshd[13654]: Invalid user vonderweidt from 158.69.160.191 Dec 12 13:58:42 srv206 sshd[13654]: Failed password for invalid user vonderweidt from 158.69.160.191 port 54662 ssh2 ... |
2019-12-12 21:25:14 |
| 103.206.118.201 | attack | Cluster member 192.168.0.31 (-) said, DENY 103.206.118.201, Reason:[(imapd) Failed IMAP login from 103.206.118.201 (IN/India/-): 1 in the last 3600 secs] |
2019-12-12 21:33:57 |
| 159.138.119.7 | attackspambots | detected by Fail2Ban |
2019-12-12 20:57:33 |
| 80.82.65.90 | attackspambots | 12/12/2019-13:35:31.777428 80.82.65.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-12-12 21:00:19 |
| 112.234.117.20 | attackspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-12-12 21:32:29 |
| 167.172.239.155 | attackbotsspam | 167.172.239.155 - - [12/Dec/2019:06:24:18 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.172.239.155 - - [12/Dec/2019:06:24:19 +0000] "POST /wp-login.php HTTP/1.1" 200 6253 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-12-12 20:59:36 |
| 216.144.251.86 | attackspambots | Dec 12 13:54:19 Ubuntu-1404-trusty-64-minimal sshd\[23298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.144.251.86 user=root Dec 12 13:54:22 Ubuntu-1404-trusty-64-minimal sshd\[23298\]: Failed password for root from 216.144.251.86 port 51774 ssh2 Dec 12 14:02:01 Ubuntu-1404-trusty-64-minimal sshd\[4049\]: Invalid user frappe from 216.144.251.86 Dec 12 14:02:01 Ubuntu-1404-trusty-64-minimal sshd\[4049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.144.251.86 Dec 12 14:02:03 Ubuntu-1404-trusty-64-minimal sshd\[4049\]: Failed password for invalid user frappe from 216.144.251.86 port 35188 ssh2 |
2019-12-12 21:12:56 |