城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.55.224.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46538
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.55.224.161. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 17:03:36 CST 2025
;; MSG SIZE rcvd: 107
Host 161.224.55.130.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 161.224.55.130.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 148.70.116.223 | attackbotsspam | Feb 7 23:38:40 vmd17057 sshd\[3553\]: Invalid user ulc from 148.70.116.223 port 33817 Feb 7 23:38:40 vmd17057 sshd\[3553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.116.223 Feb 7 23:38:42 vmd17057 sshd\[3553\]: Failed password for invalid user ulc from 148.70.116.223 port 33817 ssh2 ... |
2020-02-08 07:51:41 |
| 54.37.136.213 | attackbotsspam | Failed password for invalid user qyw from 54.37.136.213 port 33626 ssh2 Invalid user wqg from 54.37.136.213 port 35042 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.213 Failed password for invalid user wqg from 54.37.136.213 port 35042 ssh2 Invalid user wql from 54.37.136.213 port 36468 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.213 |
2020-02-08 07:21:32 |
| 112.84.91.154 | attackspambots | Feb 7 23:38:34 grey postfix/smtpd\[12187\]: NOQUEUE: reject: RCPT from unknown\[112.84.91.154\]: 554 5.7.1 Service unavailable\; Client host \[112.84.91.154\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[112.84.91.154\]\; from=\ |
2020-02-08 07:59:31 |
| 107.6.171.131 | attackspam | 2000/tcp 82/tcp 3389/tcp... [2019-12-16/2020-02-05]16pkt,14pt.(tcp) |
2020-02-08 07:57:48 |
| 92.222.209.223 | attackspam | 02/07/2020-17:38:54.915703 92.222.209.223 Protocol: 17 ET SCAN Sipvicious Scan |
2020-02-08 07:47:56 |
| 180.242.140.27 | attackbotsspam | php WP PHPmyadamin ABUSE blocked for 12h |
2020-02-08 07:44:56 |
| 196.188.42.130 | attackbotsspam | Feb 8 00:25:15 dedicated sshd[23538]: Invalid user yvb from 196.188.42.130 port 33321 |
2020-02-08 07:26:33 |
| 190.56.229.42 | attack | Feb 7 13:25:42 web1 sshd\[2640\]: Invalid user qfc from 190.56.229.42 Feb 7 13:25:42 web1 sshd\[2640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.56.229.42 Feb 7 13:25:44 web1 sshd\[2640\]: Failed password for invalid user qfc from 190.56.229.42 port 60632 ssh2 Feb 7 13:26:54 web1 sshd\[2743\]: Invalid user wmh from 190.56.229.42 Feb 7 13:26:54 web1 sshd\[2743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.56.229.42 |
2020-02-08 07:44:38 |
| 139.59.137.154 | attack | Feb 7 13:05:24 hpm sshd\[21483\]: Invalid user mqr from 139.59.137.154 Feb 7 13:05:24 hpm sshd\[21483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=brianbak.dk Feb 7 13:05:26 hpm sshd\[21483\]: Failed password for invalid user mqr from 139.59.137.154 port 35958 ssh2 Feb 7 13:08:06 hpm sshd\[21821\]: Invalid user da from 139.59.137.154 Feb 7 13:08:06 hpm sshd\[21821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=brianbak.dk |
2020-02-08 07:23:50 |
| 146.88.240.4 | attack | Multiport scan : 34 ports scanned 17(x5) 19(x3) 69(x2) 111(x2) 123(x9) 137(x5) 161(x3) 389(x4) 443(x5) 520(x5) 623(x3) 1194 1434(x4) 1604(x4) 1701 1900(x4) 3283(x5) 3702 5060(x4) 5093(x5) 5353(x5) 5683(x10) 7777 7778 7779 7780 7787 10001(x5) 11211(x5) 27017 27020 27962(x5) 28015 47808(x5) |
2020-02-08 07:24:54 |
| 14.29.215.44 | attack | Feb 7 23:39:18 pornomens sshd\[27821\]: Invalid user xat from 14.29.215.44 port 38393 Feb 7 23:39:18 pornomens sshd\[27821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.215.44 Feb 7 23:39:20 pornomens sshd\[27821\]: Failed password for invalid user xat from 14.29.215.44 port 38393 ssh2 ... |
2020-02-08 07:29:14 |
| 152.136.114.118 | attackbotsspam | sshd jail - ssh hack attempt |
2020-02-08 07:47:02 |
| 103.99.151.50 | attackbotsspam | Feb 8 01:13:58 tuotantolaitos sshd[18906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.99.151.50 Feb 8 01:13:59 tuotantolaitos sshd[18906]: Failed password for invalid user enf from 103.99.151.50 port 52894 ssh2 ... |
2020-02-08 07:21:54 |
| 119.29.129.88 | attack | SSH Brute-Force reported by Fail2Ban |
2020-02-08 07:41:25 |
| 77.42.118.184 | attack | Automatic report - Port Scan Attack |
2020-02-08 07:54:57 |