城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.48.139.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21499
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;133.48.139.146. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:20:23 CST 2025
;; MSG SIZE rcvd: 107
Host 146.139.48.133.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 146.139.48.133.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 116.255.174.165 | attack | Mar 31 03:44:53 dallas01 sshd[3653]: Failed password for root from 116.255.174.165 port 56941 ssh2 Mar 31 03:50:37 dallas01 sshd[4697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.174.165 Mar 31 03:50:38 dallas01 sshd[4697]: Failed password for invalid user xc from 116.255.174.165 port 56438 ssh2 |
2020-03-31 17:21:39 |
| 216.194.122.27 | attackspambots | Mar 31 09:20:27 dev0-dcde-rnet sshd[10202]: Failed password for root from 216.194.122.27 port 46782 ssh2 Mar 31 09:26:09 dev0-dcde-rnet sshd[10237]: Failed password for root from 216.194.122.27 port 44052 ssh2 |
2020-03-31 17:26:55 |
| 92.46.40.110 | attackbotsspam | [PY] (sshd) Failed SSH login from 92.46.40.110 (KZ/Kazakhstan/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 31 04:34:44 svr sshd[104074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.40.110 user=root Mar 31 04:34:45 svr sshd[104074]: Failed password for root from 92.46.40.110 port 43268 ssh2 Mar 31 04:45:02 svr sshd[107830]: Invalid user test from 92.46.40.110 port 55408 Mar 31 04:45:04 svr sshd[107830]: Failed password for invalid user test from 92.46.40.110 port 55408 ssh2 Mar 31 04:49:22 svr sshd[109323]: Invalid user user from 92.46.40.110 port 34002 |
2020-03-31 17:30:34 |
| 51.38.213.132 | attack | ssh brute force |
2020-03-31 17:16:16 |
| 104.248.192.145 | attackspambots | SSH Brute-Forcing (server2) |
2020-03-31 17:13:17 |
| 51.161.12.231 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 36 - port: 8545 proto: TCP cat: Misc Attack |
2020-03-31 17:07:33 |
| 89.248.168.176 | attackbotsspam | 5015/tcp 5012/tcp 5002/tcp... [2020-01-30/03-31]263pkt,91pt.(tcp) |
2020-03-31 17:01:05 |
| 213.32.111.53 | attackspambots | sshd jail - ssh hack attempt |
2020-03-31 17:12:08 |
| 151.101.207.50 | attackbotsspam | port |
2020-03-31 17:13:05 |
| 103.126.56.22 | attackbots | Mar 31 08:32:09 [HOSTNAME] sshd[8468]: User **removed** from 103.126.56.22 not allowed because not listed in AllowUsers Mar 31 08:32:09 [HOSTNAME] sshd[8468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.56.22 user=**removed** Mar 31 08:32:11 [HOSTNAME] sshd[8468]: Failed password for invalid user **removed** from 103.126.56.22 port 47160 ssh2 ... |
2020-03-31 17:32:42 |
| 73.125.105.249 | attack | IP address logged by my Netflix account after the individual hacked into and locked me out of my account. Individual also changed my account settings to the most expensive plan, which allows multiple people (profiles) to watch, and several profiles were added. The name on my account was changed to "Juan". I contacted Netflix to have my account restored, so I was able to see the various IP addresses used. I will report all of them as well. |
2020-03-31 17:40:22 |
| 193.104.83.97 | attackbots | Mar 31 07:56:16 host01 sshd[6931]: Failed password for root from 193.104.83.97 port 60289 ssh2 Mar 31 08:03:37 host01 sshd[8218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.104.83.97 Mar 31 08:03:39 host01 sshd[8218]: Failed password for invalid user bp from 193.104.83.97 port 38147 ssh2 ... |
2020-03-31 17:28:39 |
| 41.44.63.230 | attackspambots | port scan and connect, tcp 23 (telnet) |
2020-03-31 17:45:54 |
| 89.248.168.202 | attackspam | 03/31/2020-03:54:47.603113 89.248.168.202 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-31 17:00:34 |
| 162.62.26.128 | attackbotsspam | Unauthorized connection attempt detected from IP address 162.62.26.128 to port 2080 |
2020-03-31 17:23:39 |