城市(city): Brandywine
省份(region): Maryland
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.11.68.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.11.68.212. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 08:26:58 CST 2025
;; MSG SIZE rcvd: 106
b'Host 212.68.11.134.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 134.11.68.212.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 177.87.68.218 | attackbotsspam | SMTP-sasl brute force ... |
2019-06-28 16:08:54 |
| 201.230.153.253 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2019-06-28 16:05:29 |
| 66.240.219.146 | attackspambots | [portscan] tcp/84 [ctf] *(RWIN=11888)(06281018) |
2019-06-28 15:55:36 |
| 185.109.54.156 | attackspambots | Jun 28 08:57:23 hosting sshd[20158]: Invalid user guillaume from 185.109.54.156 port 33550 Jun 28 08:57:23 hosting sshd[20158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.109.54.156 Jun 28 08:57:23 hosting sshd[20158]: Invalid user guillaume from 185.109.54.156 port 33550 Jun 28 08:57:25 hosting sshd[20158]: Failed password for invalid user guillaume from 185.109.54.156 port 33550 ssh2 Jun 28 09:00:58 hosting sshd[20510]: Invalid user ix from 185.109.54.156 port 43954 ... |
2019-06-28 15:58:36 |
| 184.82.11.162 | attackbotsspam | Jun 27 08:46:44 HOST sshd[3248]: Address 184.82.11.162 maps to 184-82-11-0.24.public.erhq-mser.myaisfibre.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jun 27 08:46:46 HOST sshd[3248]: Failed password for invalid user solr from 184.82.11.162 port 40926 ssh2 Jun 27 08:46:46 HOST sshd[3248]: Received disconnect from 184.82.11.162: 11: Bye Bye [preauth] Jun 27 09:03:22 HOST sshd[3521]: Address 184.82.11.162 maps to 184-82-11-0.24.public.erhq-mser.myaisfibre.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jun 27 09:03:23 HOST sshd[3521]: Failed password for invalid user peche from 184.82.11.162 port 59078 ssh2 Jun 27 09:03:24 HOST sshd[3521]: Received disconnect from 184.82.11.162: 11: Bye Bye [preauth] Jun 27 09:05:49 HOST sshd[3583]: Address 184.82.11.162 maps to 184-82-11-0.24.public.erhq-mser.myaisfibre.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jun 27 09:05:51 HOST sshd[3583]: Fa........ ------------------------------- |
2019-06-28 16:05:56 |
| 187.111.54.199 | attackbots | SMTP-sasl brute force ... |
2019-06-28 16:25:39 |
| 122.52.48.92 | attackbotsspam | Jun 28 07:24:41 debian sshd\[6994\]: Invalid user admin from 122.52.48.92 port 44683 Jun 28 07:24:41 debian sshd\[6994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.52.48.92 ... |
2019-06-28 16:15:29 |
| 66.70.189.209 | attackspambots | 2019-06-28T07:55:34.952258test01.cajus.name sshd\[9482\]: Invalid user telly from 66.70.189.209 port 44315 2019-06-28T07:55:34.967728test01.cajus.name sshd\[9482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.ip-66-70-189.net 2019-06-28T07:55:37.160666test01.cajus.name sshd\[9482\]: Failed password for invalid user telly from 66.70.189.209 port 44315 ssh2 |
2019-06-28 15:57:30 |
| 189.127.34.29 | attackspam | Brute force attempt |
2019-06-28 16:33:29 |
| 93.241.227.124 | attackbots | Jun 26 22:17:15 penfold sshd[5935]: Invalid user mrx from 93.241.227.124 port 59531 Jun 26 22:17:15 penfold sshd[5935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.241.227.124 Jun 26 22:17:16 penfold sshd[5935]: Failed password for invalid user mrx from 93.241.227.124 port 59531 ssh2 Jun 26 22:17:17 penfold sshd[5935]: Received disconnect from 93.241.227.124 port 59531:11: Bye Bye [preauth] Jun 26 22:17:17 penfold sshd[5935]: Disconnected from 93.241.227.124 port 59531 [preauth] Jun 26 22:21:53 penfold sshd[6069]: Connection closed by 93.241.227.124 port 43907 [preauth] Jun 26 22:25:12 penfold sshd[6167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.241.227.124 user=man Jun 26 22:25:14 penfold sshd[6167]: Failed password for man from 93.241.227.124 port 52229 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=93.241.227.124 |
2019-06-28 15:53:50 |
| 123.21.209.225 | attackbotsspam | Jun 28 07:03:51 toyboy postfix/postscreen[24609]: CONNECT from [123.21.209.225]:50126 to [85.159.237.126]:25 Jun 28 07:03:51 toyboy postfix/dnsblog[24610]: addr 123.21.209.225 listed by domain zen.spamhaus.org as 127.0.0.3 Jun 28 07:03:51 toyboy postfix/dnsblog[24610]: addr 123.21.209.225 listed by domain zen.spamhaus.org as 127.0.0.11 Jun 28 07:03:51 toyboy postfix/dnsblog[24610]: addr 123.21.209.225 listed by domain zen.spamhaus.org as 127.0.0.4 Jun 28 07:03:57 toyboy postfix/postscreen[24609]: DNSBL rank 1 for [123.21.209.225]:50126 Jun 28 07:03:58 toyboy postfix/smtpd[24611]: connect from unknown[123.21.209.225] Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun 28 07:04:00 toyboy postfix/smtpd[24611]: 10EBm304048A: client=unknown[123.21.209.225] Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x Jun x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=123.21.209.225 |
2019-06-28 16:14:08 |
| 111.250.140.205 | attackspam | 37215/tcp 37215/tcp 37215/tcp... [2019-06-26/27]4pkt,1pt.(tcp) |
2019-06-28 16:01:46 |
| 1.163.40.37 | attackspam | 37215/tcp 37215/tcp 37215/tcp [2019-06-26]3pkt |
2019-06-28 15:58:07 |
| 74.82.47.51 | attack | 7547/tcp 11211/tcp 389/tcp... [2019-04-28/06-27]43pkt,13pt.(tcp),2pt.(udp) |
2019-06-28 16:14:35 |
| 221.214.152.34 | attackbots | 5500/tcp 5500/tcp 5500/tcp... [2019-06-22/27]4pkt,1pt.(tcp) |
2019-06-28 16:16:53 |