城市(city): unknown
省份(region): unknown
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.213.254.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.213.254.67. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:33:28 CST 2022
;; MSG SIZE rcvd: 107
Host 67.254.213.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 67.254.213.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 149.202.164.82 | attackspambots | Sep 11 11:51:56 markkoudstaal sshd[1834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 Sep 11 11:51:57 markkoudstaal sshd[1834]: Failed password for invalid user CumulusLinux! from 149.202.164.82 port 57494 ssh2 Sep 11 11:58:02 markkoudstaal sshd[2380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 |
2019-09-11 23:38:52 |
| 182.119.154.104 | attackspambots | Sep 10 12:32:20 vz239 sshd[14589]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [182.119.154.104] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 10 12:32:20 vz239 sshd[14589]: Invalid user user from 182.119.154.104 Sep 10 12:32:20 vz239 sshd[14589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.119.154.104 Sep 10 12:32:22 vz239 sshd[14589]: Failed password for invalid user user from 182.119.154.104 port 57018 ssh2 Sep 10 12:32:25 vz239 sshd[14589]: Failed password for invalid user user from 182.119.154.104 port 57018 ssh2 Sep 10 12:32:29 vz239 sshd[14589]: Failed password for invalid user user from 182.119.154.104 port 57018 ssh2 Sep 10 12:32:31 vz239 sshd[14589]: Failed password for invalid user user from 182.119.154.104 port 57018 ssh2 Sep 10 12:32:33 vz239 sshd[14589]: Failed password for invalid user user from 182.119.154.104 port 57018 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=182.119.154. |
2019-09-11 23:11:43 |
| 185.244.25.180 | attackspambots | 11.09.2019 11:15:30 Connection to port 10001 blocked by firewall |
2019-09-12 00:59:05 |
| 82.55.89.79 | attack | Honeypot attack, port: 23, PTR: host79-89-dynamic.55-82-r.retail.telecomitalia.it. |
2019-09-12 00:30:34 |
| 185.254.122.216 | attackbots | Sep 11 04:19:53 lenivpn01 kernel: \[401196.915488\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.216 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=33359 PROTO=TCP SPT=58016 DPT=33902 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 08:45:02 lenivpn01 kernel: \[417105.331501\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.216 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=4621 PROTO=TCP SPT=58016 DPT=33903 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 11:17:58 lenivpn01 kernel: \[426281.104206\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.216 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=28259 PROTO=TCP SPT=58016 DPT=33900 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 11:23:11 lenivpn01 kernel: \[426594.445017\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.216 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 T ... |
2019-09-12 00:04:34 |
| 121.35.98.34 | attackspam | firewall-block, port(s): 23/tcp |
2019-09-11 23:41:42 |
| 78.128.113.77 | attackspam | 2019-09-11 dovecot_login authenticator failed for \(\[78.128.113.77\]\) \[78.128.113.77\]: 535 Incorrect authentication data \(set_id=uucp@**REMOVED**.org\) 2019-09-11 dovecot_login authenticator failed for \(\[78.128.113.77\]\) \[78.128.113.77\]: 535 Incorrect authentication data \(set_id=games@**REMOVED**.de\) 2019-09-11 dovecot_login authenticator failed for \(\[78.128.113.77\]\) \[78.128.113.77\]: 535 Incorrect authentication data |
2019-09-11 23:13:49 |
| 185.244.25.133 | attackbotsspam | Port scan attempt detected by AWS-CCS, CTS, India |
2019-09-12 00:07:27 |
| 46.105.99.163 | attack | xmlrpc attack |
2019-09-11 23:45:07 |
| 92.119.160.103 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2019-09-12 00:26:33 |
| 157.230.146.19 | attackspam | Sep 11 22:14:56 webhost01 sshd[20304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.146.19 Sep 11 22:14:59 webhost01 sshd[20304]: Failed password for invalid user debian from 157.230.146.19 port 51774 ssh2 ... |
2019-09-11 23:31:42 |
| 89.248.168.202 | attackbots | 09/11/2019-11:09:51.823318 89.248.168.202 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 100 |
2019-09-12 00:28:36 |
| 88.255.199.45 | attackbots | Automatic report - Port Scan Attack |
2019-09-11 23:47:20 |
| 178.132.201.205 | attackbots | Port scan |
2019-09-12 00:13:16 |
| 165.22.209.164 | spam | Looks like spam |
2019-09-12 00:18:32 |