城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.44.212.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.44.212.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 08:40:46 CST 2025
;; MSG SIZE rcvd: 107
Host 150.212.44.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 150.212.44.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.83.52.145 | attackbotsspam | Jun 22 01:51:26 gw1 sshd[5651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.52.145 Jun 22 01:51:27 gw1 sshd[5651]: Failed password for invalid user ftpserver from 51.83.52.145 port 35144 ssh2 ... |
2020-06-22 05:02:37 |
| 117.50.100.13 | attackspam | Jun 22 00:27:14 lukav-desktop sshd\[26651\]: Invalid user sie from 117.50.100.13 Jun 22 00:27:15 lukav-desktop sshd\[26651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.100.13 Jun 22 00:27:17 lukav-desktop sshd\[26651\]: Failed password for invalid user sie from 117.50.100.13 port 37436 ssh2 Jun 22 00:30:20 lukav-desktop sshd\[26684\]: Invalid user ubuntu from 117.50.100.13 Jun 22 00:30:20 lukav-desktop sshd\[26684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.100.13 |
2020-06-22 05:34:08 |
| 216.244.66.240 | attack | [Sun Jun 21 21:25:39.129792 2020] [authz_core:error] [pid 587] [client 216.244.66.240:60957] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/jack [Sun Jun 21 21:26:00.264461 2020] [authz_core:error] [pid 547] [client 216.244.66.240:50328] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/jack [Sun Jun 21 21:27:07.972905 2020] [authz_core:error] [pid 335] [client 216.244.66.240:49668] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/archive/old/qjackctl-0.3.11.tar.gz ... |
2020-06-22 05:06:54 |
| 77.49.146.157 | attack | Jun 21 22:26:35 debian-2gb-nbg1-2 kernel: \[15029873.918978\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.49.146.157 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=55 ID=6608 PROTO=TCP SPT=51058 DPT=37215 WINDOW=53115 RES=0x00 SYN URGP=0 |
2020-06-22 05:32:39 |
| 66.249.66.7 | attack | Automatic report - Banned IP Access |
2020-06-22 05:08:04 |
| 101.36.151.78 | attackspam | 2020-06-21T20:24:39.775395abusebot-4.cloudsearch.cf sshd[31341]: Invalid user md from 101.36.151.78 port 51560 2020-06-21T20:24:39.782818abusebot-4.cloudsearch.cf sshd[31341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.151.78 2020-06-21T20:24:39.775395abusebot-4.cloudsearch.cf sshd[31341]: Invalid user md from 101.36.151.78 port 51560 2020-06-21T20:24:41.160050abusebot-4.cloudsearch.cf sshd[31341]: Failed password for invalid user md from 101.36.151.78 port 51560 ssh2 2020-06-21T20:26:47.112026abusebot-4.cloudsearch.cf sshd[31540]: Invalid user ubuntu from 101.36.151.78 port 52436 2020-06-21T20:26:47.122679abusebot-4.cloudsearch.cf sshd[31540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.151.78 2020-06-21T20:26:47.112026abusebot-4.cloudsearch.cf sshd[31540]: Invalid user ubuntu from 101.36.151.78 port 52436 2020-06-21T20:26:49.071958abusebot-4.cloudsearch.cf sshd[31540]: Failed passwo ... |
2020-06-22 05:22:45 |
| 51.75.249.224 | attackspam | Jun 21 22:34:00 Invalid user me from 51.75.249.224 port 33082 |
2020-06-22 05:10:33 |
| 202.138.234.18 | attackbotsspam | Unauthorized connection attempt detected from IP address 202.138.234.18 to port 445 |
2020-06-22 05:36:25 |
| 64.64.104.10 | attackbots | python-requests/2.23.0 |
2020-06-22 05:17:26 |
| 112.85.42.174 | attackspam | 2020-06-21T21:30:35.495922shield sshd\[27427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root 2020-06-21T21:30:37.967876shield sshd\[27427\]: Failed password for root from 112.85.42.174 port 55218 ssh2 2020-06-21T21:30:40.930451shield sshd\[27427\]: Failed password for root from 112.85.42.174 port 55218 ssh2 2020-06-21T21:30:44.641074shield sshd\[27427\]: Failed password for root from 112.85.42.174 port 55218 ssh2 2020-06-21T21:30:47.428839shield sshd\[27427\]: Failed password for root from 112.85.42.174 port 55218 ssh2 |
2020-06-22 05:34:28 |
| 51.77.58.112 | attackspam | Jun 21 23:12:14 lnxweb62 sshd[22498]: Failed password for root from 51.77.58.112 port 14352 ssh2 Jun 21 23:12:14 lnxweb62 sshd[22498]: Failed password for root from 51.77.58.112 port 14352 ssh2 |
2020-06-22 05:23:14 |
| 119.96.94.136 | attack | 20 attempts against mh-ssh on milky |
2020-06-22 05:08:52 |
| 47.99.131.175 | attackbots | "Multiple/Conflicting Connection Header Data Found - close, close" |
2020-06-22 05:02:57 |
| 217.182.252.30 | attackbots | Invalid user guest10 from 217.182.252.30 port 51880 |
2020-06-22 05:02:23 |
| 212.102.33.139 | attackspambots | (From blanchette.raymundo@gmail.com) You Can DOUBLE Your Productivity For Life In Under 48 Hours And when it comes to changing your life, there's nothing more important to fixing your productivity. Think about it. If you're twice as productive, then, as far as your environment supports it, you're going to make at least twice as much. However, the growth is almost always exponential. So expect even more income, free time, and the ability to decide what you want to do at any given moment. Here's the best course I've seen on this subject: https://bit.ly/michaeltips-com It's a fun and pretty short read... and it has the potential to change your life in 48 hours from now. Michael Hehn |
2020-06-22 05:11:51 |