城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.78.27.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.78.27.253. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 05:41:06 CST 2025
;; MSG SIZE rcvd: 106
b'Host 253.27.78.134.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 134.78.27.253.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 78.82.168.146 | attackspam | Port scan denied |
2020-07-13 23:17:35 |
| 140.143.12.119 | attack | Port scan denied |
2020-07-13 23:39:11 |
| 139.162.121.251 | attack | Port scan denied |
2020-07-13 23:10:45 |
| 91.121.211.34 | attackspambots | Jul 13 16:21:36 db sshd[12800]: Invalid user collaudo from 91.121.211.34 port 34528 ... |
2020-07-13 23:14:28 |
| 68.183.150.201 | attackspam | Port scanning [2 denied] |
2020-07-13 23:26:20 |
| 162.243.129.58 | attackspambots | scans once in preceeding hours on the ports (in chronological order) 1521 resulting in total of 19 scans from 162.243.0.0/16 block. |
2020-07-13 23:16:44 |
| 218.92.0.253 | attackbotsspam | Jul 13 15:08:30 localhost sshd[78020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.253 user=root Jul 13 15:08:33 localhost sshd[78020]: Failed password for root from 218.92.0.253 port 55641 ssh2 Jul 13 15:08:36 localhost sshd[78020]: Failed password for root from 218.92.0.253 port 55641 ssh2 Jul 13 15:08:30 localhost sshd[78020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.253 user=root Jul 13 15:08:33 localhost sshd[78020]: Failed password for root from 218.92.0.253 port 55641 ssh2 Jul 13 15:08:36 localhost sshd[78020]: Failed password for root from 218.92.0.253 port 55641 ssh2 Jul 13 15:08:30 localhost sshd[78020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.253 user=root Jul 13 15:08:33 localhost sshd[78020]: Failed password for root from 218.92.0.253 port 55641 ssh2 Jul 13 15:08:36 localhost sshd[78020]: Failed password fo ... |
2020-07-13 23:09:15 |
| 196.52.43.100 | attackbots | Port scan denied |
2020-07-13 23:07:08 |
| 192.241.237.238 | attackspambots | scans once in preceeding hours on the ports (in chronological order) 8022 resulting in total of 59 scans from 192.241.128.0/17 block. |
2020-07-13 23:09:38 |
| 92.118.160.61 | attackbots | Port scanning [3 denied] |
2020-07-13 23:23:50 |
| 185.200.118.68 | attack | Port scan denied |
2020-07-13 23:07:51 |
| 46.38.148.2 | attackbots | 2020-07-13T17:10:17.468170www postfix/smtpd[21443]: warning: unknown[46.38.148.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-07-13T17:10:59.462029www postfix/smtpd[21733]: warning: unknown[46.38.148.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-07-13T17:11:39.032434www postfix/smtpd[21733]: warning: unknown[46.38.148.2]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-13 23:12:39 |
| 150.109.170.84 | attackbots | Port scan denied |
2020-07-13 23:31:23 |
| 114.7.164.170 | attack | Jul 13 18:12:34 hosting sshd[25486]: Invalid user ucp from 114.7.164.170 port 39346 ... |
2020-07-13 23:13:46 |
| 46.188.90.27 | attack | (sshd) Failed SSH login from 46.188.90.27 (RU/Russia/broadband-46-188-90-27.2com.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 13 15:16:33 s1 sshd[2296]: Invalid user conta from 46.188.90.27 port 47948 Jul 13 15:16:35 s1 sshd[2296]: Failed password for invalid user conta from 46.188.90.27 port 47948 ssh2 Jul 13 15:23:05 s1 sshd[2582]: Invalid user oradev from 46.188.90.27 port 33958 Jul 13 15:23:07 s1 sshd[2582]: Failed password for invalid user oradev from 46.188.90.27 port 33958 ssh2 Jul 13 15:24:49 s1 sshd[2660]: Invalid user zimbra from 46.188.90.27 port 32834 |
2020-07-13 23:36:04 |