城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.129.160.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48649
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;135.129.160.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400
;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 19:31:59 CST 2025
;; MSG SIZE rcvd: 108
Host 104.160.129.135.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 104.160.129.135.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.201.195.166 | attack | Suspicious WordPress-related activity, accessed by IP not domain: 54.201.195.166 - - [07/Sep/2020:14:03:54 +0100] "GET /wp-json/ HTTP/1.1" 403 244 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36" |
2020-09-08 18:55:15 |
| 78.128.113.120 | attackbots | Sep 8 12:27:04 relay postfix/smtpd\[18713\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 8 12:27:22 relay postfix/smtpd\[19188\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 8 12:27:38 relay postfix/smtpd\[15893\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 8 12:27:50 relay postfix/smtpd\[10297\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 8 12:31:58 relay postfix/smtpd\[18716\]: warning: unknown\[78.128.113.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-08 18:44:44 |
| 69.28.234.137 | attackbotsspam | 2020-09-07T19:48:25.373302sorsha.thespaminator.com sshd[6584]: Invalid user karstensen from 69.28.234.137 port 35480 2020-09-07T19:48:27.623519sorsha.thespaminator.com sshd[6584]: Failed password for invalid user karstensen from 69.28.234.137 port 35480 ssh2 ... |
2020-09-08 18:39:11 |
| 94.102.56.216 | attackspambots | UDP ports : 9136 / 9216 / 9221 / 9251 / 9500 / 9527 / 9728 / 9993 / 10009 / 10285 / 10633 / 11211 / 16464 / 16889 / 16991 / 18011 / 21234 / 24265 / 24292 / 27016 / 28007 / 28008 / 28025 / 28070 / 34096 / 36748 / 37087 / 37917 / 40515 / 40663 / 40673 / 40692 / 40738 / 40741 / 40748 / 40751 / 40752 / 40779 / 40783 / 40801 / 40803 / 40807 / 40816 / 40817 / 40826 / 40830 / 40832 / 40833 / 40836 / 40849 / 40860 / 40867 / 40870 / 40873 / 40874 / 40890 / 40906 / 40914 / 40927 / 40931 / 40947 / 40954 / 41007 / 41046 / 41047 / 41057 / 41083 / 41086 / 41087 / 41111 / 41114 / 41117 / 41119 / 41123 / 41141 / 41143 / 41151 / 41156 / 41157 / 41180 / 41181 / 41190 / 41197 / 41217 |
2020-09-08 18:38:50 |
| 14.228.179.102 | attack | Fail2Ban Ban Triggered |
2020-09-08 19:10:56 |
| 37.152.181.57 | attackbots | Sep 8 12:33:53 abendstille sshd\[15966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.181.57 user=root Sep 8 12:33:55 abendstille sshd\[15966\]: Failed password for root from 37.152.181.57 port 36068 ssh2 Sep 8 12:36:40 abendstille sshd\[18943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.181.57 user=root Sep 8 12:36:43 abendstille sshd\[18943\]: Failed password for root from 37.152.181.57 port 45078 ssh2 Sep 8 12:39:31 abendstille sshd\[21920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.181.57 user=root ... |
2020-09-08 18:43:05 |
| 115.58.194.245 | attackspambots | Sep 7 12:01:19 carla sshd[26874]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [115.58.194.245] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 7 12:01:19 carla sshd[26874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.58.194.245 user=r.r Sep 7 12:01:21 carla sshd[26874]: Failed password for r.r from 115.58.194.245 port 49596 ssh2 Sep 7 12:01:21 carla sshd[26875]: Received disconnect from 115.58.194.245: 11: Bye Bye Sep 7 12:06:31 carla sshd[26899]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [115.58.194.245] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 7 12:06:31 carla sshd[26899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.58.194.245 user=r.r Sep 7 12:06:34 carla sshd[26899]: Failed password for r.r from 115.58.194.245 port 54742 ssh2 Sep 7 12:06:34 carla sshd[26900]: Received disconnect from 115.58.194.245: 11: Bye Bye Sep 7 12:09:44 carla sshd[2........ ------------------------------- |
2020-09-08 19:10:33 |
| 196.216.228.34 | attack | Sep 7 21:24:08 ny01 sshd[20967]: Failed password for root from 196.216.228.34 port 47192 ssh2 Sep 7 21:26:38 ny01 sshd[21638]: Failed password for root from 196.216.228.34 port 55008 ssh2 |
2020-09-08 18:42:29 |
| 140.143.9.145 | attack | Sep 8 10:04:12 root sshd[21304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.9.145 ... |
2020-09-08 19:03:56 |
| 86.247.118.135 | attackbotsspam | Sep 8 12:58:57 [host] sshd[597]: pam_unix(sshd:au Sep 8 12:58:59 [host] sshd[597]: Failed password Sep 8 13:03:14 [host] sshd[871]: pam_unix(sshd:au |
2020-09-08 19:04:48 |
| 106.12.205.137 | attack | Sep 8 11:46:40 fhem-rasp sshd[27719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.205.137 Sep 8 11:46:41 fhem-rasp sshd[27719]: Failed password for invalid user admin from 106.12.205.137 port 53122 ssh2 ... |
2020-09-08 19:09:10 |
| 49.88.112.118 | attackspambots | SSH Brute-Force detected |
2020-09-08 18:35:36 |
| 217.182.205.27 | attack | Sep 8 12:41:49 srv-ubuntu-dev3 sshd[130127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.205.27 user=root Sep 8 12:41:50 srv-ubuntu-dev3 sshd[130127]: Failed password for root from 217.182.205.27 port 53580 ssh2 Sep 8 12:45:04 srv-ubuntu-dev3 sshd[130450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.205.27 user=root Sep 8 12:45:06 srv-ubuntu-dev3 sshd[130450]: Failed password for root from 217.182.205.27 port 58324 ssh2 Sep 8 12:48:26 srv-ubuntu-dev3 sshd[130864]: Invalid user tester from 217.182.205.27 Sep 8 12:48:26 srv-ubuntu-dev3 sshd[130864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.205.27 Sep 8 12:48:26 srv-ubuntu-dev3 sshd[130864]: Invalid user tester from 217.182.205.27 Sep 8 12:48:28 srv-ubuntu-dev3 sshd[130864]: Failed password for invalid user tester from 217.182.205.27 port 34860 ssh2 Sep 8 12:51:43 srv-ubu ... |
2020-09-08 19:05:14 |
| 207.244.70.35 | attackbots | Sep 8 06:34:54 NPSTNNYC01T sshd[5471]: Failed password for root from 207.244.70.35 port 42269 ssh2 Sep 8 06:34:56 NPSTNNYC01T sshd[5471]: Failed password for root from 207.244.70.35 port 42269 ssh2 Sep 8 06:34:59 NPSTNNYC01T sshd[5471]: Failed password for root from 207.244.70.35 port 42269 ssh2 Sep 8 06:35:01 NPSTNNYC01T sshd[5471]: Failed password for root from 207.244.70.35 port 42269 ssh2 ... |
2020-09-08 19:10:02 |
| 37.21.159.235 | attackspam | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2020-09-08 18:37:11 |