城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.213.161.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63485
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.213.161.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 19:06:53 CST 2025
;; MSG SIZE rcvd: 108
Host 142.161.213.136.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.161.213.136.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 213.146.203.200 | attack | Sep 10 12:46:06 php1 sshd\[19119\]: Invalid user admin from 213.146.203.200 Sep 10 12:46:06 php1 sshd\[19119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.146.203.200 Sep 10 12:46:08 php1 sshd\[19119\]: Failed password for invalid user admin from 213.146.203.200 port 50873 ssh2 Sep 10 12:52:38 php1 sshd\[19677\]: Invalid user sysop from 213.146.203.200 Sep 10 12:52:38 php1 sshd\[19677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.146.203.200 |
2019-09-11 07:11:06 |
| 176.65.2.5 | attackspam | This IP address was blacklisted for the following reason: /de/jobs/industriemechaniker-m-w/&%22%20or%20(1,2)=(select*from(select%20name_const(CHAR(111,78,69,75,117,76,116,86,103,101,104,75),1),name_const(CHAR(111,78,69,75,117,76,116,86,103,101,104,75),1))a)%20--%20%22x%22=%22x @ 2018-10-15T00:52:34+02:00. |
2019-09-11 07:02:48 |
| 37.145.31.68 | attackspam | Sep 11 00:15:11 ubuntu-2gb-nbg1-dc3-1 sshd[11663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.145.31.68 Sep 11 00:15:14 ubuntu-2gb-nbg1-dc3-1 sshd[11663]: Failed password for invalid user git from 37.145.31.68 port 57974 ssh2 ... |
2019-09-11 06:50:23 |
| 1.179.182.82 | attackspam | Sep 10 12:08:26 lcdev sshd\[22603\]: Invalid user ftpuser from 1.179.182.82 Sep 10 12:08:26 lcdev sshd\[22603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.182.82 Sep 10 12:08:28 lcdev sshd\[22603\]: Failed password for invalid user ftpuser from 1.179.182.82 port 53416 ssh2 Sep 10 12:15:22 lcdev sshd\[23489\]: Invalid user frappe from 1.179.182.82 Sep 10 12:15:22 lcdev sshd\[23489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.182.82 |
2019-09-11 06:34:12 |
| 116.107.205.149 | attackspambots | Sep 10 15:37:51 our-server-hostname postfix/smtpd[19624]: connect from unknown[116.107.205.149] Sep 10 15:37:52 our-server-hostname postfix/smtpd[19624]: NOQUEUE: reject: RCPT from unknown[116.107.205.149]: 504 5.5.2 |
2019-09-11 07:16:40 |
| 73.59.165.164 | attackbots | Sep 10 12:28:05 php2 sshd\[18704\]: Invalid user csadmin from 73.59.165.164 Sep 10 12:28:05 php2 sshd\[18704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-59-165-164.hsd1.tn.comcast.net Sep 10 12:28:07 php2 sshd\[18704\]: Failed password for invalid user csadmin from 73.59.165.164 port 35782 ssh2 Sep 10 12:34:30 php2 sshd\[19332\]: Invalid user admin from 73.59.165.164 Sep 10 12:34:30 php2 sshd\[19332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-59-165-164.hsd1.tn.comcast.net |
2019-09-11 06:42:24 |
| 218.1.18.78 | attack | Sep 10 12:45:05 web9 sshd\[27662\]: Invalid user template from 218.1.18.78 Sep 10 12:45:05 web9 sshd\[27662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78 Sep 10 12:45:07 web9 sshd\[27662\]: Failed password for invalid user template from 218.1.18.78 port 14592 ssh2 Sep 10 12:51:17 web9 sshd\[28881\]: Invalid user wp-user from 218.1.18.78 Sep 10 12:51:17 web9 sshd\[28881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.1.18.78 |
2019-09-11 06:52:38 |
| 106.12.39.227 | attackspambots | Sep 10 12:28:38 hpm sshd\[12291\]: Invalid user 123456 from 106.12.39.227 Sep 10 12:28:38 hpm sshd\[12291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.39.227 Sep 10 12:28:40 hpm sshd\[12291\]: Failed password for invalid user 123456 from 106.12.39.227 port 41762 ssh2 Sep 10 12:33:09 hpm sshd\[12731\]: Invalid user znc-admin from 106.12.39.227 Sep 10 12:33:09 hpm sshd\[12731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.39.227 |
2019-09-11 06:38:20 |
| 107.174.127.134 | attack | " " |
2019-09-11 06:38:02 |
| 173.212.243.4 | attack | Sep 9 19:07:57 cumulus sshd[4508]: Invalid user ts from 173.212.243.4 port 58046 Sep 9 19:07:57 cumulus sshd[4508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.243.4 Sep 9 19:07:59 cumulus sshd[4508]: Failed password for invalid user ts from 173.212.243.4 port 58046 ssh2 Sep 9 19:07:59 cumulus sshd[4508]: Received disconnect from 173.212.243.4 port 58046:11: Bye Bye [preauth] Sep 9 19:07:59 cumulus sshd[4508]: Disconnected from 173.212.243.4 port 58046 [preauth] Sep 9 19:15:38 cumulus sshd[5113]: Invalid user odoo from 173.212.243.4 port 36150 Sep 9 19:15:38 cumulus sshd[5113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.243.4 Sep 9 19:15:39 cumulus sshd[5113]: Failed password for invalid user odoo from 173.212.243.4 port 36150 ssh2 Sep 9 19:15:40 cumulus sshd[5113]: Received disconnect from 173.212.243.4 port 36150:11: Bye Bye [preauth] Sep 9 19:15:40 cumul........ ------------------------------- |
2019-09-11 06:41:11 |
| 51.91.249.144 | attackspam | 19/9/10@18:14:35: FAIL: IoT-Telnet address from=51.91.249.144 19/9/10@18:14:35: FAIL: IoT-Telnet address from=51.91.249.144 ... |
2019-09-11 07:22:36 |
| 106.13.60.58 | attack | Sep 10 19:09:19 plusreed sshd[16520]: Invalid user user from 106.13.60.58 ... |
2019-09-11 07:19:43 |
| 41.128.245.103 | attackbots | 2019-09-11T05:15:20.492943enmeeting.mahidol.ac.th sshd\[14521\]: Invalid user admin from 41.128.245.103 port 50242 2019-09-11T05:15:20.511054enmeeting.mahidol.ac.th sshd\[14521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.128.245.103 2019-09-11T05:15:22.587215enmeeting.mahidol.ac.th sshd\[14521\]: Failed password for invalid user admin from 41.128.245.103 port 50242 ssh2 ... |
2019-09-11 06:37:02 |
| 179.8.93.17 | attack | Looking for resource vulnerabilities |
2019-09-11 06:44:16 |
| 1.52.166.239 | attackspambots | Sep 11 00:36:19 legacy sshd[24796]: Failed password for root from 1.52.166.239 port 30348 ssh2 Sep 11 00:37:01 legacy sshd[24836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.52.166.239 Sep 11 00:37:03 legacy sshd[24836]: Failed password for invalid user user from 1.52.166.239 port 14666 ssh2 ... |
2019-09-11 06:43:17 |