城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.119.46.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.119.46.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 20:49:41 CST 2025
;; MSG SIZE rcvd: 107
213.46.119.137.in-addr.arpa domain name pointer 137-119-46-213.neonova.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
213.46.119.137.in-addr.arpa name = 137-119-46-213.neonova.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 5.196.225.45 | attack | Oct 18 23:15:42 vps01 sshd[13495]: Failed password for root from 5.196.225.45 port 55066 ssh2 |
2019-10-19 05:32:41 |
| 150.95.52.111 | attack | www.fahrschule-mihm.de 150.95.52.111 \[18/Oct/2019:22:23:17 +0200\] "POST /wp-login.php HTTP/1.1" 200 5756 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" www.fahrschule-mihm.de 150.95.52.111 \[18/Oct/2019:22:23:18 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4105 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-19 05:24:10 |
| 120.150.216.161 | attack | Oct 18 10:55:44 friendsofhawaii sshd\[19519\]: Invalid user end from 120.150.216.161 Oct 18 10:55:44 friendsofhawaii sshd\[19519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=arn1285831.lnk.telstra.net Oct 18 10:55:46 friendsofhawaii sshd\[19519\]: Failed password for invalid user end from 120.150.216.161 port 49184 ssh2 Oct 18 11:01:39 friendsofhawaii sshd\[19991\]: Invalid user pas\$w0rd! from 120.150.216.161 Oct 18 11:01:39 friendsofhawaii sshd\[19991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=arn1285831.lnk.telstra.net |
2019-10-19 05:17:11 |
| 54.39.75.1 | attackspam | Oct 18 22:58:53 SilenceServices sshd[8522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1 Oct 18 22:58:53 SilenceServices sshd[8520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1 Oct 18 22:58:53 SilenceServices sshd[8523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1 Oct 18 22:58:53 SilenceServices sshd[8525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1 Oct 18 22:58:53 SilenceServices sshd[8521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1 Oct 18 22:58:53 SilenceServices sshd[8526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1 |
2019-10-19 05:06:26 |
| 113.160.166.23 | attack | 113.160.166.23 - - [18/Oct/2019:15:51:24 -0400] "GET /?page=products&action=view&manufacturerID=61&productID=/etc/passwd%00&linkID=16812 HTTP/1.1" 302 - "https://exitdevice.com/?page=products&action=view&manufacturerID=61&productID=/etc/passwd%00&linkID=16812" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-10-19 05:40:54 |
| 177.24.15.137 | attackspambots | Oct 18 21:36:42 iago sshd[31021]: Address 177.24.15.137 maps to ip-177-24-15-137.user.vivozap.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Oct 18 21:36:42 iago sshd[31021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.24.15.137 user=r.r Oct 18 21:36:45 iago sshd[31021]: Failed password for r.r from 177.24.15.137 port 63554 ssh2 Oct 18 21:36:45 iago sshd[31022]: Received disconnect from 177.24.15.137: 11: Bye Bye ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=177.24.15.137 |
2019-10-19 05:29:40 |
| 202.47.51.150 | attackspambots | 202.47.51.150 - - [18/Oct/2019:15:52:20 -0400] "GET /?page=products&action=view&manufacturerID=36&productID=../../../../../../etc/passwd%00&linkID=13130 HTTP/1.1" 302 - "https://simplexlock.com/?page=products&action=view&manufacturerID=36&productID=../../../../../../etc/passwd%00&linkID=13130" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-10-19 05:01:12 |
| 47.11.157.6 | attackspambots | 47.11.157.6 - - [18/Oct/2019:15:52:05 -0400] "GET /?page=products&action=view&manufacturerID=61&productID=%2fetc%2fpasswd%00&linkID=16812 HTTP/1.1" 302 - "https://exitdevice.com/?page=products&action=view&manufacturerID=61&productID=%2fetc%2fpasswd%00&linkID=16812" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-10-19 05:11:45 |
| 106.13.87.145 | attack | Oct 18 23:12:13 v22018076622670303 sshd\[18663\]: Invalid user ftpadmin from 106.13.87.145 port 39180 Oct 18 23:12:13 v22018076622670303 sshd\[18663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.87.145 Oct 18 23:12:16 v22018076622670303 sshd\[18663\]: Failed password for invalid user ftpadmin from 106.13.87.145 port 39180 ssh2 ... |
2019-10-19 05:13:32 |
| 193.32.160.153 | attackspambots | Oct 18 23:33:48 relay postfix/smtpd\[5356\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.153\]: 554 5.7.1 \ |
2019-10-19 05:39:14 |
| 91.121.29.29 | attackspam | k+ssh-bruteforce |
2019-10-19 05:37:58 |
| 68.183.236.92 | attackspambots | Oct 18 22:57:02 markkoudstaal sshd[15723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92 Oct 18 22:57:04 markkoudstaal sshd[15723]: Failed password for invalid user distcache from 68.183.236.92 port 35000 ssh2 Oct 18 23:01:41 markkoudstaal sshd[16137]: Failed password for root from 68.183.236.92 port 46770 ssh2 |
2019-10-19 05:07:36 |
| 222.180.168.38 | attack | Oct 18 23:09:22 andromeda postfix/smtpd\[19669\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:24 andromeda postfix/smtpd\[19669\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:28 andromeda postfix/smtpd\[25199\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:48 andromeda postfix/smtpd\[25199\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:54 andromeda postfix/smtpd\[29621\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure |
2019-10-19 05:22:41 |
| 159.203.198.34 | attack | Oct 18 21:29:56 vps sshd[29832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.198.34 Oct 18 21:29:57 vps sshd[29832]: Failed password for invalid user webmo from 159.203.198.34 port 54506 ssh2 Oct 18 21:51:32 vps sshd[30856]: Failed password for root from 159.203.198.34 port 35746 ssh2 ... |
2019-10-19 05:34:17 |
| 72.89.234.162 | attackspam | Oct 18 23:05:37 mout sshd[6507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.89.234.162 user=root Oct 18 23:05:40 mout sshd[6507]: Failed password for root from 72.89.234.162 port 51722 ssh2 |
2019-10-19 05:16:09 |