城市(city): unknown
省份(region): unknown
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.204.242.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.204.242.18. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:02:23 CST 2025
;; MSG SIZE rcvd: 107
Host 18.242.204.137.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 18.242.204.137.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.207.8.103 | attackbotsspam | Automatic report - Port Scan Attack |
2019-12-19 03:15:05 |
| 206.189.91.97 | attackbots | Dec 18 17:06:21 sd-53420 sshd\[21514\]: Invalid user abdullah from 206.189.91.97 Dec 18 17:06:21 sd-53420 sshd\[21514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.91.97 Dec 18 17:06:23 sd-53420 sshd\[21514\]: Failed password for invalid user abdullah from 206.189.91.97 port 49532 ssh2 Dec 18 17:12:58 sd-53420 sshd\[23996\]: Invalid user yo from 206.189.91.97 Dec 18 17:12:58 sd-53420 sshd\[23996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.91.97 ... |
2019-12-19 03:38:08 |
| 90.84.185.24 | attack | Dec 18 05:01:28 eddieflores sshd\[25437\]: Invalid user jayne from 90.84.185.24 Dec 18 05:01:28 eddieflores sshd\[25437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ecs-90-84-185-24.compute.prod-cloud-ocb.orange-business.com Dec 18 05:01:30 eddieflores sshd\[25437\]: Failed password for invalid user jayne from 90.84.185.24 port 52904 ssh2 Dec 18 05:07:04 eddieflores sshd\[25938\]: Invalid user lisa from 90.84.185.24 Dec 18 05:07:04 eddieflores sshd\[25938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ecs-90-84-185-24.compute.prod-cloud-ocb.orange-business.com |
2019-12-19 03:18:21 |
| 123.142.108.122 | attackbots | $f2bV_matches |
2019-12-19 03:17:09 |
| 159.89.235.61 | attack | Dec 18 21:24:47 sauna sshd[41137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.235.61 Dec 18 21:24:49 sauna sshd[41137]: Failed password for invalid user server from 159.89.235.61 port 49314 ssh2 ... |
2019-12-19 03:39:37 |
| 51.38.234.224 | attack | $f2bV_matches |
2019-12-19 03:21:57 |
| 40.92.72.106 | attack | Dec 18 17:33:24 debian-2gb-vpn-nbg1-1 kernel: [1057968.886217] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.72.106 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=112 ID=24052 DF PROTO=TCP SPT=28201 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0 |
2019-12-19 03:20:16 |
| 91.232.96.3 | attackspam | Dec 18 16:40:09 grey postfix/smtpd\[22041\]: NOQUEUE: reject: RCPT from unknown\[91.232.96.3\]: 554 5.7.1 Service unavailable\; Client host \[91.232.96.3\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[91.232.96.3\]\; from=\ |
2019-12-19 03:27:24 |
| 91.204.188.50 | attackspambots | Dec 18 18:34:39 cvbnet sshd[4743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.188.50 Dec 18 18:34:41 cvbnet sshd[4743]: Failed password for invalid user rapport from 91.204.188.50 port 56004 ssh2 ... |
2019-12-19 03:24:41 |
| 46.32.70.248 | attackspam | Dec 18 16:40:32 Ubuntu-1404-trusty-64-minimal sshd\[28285\]: Invalid user rpm from 46.32.70.248 Dec 18 16:40:32 Ubuntu-1404-trusty-64-minimal sshd\[28285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.32.70.248 Dec 18 16:40:34 Ubuntu-1404-trusty-64-minimal sshd\[28285\]: Failed password for invalid user rpm from 46.32.70.248 port 56842 ssh2 Dec 18 16:47:20 Ubuntu-1404-trusty-64-minimal sshd\[604\]: Invalid user vusa from 46.32.70.248 Dec 18 16:47:20 Ubuntu-1404-trusty-64-minimal sshd\[604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.32.70.248 |
2019-12-19 03:47:15 |
| 94.181.94.12 | attackspam | Dec 18 18:56:23 *** sshd[31203]: Invalid user server from 94.181.94.12 |
2019-12-19 03:11:23 |
| 172.105.208.236 | attack | Unauthorized connection attempt detected from IP address 172.105.208.236 to port 4567 |
2019-12-19 03:14:09 |
| 14.191.21.90 | attack | Telnet/23 MH Probe, BF, Hack - |
2019-12-19 03:35:02 |
| 162.243.14.185 | attackspam | Dec 18 19:29:53 srv206 sshd[7381]: Invalid user ident from 162.243.14.185 ... |
2019-12-19 03:43:43 |
| 80.82.64.73 | attackbotsspam | Unauthorised access (Dec 18) SRC=80.82.64.73 LEN=40 PREC=0x20 TTL=249 ID=32882 TCP DPT=445 WINDOW=1024 SYN Unauthorised access (Dec 18) SRC=80.82.64.73 LEN=40 PREC=0x20 TTL=249 ID=11062 TCP DPT=139 WINDOW=1024 SYN Unauthorised access (Dec 18) SRC=80.82.64.73 LEN=40 PREC=0x20 TTL=249 ID=44054 TCP DPT=21 WINDOW=1024 SYN Unauthorised access (Dec 18) SRC=80.82.64.73 LEN=40 PREC=0x20 TTL=249 ID=11022 TCP DPT=138 WINDOW=1024 SYN |
2019-12-19 03:40:57 |