城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.148.143.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.148.143.194. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 22:41:37 CST 2025
;; MSG SIZE rcvd: 108
Host 194.143.148.138.in-addr.arpa not found: 2(SERVFAIL)
server can't find 138.148.143.194.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 200.233.131.21 | attackbots | Oct 17 07:15:18 ns37 sshd[18916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.233.131.21 |
2019-10-17 14:04:30 |
| 115.238.236.74 | attack | Oct 17 05:42:54 hcbbdb sshd\[10087\]: Invalid user santos from 115.238.236.74 Oct 17 05:42:54 hcbbdb sshd\[10087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74 Oct 17 05:42:56 hcbbdb sshd\[10087\]: Failed password for invalid user santos from 115.238.236.74 port 4459 ssh2 Oct 17 05:47:22 hcbbdb sshd\[10569\]: Invalid user kdm from 115.238.236.74 Oct 17 05:47:22 hcbbdb sshd\[10569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74 |
2019-10-17 13:53:10 |
| 85.15.226.122 | attackbotsspam | ... |
2019-10-17 14:03:45 |
| 92.50.45.74 | attack | Absender hat Spam-Falle ausgel?st |
2019-10-17 14:21:54 |
| 104.238.137.254 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/104.238.137.254/ US - 1H : (282) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : US NAME ASN : ASN20473 IP : 104.238.137.254 CIDR : 104.238.136.0/23 PREFIX COUNT : 584 UNIQUE IP COUNT : 939776 WYKRYTE ATAKI Z ASN20473 : 1H - 2 3H - 2 6H - 5 12H - 8 24H - 15 DateTime : 2019-10-17 05:54:23 INFO : Web Crawlers ? Scan Detected and Blocked by ADMIN - data recovery |
2019-10-17 14:08:12 |
| 128.199.49.171 | attackspam | DATE:2019-10-17 05:54:27, IP:128.199.49.171, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-10-17 14:05:49 |
| 36.157.58.171 | attack | Fail2Ban - FTP Abuse Attempt |
2019-10-17 14:19:09 |
| 37.139.21.75 | attackbots | Invalid user zimbra from 37.139.21.75 port 43744 |
2019-10-17 13:52:52 |
| 92.119.160.107 | attack | Oct 17 07:44:41 h2177944 kernel: \[4167033.151028\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=12790 PROTO=TCP SPT=48828 DPT=11915 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 17 07:46:52 h2177944 kernel: \[4167164.090992\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=22112 PROTO=TCP SPT=48828 DPT=11714 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 17 07:47:16 h2177944 kernel: \[4167187.895464\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=39639 PROTO=TCP SPT=48828 DPT=12119 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 17 08:03:32 h2177944 kernel: \[4168163.726790\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=8460 PROTO=TCP SPT=48828 DPT=11568 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 17 08:08:03 h2177944 kernel: \[4168434.567889\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.107 DST=85.2 |
2019-10-17 14:17:41 |
| 193.33.111.217 | attack | Oct 17 08:09:20 localhost sshd\[10357\]: Invalid user smbuser from 193.33.111.217 port 50822 Oct 17 08:09:20 localhost sshd\[10357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.33.111.217 Oct 17 08:09:22 localhost sshd\[10357\]: Failed password for invalid user smbuser from 193.33.111.217 port 50822 ssh2 |
2019-10-17 14:18:24 |
| 58.217.107.82 | attackbots | port scan and connect, tcp 6379 (redis) |
2019-10-17 14:22:20 |
| 187.108.32.14 | attackspam | Oct 17 07:48:28 SilenceServices sshd[10275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.108.32.14 Oct 17 07:48:30 SilenceServices sshd[10275]: Failed password for invalid user lsr from 187.108.32.14 port 29147 ssh2 Oct 17 07:52:38 SilenceServices sshd[11428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.108.32.14 |
2019-10-17 14:12:14 |
| 42.117.13.5 | attackbotsspam | 42.117.13.5 - - \[16/Oct/2019:20:54:03 -0700\] "POST /index.php/admin/ HTTP/1.1" 404 2059942.117.13.5 - - \[16/Oct/2019:20:54:03 -0700\] "POST /index.php/admin/index/ HTTP/1.1" 404 2062342.117.13.5 - - \[16/Oct/2019:20:54:03 -0700\] "POST /index.php/admin HTTP/1.1" 404 20595 ... |
2019-10-17 14:19:44 |
| 106.12.34.56 | attackbotsspam | 2019-10-17T06:53:36.077967tmaserv sshd\[15777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.56 2019-10-17T06:53:38.515752tmaserv sshd\[15777\]: Failed password for invalid user bloger01 from 106.12.34.56 port 37380 ssh2 2019-10-17T07:56:05.378062tmaserv sshd\[20810\]: Invalid user !QAZAQ! from 106.12.34.56 port 49468 2019-10-17T07:56:05.382823tmaserv sshd\[20810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.56 2019-10-17T07:56:06.828557tmaserv sshd\[20810\]: Failed password for invalid user !QAZAQ! from 106.12.34.56 port 49468 ssh2 2019-10-17T08:00:49.363546tmaserv sshd\[20981\]: Invalid user Passw0rd2 from 106.12.34.56 port 53070 ... |
2019-10-17 14:02:53 |
| 91.89.151.117 | attackspam | $f2bV_matches |
2019-10-17 14:16:29 |