城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.168.212.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.168.212.161. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 12:11:37 CST 2025
;; MSG SIZE rcvd: 108
Host 161.212.168.138.in-addr.arpa not found: 2(SERVFAIL)
server can't find 138.168.212.161.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 213.55.76.173 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-25 22:53:32 |
| 187.34.62.157 | attackspam | Honeypot attack, port: 445, PTR: 187-34-62-157.dsl.telesp.net.br. |
2020-01-25 22:50:26 |
| 60.249.148.127 | attackspambots | Unauthorized connection attempt from IP address 60.249.148.127 on Port 445(SMB) |
2020-01-25 22:11:41 |
| 46.191.141.40 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 25-01-2020 13:15:17. |
2020-01-25 22:19:06 |
| 189.203.157.42 | attackbotsspam | Honeypot attack, port: 445, PTR: fixed-189-203-157-42.totalplay.net. |
2020-01-25 22:47:45 |
| 107.170.194.137 | attack | Jan 25 04:04:28 php1 sshd\[23803\]: Invalid user ji from 107.170.194.137 Jan 25 04:04:28 php1 sshd\[23803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.194.137 Jan 25 04:04:29 php1 sshd\[23803\]: Failed password for invalid user ji from 107.170.194.137 port 57515 ssh2 Jan 25 04:09:45 php1 sshd\[24222\]: Invalid user benutzer from 107.170.194.137 Jan 25 04:09:45 php1 sshd\[24222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.194.137 |
2020-01-25 22:35:20 |
| 118.25.151.40 | attackspam | Jan 25 14:41:38 pi sshd[28456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.151.40 Jan 25 14:41:41 pi sshd[28456]: Failed password for invalid user santhosh from 118.25.151.40 port 42200 ssh2 |
2020-01-25 22:48:22 |
| 121.11.111.13 | attackspam | Jan 25 06:48:20 askasleikir sshd[516547]: Failed password for invalid user cdn from 121.11.111.13 port 58680 ssh2 |
2020-01-25 22:40:14 |
| 211.226.40.177 | attack | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-01-25 22:34:53 |
| 212.64.23.30 | attackbots | Jan 25 11:22:18 firewall sshd[16512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.23.30 Jan 25 11:22:18 firewall sshd[16512]: Invalid user rich from 212.64.23.30 Jan 25 11:22:20 firewall sshd[16512]: Failed password for invalid user rich from 212.64.23.30 port 38854 ssh2 ... |
2020-01-25 22:46:22 |
| 80.82.77.245 | attackbots | Jan 25 15:29:11 debian-2gb-nbg1-2 kernel: \[2221825.159094\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.245 DST=195.201.40.59 LEN=168 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=37247 DPT=2638 LEN=148 |
2020-01-25 22:31:46 |
| 113.206.23.135 | attack | MAIL: User Login Brute Force Attempt |
2020-01-25 22:09:42 |
| 222.186.30.31 | attack | Jan 25 15:12:19 markkoudstaal sshd[25728]: Failed password for root from 222.186.30.31 port 55531 ssh2 Jan 25 15:12:22 markkoudstaal sshd[25728]: Failed password for root from 222.186.30.31 port 55531 ssh2 Jan 25 15:12:24 markkoudstaal sshd[25728]: Failed password for root from 222.186.30.31 port 55531 ssh2 |
2020-01-25 22:29:29 |
| 3.233.220.232 | attackbotsspam | Jan 25 15:31:08 www sshd\[21153\]: Invalid user prueba from 3.233.220.232Jan 25 15:31:09 www sshd\[21153\]: Failed password for invalid user prueba from 3.233.220.232 port 53465 ssh2Jan 25 15:32:27 www sshd\[21158\]: Failed password for root from 3.233.220.232 port 59509 ssh2 ... |
2020-01-25 22:25:59 |
| 112.85.42.173 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173 user=root Failed password for root from 112.85.42.173 port 2100 ssh2 Failed password for root from 112.85.42.173 port 2100 ssh2 Failed password for root from 112.85.42.173 port 2100 ssh2 Failed password for root from 112.85.42.173 port 2100 ssh2 |
2020-01-25 22:12:38 |