城市(city): unknown
省份(region): unknown
国家(country): Sweden
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.3.42.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.3.42.95. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 08:15:01 CST 2025
;; MSG SIZE rcvd: 104
Host 95.42.3.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 95.42.3.138.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 219.143.72.21 | attackbots | Attempt to login to email server on IMAP service on 30-08-2019 06:41:34. |
2019-08-30 21:58:03 |
| 189.6.45.130 | attackbots | Invalid user git from 189.6.45.130 port 56478 |
2019-08-30 22:30:41 |
| 191.7.8.180 | attackspam | Aug 30 14:34:31 eventyay sshd[16112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.8.180 Aug 30 14:34:33 eventyay sshd[16112]: Failed password for invalid user collins from 191.7.8.180 port 33547 ssh2 Aug 30 14:39:51 eventyay sshd[17402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.8.180 ... |
2019-08-30 22:52:37 |
| 138.68.137.169 | attackspambots | Aug 30 03:31:02 eddieflores sshd\[21908\]: Invalid user irma from 138.68.137.169 Aug 30 03:31:02 eddieflores sshd\[21908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.137.169 Aug 30 03:31:03 eddieflores sshd\[21908\]: Failed password for invalid user irma from 138.68.137.169 port 45362 ssh2 Aug 30 03:35:14 eddieflores sshd\[22259\]: Invalid user kjell from 138.68.137.169 Aug 30 03:35:14 eddieflores sshd\[22259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.137.169 |
2019-08-30 22:03:12 |
| 106.52.18.180 | attack | Aug 30 14:20:01 MK-Soft-VM6 sshd\[26924\]: Invalid user glenn from 106.52.18.180 port 60586 Aug 30 14:20:01 MK-Soft-VM6 sshd\[26924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.18.180 Aug 30 14:20:02 MK-Soft-VM6 sshd\[26924\]: Failed password for invalid user glenn from 106.52.18.180 port 60586 ssh2 ... |
2019-08-30 22:26:26 |
| 222.186.52.124 | attackbotsspam | SSH Brute Force, server-1 sshd[23247]: Failed password for root from 222.186.52.124 port 35720 ssh2 |
2019-08-30 22:57:33 |
| 58.144.151.10 | attackspam | Invalid user ya from 58.144.151.10 port 40414 |
2019-08-30 23:07:55 |
| 58.87.120.53 | attackbots | Aug 30 11:45:44 yabzik sshd[11937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53 Aug 30 11:45:46 yabzik sshd[11937]: Failed password for invalid user dylan from 58.87.120.53 port 53568 ssh2 Aug 30 11:48:14 yabzik sshd[12673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53 |
2019-08-30 22:42:53 |
| 217.182.165.158 | attack | Aug 29 21:26:33 sachi sshd\[23228\]: Invalid user mihai from 217.182.165.158 Aug 29 21:26:33 sachi sshd\[23228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3074474.ip-217-182-165.eu Aug 29 21:26:35 sachi sshd\[23228\]: Failed password for invalid user mihai from 217.182.165.158 port 37192 ssh2 Aug 29 21:30:19 sachi sshd\[23521\]: Invalid user mythtv from 217.182.165.158 Aug 29 21:30:19 sachi sshd\[23521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3074474.ip-217-182-165.eu |
2019-08-30 22:04:27 |
| 85.37.38.195 | attackspambots | SSH Bruteforce attempt |
2019-08-30 22:41:03 |
| 160.153.153.29 | attackbots | Automatic report - Banned IP Access |
2019-08-30 22:10:33 |
| 14.162.176.166 | attack | Unauthorized connection attempt from IP address 14.162.176.166 on Port 445(SMB) |
2019-08-30 22:51:21 |
| 217.67.21.68 | attack | Aug 30 05:41:34 work-partkepr sshd\[20373\]: Invalid user nam from 217.67.21.68 port 38136 Aug 30 05:41:34 work-partkepr sshd\[20373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.67.21.68 ... |
2019-08-30 22:04:56 |
| 117.0.35.153 | attackbots | Aug 30 14:49:14 MK-Soft-Root2 sshd\[21818\]: Invalid user admin from 117.0.35.153 port 58216 Aug 30 14:49:15 MK-Soft-Root2 sshd\[21818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.0.35.153 Aug 30 14:49:17 MK-Soft-Root2 sshd\[21818\]: Failed password for invalid user admin from 117.0.35.153 port 58216 ssh2 ... |
2019-08-30 22:59:52 |
| 42.7.246.237 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-08-30 22:34:57 |