城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.42.196.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.42.196.230. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 02:35:44 CST 2025
;; MSG SIZE rcvd: 107
Host 230.196.42.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 230.196.42.139.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
5.196.225.45 | attackspam | (sshd) Failed SSH login from 5.196.225.45 (FR/France/45.ip-5-196-225.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 9 12:33:32 server sshd[27684]: Failed password for root from 5.196.225.45 port 45986 ssh2 Sep 9 12:46:28 server sshd[31664]: Failed password for root from 5.196.225.45 port 34650 ssh2 Sep 9 12:50:38 server sshd[331]: Failed password for root from 5.196.225.45 port 40830 ssh2 Sep 9 12:54:36 server sshd[1566]: Failed password for root from 5.196.225.45 port 47006 ssh2 Sep 9 12:58:24 server sshd[2551]: Failed password for root from 5.196.225.45 port 53184 ssh2 |
2020-09-10 03:21:30 |
185.220.100.246 | attack | fell into ViewStateTrap:wien2018 |
2020-09-10 03:26:32 |
120.132.13.131 | attackspambots | SSH BruteForce Attack |
2020-09-10 03:09:57 |
122.51.179.24 | attack | 122.51.179.24 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 9 12:55:46 server4 sshd[8443]: Failed password for root from 128.199.224.34 port 59296 ssh2 Sep 9 12:58:10 server4 sshd[9677]: Failed password for root from 151.80.37.200 port 46842 ssh2 Sep 9 12:57:47 server4 sshd[9601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.178.116.154 user=root Sep 9 12:57:49 server4 sshd[9601]: Failed password for root from 189.178.116.154 port 60906 ssh2 Sep 9 12:57:32 server4 sshd[9475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.179.24 user=root Sep 9 12:57:34 server4 sshd[9475]: Failed password for root from 122.51.179.24 port 41144 ssh2 IP Addresses Blocked: 128.199.224.34 (SG/Singapore/-) 151.80.37.200 (FR/France/-) 189.178.116.154 (MX/Mexico/-) |
2020-09-10 03:29:16 |
142.93.212.91 | attackbots | Sep 9 18:59:24 gospond sshd[30881]: Failed password for root from 142.93.212.91 port 41002 ssh2 Sep 9 19:02:47 gospond sshd[30923]: Invalid user admin from 142.93.212.91 port 33558 Sep 9 19:02:47 gospond sshd[30923]: Invalid user admin from 142.93.212.91 port 33558 ... |
2020-09-10 03:25:35 |
222.186.31.166 | attackspambots | Sep 9 21:11:28 santamaria sshd\[20239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166 user=root Sep 9 21:11:30 santamaria sshd\[20239\]: Failed password for root from 222.186.31.166 port 12700 ssh2 Sep 9 21:11:36 santamaria sshd\[20241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166 user=root ... |
2020-09-10 03:13:52 |
192.119.71.216 | attack | ET WORM TheMoon.linksys.router 2 |
2020-09-10 03:31:32 |
61.177.172.61 | attackspambots | Sep 9 21:10:21 eventyay sshd[4193]: Failed password for root from 61.177.172.61 port 4428 ssh2 Sep 9 21:10:33 eventyay sshd[4193]: error: maximum authentication attempts exceeded for root from 61.177.172.61 port 4428 ssh2 [preauth] Sep 9 21:10:39 eventyay sshd[4200]: Failed password for root from 61.177.172.61 port 35395 ssh2 ... |
2020-09-10 03:23:11 |
85.209.0.251 | attackspambots | Sep 9 20:27:33 RESL sshd[3571]: Failed password for root from 85.209.0.251 port 22006 ssh2 Sep 9 20:27:32 RESL sshd[3580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.251 user=root Sep 9 20:27:35 RESL sshd[3580]: Failed password for root from 85.209.0.251 port 21914 ssh2 ... |
2020-09-10 03:33:52 |
156.54.164.144 | attack | 2020-09-09T21:23:15.859230paragon sshd[290422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.54.164.144 2020-09-09T21:23:15.855144paragon sshd[290422]: Invalid user nagios from 156.54.164.144 port 53587 2020-09-09T21:23:17.935864paragon sshd[290422]: Failed password for invalid user nagios from 156.54.164.144 port 53587 ssh2 2020-09-09T21:26:55.369520paragon sshd[290469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.54.164.144 user=root 2020-09-09T21:26:57.316145paragon sshd[290469]: Failed password for root from 156.54.164.144 port 56587 ssh2 ... |
2020-09-10 03:32:43 |
35.188.49.176 | attack | 2020-09-09T00:54:50.096607hostname sshd[9890]: Failed password for root from 35.188.49.176 port 47240 ssh2 2020-09-09T01:01:29.210436hostname sshd[12728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.49.188.35.bc.googleusercontent.com user=root 2020-09-09T01:01:31.032596hostname sshd[12728]: Failed password for root from 35.188.49.176 port 58346 ssh2 ... |
2020-09-10 03:29:32 |
218.92.0.224 | attack | Automatic report BANNED IP |
2020-09-10 03:37:16 |
141.98.80.188 | attack | Sep 9 21:29:01 srv01 postfix/smtpd\[9220\]: warning: unknown\[141.98.80.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 21:29:01 srv01 postfix/smtpd\[15449\]: warning: unknown\[141.98.80.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 21:29:01 srv01 postfix/smtpd\[17878\]: warning: unknown\[141.98.80.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 21:29:01 srv01 postfix/smtpd\[17879\]: warning: unknown\[141.98.80.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 21:29:01 srv01 postfix/smtpd\[17877\]: warning: unknown\[141.98.80.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-10 03:30:47 |
117.158.78.5 | attackspambots | Sep 9 19:08:50 h2779839 sshd[802]: Invalid user newsletter from 117.158.78.5 port 3913 Sep 9 19:08:50 h2779839 sshd[802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.78.5 Sep 9 19:08:50 h2779839 sshd[802]: Invalid user newsletter from 117.158.78.5 port 3913 Sep 9 19:08:53 h2779839 sshd[802]: Failed password for invalid user newsletter from 117.158.78.5 port 3913 ssh2 Sep 9 19:11:17 h2779839 sshd[853]: Invalid user rebecca from 117.158.78.5 port 3915 Sep 9 19:11:17 h2779839 sshd[853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.78.5 Sep 9 19:11:17 h2779839 sshd[853]: Invalid user rebecca from 117.158.78.5 port 3915 Sep 9 19:11:19 h2779839 sshd[853]: Failed password for invalid user rebecca from 117.158.78.5 port 3915 ssh2 Sep 9 19:13:45 h2779839 sshd[880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.78.5 user=root Sep 9 19 ... |
2020-09-10 03:13:01 |
1.192.216.217 | attackbots | $f2bV_matches |
2020-09-10 03:47:03 |