城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.10.157.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.10.157.169. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 09:18:05 CST 2025
;; MSG SIZE rcvd: 107
Host 169.157.10.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 169.157.10.140.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 194.26.29.53 | attackbots | Jun 5 14:50:22 debian-2gb-nbg1-2 kernel: \[13620175.961584\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.53 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=53980 PROTO=TCP SPT=58639 DPT=5095 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-05 20:52:07 |
| 185.94.111.1 | attack | 05.06.2020 13:12:01 Recursive DNS scan |
2020-06-05 21:28:06 |
| 188.213.49.211 | attack | /?a=fetch&content=%3Cphp%3Edie(@md5(HelloThinkPHP))%3C/php%3E /App/?content=die(md5(HelloThinkPHP)) /index.php/module/action/param1/$%7B@die(md5(HelloThinkPHP))%7D |
2020-06-05 20:58:35 |
| 178.237.187.66 | attackbots | Email rejected due to spam filtering |
2020-06-05 20:56:49 |
| 142.93.151.98 | attackspam | Jun 5 13:20:05 km20725 sshd[18132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.151.98 user=r.r Jun 5 13:20:07 km20725 sshd[18132]: Failed password for r.r from 142.93.151.98 port 55260 ssh2 Jun 5 13:20:08 km20725 sshd[18132]: Received disconnect from 142.93.151.98 port 55260:11: Bye Bye [preauth] Jun 5 13:20:08 km20725 sshd[18132]: Disconnected from authenticating user r.r 142.93.151.98 port 55260 [preauth] Jun 5 13:44:36 km20725 sshd[19819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.151.98 user=r.r Jun 5 13:44:38 km20725 sshd[19819]: Failed password for r.r from 142.93.151.98 port 54836 ssh2 Jun 5 13:44:40 km20725 sshd[19819]: Received disconnect from 142.93.151.98 port 54836:11: Bye Bye [preauth] Jun 5 13:44:40 km20725 sshd[19819]: Disconnected from authenticating user r.r 142.93.151.98 port 54836 [preauth] Jun 5 13:47:38 km20725 sshd[20600]: pam_unix(ss........ ------------------------------- |
2020-06-05 20:44:00 |
| 183.224.149.234 | attackbotsspam | Jun 5 14:51:24 server sshd[30122]: Failed password for root from 183.224.149.234 port 14107 ssh2 Jun 5 14:54:29 server sshd[30292]: Failed password for root from 183.224.149.234 port 34091 ssh2 ... |
2020-06-05 21:13:05 |
| 45.231.12.37 | attackbotsspam | Jun 5 12:54:04 pi sshd[30902]: Failed password for root from 45.231.12.37 port 34376 ssh2 |
2020-06-05 20:49:15 |
| 106.75.254.114 | attack | Brute-force attempt banned |
2020-06-05 21:11:39 |
| 189.254.21.6 | attackbots | Jun 5 14:15:41 home sshd[16551]: Failed password for root from 189.254.21.6 port 60046 ssh2 Jun 5 14:19:56 home sshd[16921]: Failed password for root from 189.254.21.6 port 36054 ssh2 ... |
2020-06-05 21:04:41 |
| 106.13.116.203 | attack | 2020-06-05T11:52:55.832932randservbullet-proofcloud-66.localdomain sshd[3733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.116.203 user=root 2020-06-05T11:52:57.975621randservbullet-proofcloud-66.localdomain sshd[3733]: Failed password for root from 106.13.116.203 port 47658 ssh2 2020-06-05T12:03:22.389517randservbullet-proofcloud-66.localdomain sshd[3787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.116.203 user=root 2020-06-05T12:03:24.943297randservbullet-proofcloud-66.localdomain sshd[3787]: Failed password for root from 106.13.116.203 port 36286 ssh2 ... |
2020-06-05 20:51:10 |
| 37.237.184.12 | attackbotsspam | Automatic report - Port Scan Attack |
2020-06-05 21:09:34 |
| 110.8.67.146 | attack | Jun 5 17:46:02 gw1 sshd[19009]: Failed password for root from 110.8.67.146 port 40504 ssh2 ... |
2020-06-05 21:00:38 |
| 218.17.162.119 | attack | Jun 5 14:55:27 abendstille sshd\[19047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.162.119 user=root Jun 5 14:55:29 abendstille sshd\[19047\]: Failed password for root from 218.17.162.119 port 19827 ssh2 Jun 5 14:57:05 abendstille sshd\[20520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.162.119 user=root Jun 5 14:57:06 abendstille sshd\[20520\]: Failed password for root from 218.17.162.119 port 38731 ssh2 Jun 5 14:58:36 abendstille sshd\[21930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.162.119 user=root ... |
2020-06-05 21:00:13 |
| 122.224.217.46 | attack | Jun 5 08:28:38 NPSTNNYC01T sshd[23873]: Failed password for root from 122.224.217.46 port 48860 ssh2 Jun 5 08:30:48 NPSTNNYC01T sshd[24008]: Failed password for root from 122.224.217.46 port 47536 ssh2 ... |
2020-06-05 20:54:12 |
| 103.123.65.35 | attack | 2020-06-05T14:00:16.527235centos sshd[12127]: Failed password for root from 103.123.65.35 port 36128 ssh2 2020-06-05T14:03:15.201090centos sshd[12341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.65.35 user=root 2020-06-05T14:03:17.127770centos sshd[12341]: Failed password for root from 103.123.65.35 port 49576 ssh2 ... |
2020-06-05 20:59:18 |