城市(city): Kaohsiung
省份(region): Kaohsiung
国家(country): Taiwan, China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.123.42.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.123.42.105. IN A
;; AUTHORITY SECTION:
. 365 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023062802 1800 900 604800 86400
;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 29 09:01:41 CST 2023
;; MSG SIZE rcvd: 107
Host 105.42.123.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 105.42.123.140.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 183.83.78.180 | attack | Invalid user login from 183.83.78.180 port 37169 |
2020-04-24 03:22:48 |
| 186.179.103.107 | attackbots | Apr 23 16:43:58 sshgateway sshd\[16226\]: Invalid user ubuntu from 186.179.103.107 Apr 23 16:43:58 sshgateway sshd\[16226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.179.103.107 Apr 23 16:44:00 sshgateway sshd\[16226\]: Failed password for invalid user ubuntu from 186.179.103.107 port 43759 ssh2 |
2020-04-24 03:13:45 |
| 51.77.41.246 | attack | Apr 23 19:54:56 pornomens sshd\[7211\]: Invalid user vyatta from 51.77.41.246 port 45752 Apr 23 19:54:56 pornomens sshd\[7211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.41.246 Apr 23 19:54:59 pornomens sshd\[7211\]: Failed password for invalid user vyatta from 51.77.41.246 port 45752 ssh2 ... |
2020-04-24 02:57:04 |
| 222.186.52.39 | attackspambots | Apr 23 21:24:34 srv01 sshd[7593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39 user=root Apr 23 21:24:37 srv01 sshd[7593]: Failed password for root from 222.186.52.39 port 55340 ssh2 Apr 23 21:24:39 srv01 sshd[7593]: Failed password for root from 222.186.52.39 port 55340 ssh2 Apr 23 21:24:34 srv01 sshd[7593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39 user=root Apr 23 21:24:37 srv01 sshd[7593]: Failed password for root from 222.186.52.39 port 55340 ssh2 Apr 23 21:24:39 srv01 sshd[7593]: Failed password for root from 222.186.52.39 port 55340 ssh2 Apr 23 21:24:34 srv01 sshd[7593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.39 user=root Apr 23 21:24:37 srv01 sshd[7593]: Failed password for root from 222.186.52.39 port 55340 ssh2 Apr 23 21:24:39 srv01 sshd[7593]: Failed password for root from 222.186.52.39 port 55340 ... |
2020-04-24 03:29:01 |
| 195.54.160.243 | attackbotsspam | slow and persistent scanner |
2020-04-24 03:25:06 |
| 37.187.150.194 | attackspambots | Automated report - ssh fail2ban: Apr 23 20:52:11 Unable to negotiate with 37.187.150.194 port=60426: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 23 20:52:49 Unable to negotiate with 37.187.150.194 port=35492: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 23 20:53:28 Unable to negotiate with 37.187.150.194 port=38790: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 23 20:54:08 Unable to negotiate with 37.187.150.194 port=42088: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] |
2020-04-24 03:18:50 |
| 142.44.212.118 | attackspam | Apr 23 17:14:23 game-panel sshd[1833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.212.118 Apr 23 17:14:25 game-panel sshd[1833]: Failed password for invalid user james from 142.44.212.118 port 48234 ssh2 Apr 23 17:14:44 game-panel sshd[1847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.212.118 |
2020-04-24 03:16:51 |
| 14.161.18.170 | attack | (imapd) Failed IMAP login from 14.161.18.170 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 23 21:14:04 ir1 dovecot[264309]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user= |
2020-04-24 02:59:06 |
| 51.137.145.162 | attackspam | $f2bV_matches |
2020-04-24 02:48:23 |
| 52.233.234.60 | attackspam | RDP Bruteforce |
2020-04-24 03:10:06 |
| 115.238.129.140 | attack | 24368/tcp 10556/tcp 13080/tcp... [2020-04-21/23]19pkt,7pt.(tcp) |
2020-04-24 02:50:17 |
| 190.69.27.137 | attackspambots | Honeypot attack, port: 445, PTR: eseprimernivelsaludsincelejosucre.com. |
2020-04-24 03:20:06 |
| 208.73.204.156 | attackspam | (smtpauth) Failed SMTP AUTH login from 208.73.204.156 (US/United States/8.com): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-23 21:13:59 login authenticator failed for (ADMIN) [208.73.204.156]: 535 Incorrect authentication data (set_id=info@paygaheayegh.ir) |
2020-04-24 03:10:54 |
| 103.78.81.227 | attackbots | Invalid user mr from 103.78.81.227 port 60218 |
2020-04-24 03:28:03 |
| 171.231.244.86 | attack | Email hack |
2020-04-24 02:57:18 |