城市(city): unknown
省份(region): unknown
国家(country): France
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.94.150.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.94.150.77. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022102200 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 22 14:38:56 CST 2022
;; MSG SIZE rcvd: 106
Host 77.150.94.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 77.150.94.140.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 163.172.106.114 | attack | Jul 2 22:02:49 localhost sshd\[31458\]: Invalid user rOot from 163.172.106.114 port 56366 Jul 2 22:02:49 localhost sshd\[31458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.106.114 Jul 2 22:02:50 localhost sshd\[31458\]: Failed password for invalid user rOot from 163.172.106.114 port 56366 ssh2 |
2019-07-03 04:57:39 |
| 206.189.23.43 | attackbots | Jul 2 13:51:50 debian sshd[24623]: Unable to negotiate with 206.189.23.43 port 42040: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Jul 2 15:55:05 debian sshd[30021]: Unable to negotiate with 206.189.23.43 port 43884: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2019-07-03 05:07:19 |
| 178.128.105.195 | attack | 178.128.105.195 - - [02/Jul/2019:15:40:46 +0200] "GET /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.128.105.195 - - [02/Jul/2019:15:40:47 +0200] "POST /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.128.105.195 - - [02/Jul/2019:15:40:48 +0200] "GET /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.128.105.195 - - [02/Jul/2019:15:40:49 +0200] "POST /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.128.105.195 - - [02/Jul/2019:15:40:49 +0200] "GET /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.128.105.195 - - [02/Jul/2019:15:40:50 +0200] "POST /wp-login.php HTTP/1.1" 200 4406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" . |
2019-07-03 04:33:19 |
| 121.168.248.218 | attack | Reported by AbuseIPDB proxy server. |
2019-07-03 04:56:31 |
| 188.95.226.94 | attackbots | Dec 20 17:58:57 motanud sshd\[14467\]: Invalid user test from 188.95.226.94 port 47400 Dec 20 17:58:57 motanud sshd\[14467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.95.226.94 Dec 20 17:58:59 motanud sshd\[14467\]: Failed password for invalid user test from 188.95.226.94 port 47400 ssh2 |
2019-07-03 04:37:42 |
| 189.102.118.68 | attackspam | Mar 7 03:59:45 motanud sshd\[18033\]: Invalid user ql from 189.102.118.68 port 60149 Mar 7 03:59:45 motanud sshd\[18033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.102.118.68 Mar 7 03:59:47 motanud sshd\[18033\]: Failed password for invalid user ql from 189.102.118.68 port 60149 ssh2 |
2019-07-03 04:33:52 |
| 220.194.43.34 | attackspambots | RDP Scan |
2019-07-03 04:24:21 |
| 185.53.88.21 | attackspambots | " " |
2019-07-03 04:41:28 |
| 185.176.27.2 | attackbots | 02.07.2019 20:35:24 Connection to port 43389 blocked by firewall |
2019-07-03 04:51:28 |
| 185.53.88.63 | attack | *Port Scan* detected from 185.53.88.63 (NL/Netherlands/-). 4 hits in the last 140 seconds |
2019-07-03 04:38:07 |
| 185.63.255.19 | attack | Unauthorized connection attempt from IP address 185.63.255.19 on Port 445(SMB) |
2019-07-03 05:05:33 |
| 185.176.26.103 | attackspambots | firewall-block, port(s): 62389/tcp |
2019-07-03 05:06:48 |
| 134.209.237.152 | attackspam | Jul 2 21:19:48 mail sshd\[15979\]: Invalid user maria from 134.209.237.152 port 43012 Jul 2 21:19:48 mail sshd\[15979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.152 ... |
2019-07-03 04:23:02 |
| 91.211.181.231 | attackbots | [portscan] Port scan |
2019-07-03 04:23:37 |
| 34.77.33.21 | attack | 5903/tcp [2019-07-02]1pkt |
2019-07-03 04:37:15 |