城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.119.173.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.119.173.129. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 411 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:16:02 CST 2025
;; MSG SIZE rcvd: 108
Host 129.173.119.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 129.173.119.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.15.108.142 | attackbots | WordpressAttack |
2019-12-30 08:54:25 |
| 58.57.4.238 | attackspambots | Dec 29 18:02:59 web1 postfix/smtpd[8834]: warning: unknown[58.57.4.238]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-30 08:20:34 |
| 78.43.55.100 | attack | 2019-12-30T00:33:37.132131shield sshd\[11664\]: Invalid user mysql from 78.43.55.100 port 59704 2019-12-30T00:33:37.136294shield sshd\[11664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hsi-kbw-078-043-055-100.hsi4.kabel-badenwuerttemberg.de 2019-12-30T00:33:39.585328shield sshd\[11664\]: Failed password for invalid user mysql from 78.43.55.100 port 59704 ssh2 2019-12-30T00:38:22.122678shield sshd\[12052\]: Invalid user scortes from 78.43.55.100 port 46399 2019-12-30T00:38:22.126864shield sshd\[12052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hsi-kbw-078-043-055-100.hsi4.kabel-badenwuerttemberg.de |
2019-12-30 08:43:40 |
| 185.175.93.3 | attack | ET DROP Dshield Block Listed Source group 1 - port: 3210 proto: TCP cat: Misc Attack |
2019-12-30 08:23:42 |
| 185.176.27.190 | attack | 12/29/2019-18:03:06.912143 185.176.27.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-12-30 08:17:57 |
| 218.92.0.168 | attackbotsspam | Dec 30 00:31:40 zeus sshd[6914]: Failed password for root from 218.92.0.168 port 64882 ssh2 Dec 30 00:31:44 zeus sshd[6914]: Failed password for root from 218.92.0.168 port 64882 ssh2 Dec 30 00:31:48 zeus sshd[6914]: Failed password for root from 218.92.0.168 port 64882 ssh2 Dec 30 00:31:53 zeus sshd[6914]: Failed password for root from 218.92.0.168 port 64882 ssh2 Dec 30 00:31:58 zeus sshd[6914]: Failed password for root from 218.92.0.168 port 64882 ssh2 |
2019-12-30 08:41:26 |
| 180.106.83.17 | attackbotsspam | $f2bV_matches |
2019-12-30 08:37:40 |
| 52.91.36.203 | attack | 2019-12-29 x@x 2019-12-29 23:46:44 unexpected disconnection while reading SMTP command from em3-52-91-36-203.compute-1.amazonaws.com (Niko.sn866.com) [52.91.36.203]:43818 I=[10.100.18.20]:25 (error: Connection reset by peer) 2019-12-29 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=52.91.36.203 |
2019-12-30 08:29:48 |
| 106.12.89.121 | attack | IP blocked |
2019-12-30 08:27:16 |
| 182.61.18.254 | attackspam | Automatic report - Banned IP Access |
2019-12-30 08:30:09 |
| 51.91.212.81 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2019-12-30 08:41:53 |
| 14.207.42.89 | attackspambots | 2019-12-29 23:48:56 plain_virtual_exim authenticator failed for mx-ll-14.207.42-89.dynamic.3bb.co.th ([127.0.0.1]) [14.207.42.89]: 535 Incorrect authentication data ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.207.42.89 |
2019-12-30 08:21:41 |
| 54.39.98.253 | attackspam | Dec 29 22:41:43 raspberrypi sshd\[29711\]: Invalid user lpa from 54.39.98.253Dec 29 22:41:45 raspberrypi sshd\[29711\]: Failed password for invalid user lpa from 54.39.98.253 port 51718 ssh2Dec 29 23:05:46 raspberrypi sshd\[30080\]: Failed password for root from 54.39.98.253 port 56672 ssh2 ... |
2019-12-30 08:40:10 |
| 185.156.73.21 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2019-12-30 08:46:03 |
| 41.39.72.152 | attackspambots | DLink DSL Remote OS Command Injection Vulnerability, PTR: host-41.39.72.152.tedata.net. |
2019-12-30 08:33:35 |