城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.14.190.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.14.190.58. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 22:40:17 CST 2025
;; MSG SIZE rcvd: 106
Host 58.190.14.142.in-addr.arpa not found: 2(SERVFAIL)
server can't find 142.14.190.58.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
78.128.113.114 | attackspambots | Jun 9 23:40:48 websrv1.derweidener.de postfix/smtps/smtpd[1160173]: warning: unknown[78.128.113.114]: SASL PLAIN authentication failed: Jun 9 23:40:48 websrv1.derweidener.de postfix/smtps/smtpd[1160173]: lost connection after AUTH from unknown[78.128.113.114] Jun 9 23:40:54 websrv1.derweidener.de postfix/smtps/smtpd[1160173]: lost connection after AUTH from unknown[78.128.113.114] Jun 9 23:40:59 websrv1.derweidener.de postfix/smtps/smtpd[1160175]: lost connection after AUTH from unknown[78.128.113.114] Jun 9 23:41:03 websrv1.derweidener.de postfix/smtps/smtpd[1160173]: warning: unknown[78.128.113.114]: SASL PLAIN authentication failed: |
2020-06-10 06:16:17 |
90.103.251.36 | attackspambots | Jun 9 23:44:42 mailserver sshd\[10006\]: Invalid user ralars from 90.103.251.36 ... |
2020-06-10 06:04:35 |
89.252.160.125 | attack | Jun 10 00:46:33 debian kernel: [641749.498785] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=89.252.160.125 DST=89.252.131.35 LEN=52 TOS=0x00 PREC=0x00 TTL=127 ID=25628 DF PROTO=TCP SPT=64792 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 |
2020-06-10 06:21:14 |
210.56.23.100 | attackspambots | Jun 10 01:06:49 pkdns2 sshd\[45238\]: Address 210.56.23.100 maps to discozdata.org, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Jun 10 01:06:49 pkdns2 sshd\[45238\]: Invalid user admin from 210.56.23.100Jun 10 01:06:52 pkdns2 sshd\[45238\]: Failed password for invalid user admin from 210.56.23.100 port 48154 ssh2Jun 10 01:08:27 pkdns2 sshd\[45322\]: Address 210.56.23.100 maps to discozdata.org, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Jun 10 01:08:28 pkdns2 sshd\[45322\]: Failed password for root from 210.56.23.100 port 40822 ssh2Jun 10 01:09:49 pkdns2 sshd\[45387\]: Address 210.56.23.100 maps to discozdata.org, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Jun 10 01:09:49 pkdns2 sshd\[45387\]: Invalid user teste from 210.56.23.100 ... |
2020-06-10 06:27:11 |
174.100.35.151 | attack | SSH Brute-Force attacks |
2020-06-10 06:07:36 |
133.130.119.178 | attackspam | 2020-06-09T20:29:10.503188shield sshd\[20719\]: Invalid user yaosc from 133.130.119.178 port 29053 2020-06-09T20:29:10.506881shield sshd\[20719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-119-178.a04a.g.tyo1.static.cnode.io 2020-06-09T20:29:12.174592shield sshd\[20719\]: Failed password for invalid user yaosc from 133.130.119.178 port 29053 ssh2 2020-06-09T20:32:35.085358shield sshd\[22182\]: Invalid user q123123 from 133.130.119.178 port 29746 2020-06-09T20:32:35.089066shield sshd\[22182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v133-130-119-178.a04a.g.tyo1.static.cnode.io |
2020-06-10 06:10:50 |
87.251.74.18 | attackbots | Port scan on 6 port(s): 2013 3395 10005 10006 10011 10030 |
2020-06-10 06:15:50 |
45.55.170.59 | attackspambots | Automatic report - XMLRPC Attack |
2020-06-10 06:12:20 |
223.71.42.104 | attack | DATE:2020-06-09 22:19:06, IP:223.71.42.104, PORT:6379 REDIS brute force auth on honeypot server (epe-honey1-hq) |
2020-06-10 06:04:52 |
114.67.77.148 | attackbots | Jun 9 22:14:31 django-0 sshd\[9883\]: Invalid user zenoss from 114.67.77.148Jun 9 22:14:33 django-0 sshd\[9883\]: Failed password for invalid user zenoss from 114.67.77.148 port 60130 ssh2Jun 9 22:17:40 django-0 sshd\[9999\]: Invalid user debian from 114.67.77.148 ... |
2020-06-10 06:24:30 |
175.24.94.167 | attackspam | 2020-06-09T22:01:52.752416shield sshd\[24218\]: Invalid user graphics from 175.24.94.167 port 36230 2020-06-09T22:01:52.755980shield sshd\[24218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.94.167 2020-06-09T22:01:55.318575shield sshd\[24218\]: Failed password for invalid user graphics from 175.24.94.167 port 36230 ssh2 2020-06-09T22:06:24.225788shield sshd\[25424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.94.167 user=root 2020-06-09T22:06:26.466610shield sshd\[25424\]: Failed password for root from 175.24.94.167 port 60470 ssh2 |
2020-06-10 06:19:53 |
116.7.98.38 | attackbots | Port probing on unauthorized port 445 |
2020-06-10 06:24:14 |
185.161.209.233 | attackbotsspam | Brute forcing email accounts |
2020-06-10 05:53:42 |
60.249.82.121 | attack | Jun 9 21:57:23 rush sshd[18647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.82.121 Jun 9 21:57:25 rush sshd[18647]: Failed password for invalid user enablediag from 60.249.82.121 port 52314 ssh2 Jun 9 22:01:11 rush sshd[18731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.82.121 ... |
2020-06-10 06:14:49 |
51.195.136.190 | attackbots | Jun 9 23:57:51 sip sshd[16790]: Failed password for root from 51.195.136.190 port 54104 ssh2 Jun 9 23:57:59 sip sshd[16790]: Failed password for root from 51.195.136.190 port 54104 ssh2 Jun 9 23:58:01 sip sshd[16790]: Failed password for root from 51.195.136.190 port 54104 ssh2 Jun 9 23:58:01 sip sshd[16790]: error: maximum authentication attempts exceeded for root from 51.195.136.190 port 54104 ssh2 [preauth] |
2020-06-10 06:15:02 |