城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.26.137.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41899
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.26.137.49. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 19:13:20 CST 2025
;; MSG SIZE rcvd: 106
Host 49.137.26.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 49.137.26.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 1.163.51.89 | attackspam | Unauthorised access (Sep 30) SRC=1.163.51.89 LEN=40 PREC=0x20 TTL=51 ID=23886 TCP DPT=23 WINDOW=11583 SYN |
2019-09-30 18:58:33 |
| 27.105.103.3 | attack | Sep 30 13:03:30 markkoudstaal sshd[4742]: Failed password for root from 27.105.103.3 port 57454 ssh2 Sep 30 13:08:07 markkoudstaal sshd[5139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.105.103.3 Sep 30 13:08:09 markkoudstaal sshd[5139]: Failed password for invalid user www from 27.105.103.3 port 41130 ssh2 |
2019-09-30 19:18:34 |
| 222.186.31.204 | attack | Sep 30 06:50:29 debian sshd\[17303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.204 user=root Sep 30 06:50:31 debian sshd\[17303\]: Failed password for root from 222.186.31.204 port 51154 ssh2 Sep 30 06:50:33 debian sshd\[17303\]: Failed password for root from 222.186.31.204 port 51154 ssh2 ... |
2019-09-30 18:51:41 |
| 37.187.46.74 | attackspam | Sep 30 12:42:35 SilenceServices sshd[7410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.46.74 Sep 30 12:42:37 SilenceServices sshd[7410]: Failed password for invalid user admin from 37.187.46.74 port 36018 ssh2 Sep 30 12:49:13 SilenceServices sshd[9278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.46.74 |
2019-09-30 18:58:05 |
| 157.230.163.6 | attackspambots | Sep 29 19:23:13 lcprod sshd\[15932\]: Invalid user xxxxx from 157.230.163.6 Sep 29 19:23:13 lcprod sshd\[15932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6 Sep 29 19:23:15 lcprod sshd\[15932\]: Failed password for invalid user xxxxx from 157.230.163.6 port 49606 ssh2 Sep 29 19:27:21 lcprod sshd\[16271\]: Invalid user admin from 157.230.163.6 Sep 29 19:27:21 lcprod sshd\[16271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6 |
2019-09-30 18:54:16 |
| 123.206.87.154 | attackbotsspam | Sep 30 06:51:32 vmd17057 sshd\[21099\]: Invalid user cisco from 123.206.87.154 port 56900 Sep 30 06:51:32 vmd17057 sshd\[21099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.87.154 Sep 30 06:51:34 vmd17057 sshd\[21099\]: Failed password for invalid user cisco from 123.206.87.154 port 56900 ssh2 ... |
2019-09-30 19:21:06 |
| 106.12.78.199 | attack | Sep 30 11:25:48 [munged] sshd[19813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.199 |
2019-09-30 19:02:52 |
| 68.183.48.172 | attackbotsspam | Sep 30 06:51:06 www sshd\[166720\]: Invalid user ey from 68.183.48.172 Sep 30 06:51:06 www sshd\[166720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172 Sep 30 06:51:08 www sshd\[166720\]: Failed password for invalid user ey from 68.183.48.172 port 48372 ssh2 ... |
2019-09-30 18:51:54 |
| 139.59.41.154 | attackbotsspam | Sep 30 13:51:35 pkdns2 sshd\[35055\]: Invalid user TeamSpeak from 139.59.41.154Sep 30 13:51:37 pkdns2 sshd\[35055\]: Failed password for invalid user TeamSpeak from 139.59.41.154 port 34976 ssh2Sep 30 13:56:34 pkdns2 sshd\[35253\]: Invalid user test from 139.59.41.154Sep 30 13:56:37 pkdns2 sshd\[35253\]: Failed password for invalid user test from 139.59.41.154 port 34048 ssh2Sep 30 14:01:22 pkdns2 sshd\[35463\]: Invalid user admin from 139.59.41.154Sep 30 14:01:24 pkdns2 sshd\[35463\]: Failed password for invalid user admin from 139.59.41.154 port 59042 ssh2 ... |
2019-09-30 19:12:38 |
| 218.90.62.184 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/218.90.62.184/ CN - 1H : (640) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4134 IP : 218.90.62.184 CIDR : 218.90.0.0/18 PREFIX COUNT : 5430 UNIQUE IP COUNT : 106919680 WYKRYTE ATAKI Z ASN4134 : 1H - 5 3H - 19 6H - 31 12H - 61 24H - 131 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-09-30 18:45:25 |
| 191.83.183.202 | attack | " " |
2019-09-30 19:01:49 |
| 31.184.215.238 | attackspam | 09/29/2019-23:51:24.449882 31.184.215.238 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 21 |
2019-09-30 18:45:09 |
| 51.75.120.244 | attackbotsspam | Sep 30 07:45:48 OPSO sshd\[15648\]: Invalid user liidia from 51.75.120.244 port 60816 Sep 30 07:45:48 OPSO sshd\[15648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.120.244 Sep 30 07:45:50 OPSO sshd\[15648\]: Failed password for invalid user liidia from 51.75.120.244 port 60816 ssh2 Sep 30 07:49:22 OPSO sshd\[16432\]: Invalid user youtube from 51.75.120.244 port 43808 Sep 30 07:49:22 OPSO sshd\[16432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.120.244 |
2019-09-30 19:13:45 |
| 37.49.230.31 | attack | [portscan] udp/123 [NTP] *(RWIN=-)(09300929) |
2019-09-30 19:04:26 |
| 164.132.225.151 | attack | Sep 30 11:41:22 heissa sshd\[11915\]: Invalid user yue from 164.132.225.151 port 49132 Sep 30 11:41:22 heissa sshd\[11915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.ip-164-132-225.eu Sep 30 11:41:23 heissa sshd\[11915\]: Failed password for invalid user yue from 164.132.225.151 port 49132 ssh2 Sep 30 11:44:55 heissa sshd\[12469\]: Invalid user nr from 164.132.225.151 port 41128 Sep 30 11:44:55 heissa sshd\[12469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.ip-164-132-225.eu |
2019-09-30 19:11:44 |