城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): Videotron
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.64.244.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.64.244.161. IN A
;; AUTHORITY SECTION:
. 296 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020062401 1800 900 604800 86400
;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 25 08:31:10 CST 2020
;; MSG SIZE rcvd: 118
Host 161.244.64.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 161.244.64.142.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
178.254.147.219 | attackbots | Brute-force attempt banned |
2020-04-10 05:04:36 |
218.92.0.212 | attackspam | web-1 [ssh_2] SSH Attack |
2020-04-10 05:07:53 |
89.206.59.83 | attackbotsspam | Automatic report - Port Scan Attack |
2020-04-10 05:07:09 |
41.65.181.155 | attackbotsspam | Apr 9 23:06:15 pkdns2 sshd\[51298\]: Invalid user fred from 41.65.181.155Apr 9 23:06:17 pkdns2 sshd\[51298\]: Failed password for invalid user fred from 41.65.181.155 port 44646 ssh2Apr 9 23:09:00 pkdns2 sshd\[51435\]: Invalid user user from 41.65.181.155Apr 9 23:09:02 pkdns2 sshd\[51435\]: Failed password for invalid user user from 41.65.181.155 port 45594 ssh2Apr 9 23:12:00 pkdns2 sshd\[51613\]: Invalid user javi from 41.65.181.155Apr 9 23:12:01 pkdns2 sshd\[51613\]: Failed password for invalid user javi from 41.65.181.155 port 46552 ssh2 ... |
2020-04-10 04:54:43 |
211.250.27.96 | attack | port scan and connect, tcp 23 (telnet) |
2020-04-10 04:58:29 |
178.173.195.75 | attackbots | [MK-VM4] Blocked by UFW |
2020-04-10 05:08:23 |
167.172.125.234 | attackspambots | 04/09/2020-08:56:31.039241 167.172.125.234 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-10 05:02:31 |
149.202.55.18 | attack | Apr 9 23:05:38 pkdns2 sshd\[51267\]: Invalid user ubuntu from 149.202.55.18Apr 9 23:05:40 pkdns2 sshd\[51267\]: Failed password for invalid user ubuntu from 149.202.55.18 port 59034 ssh2Apr 9 23:09:10 pkdns2 sshd\[51465\]: Invalid user admin from 149.202.55.18Apr 9 23:09:12 pkdns2 sshd\[51465\]: Failed password for invalid user admin from 149.202.55.18 port 39786 ssh2Apr 9 23:12:47 pkdns2 sshd\[51653\]: Invalid user production from 149.202.55.18Apr 9 23:12:49 pkdns2 sshd\[51653\]: Failed password for invalid user production from 149.202.55.18 port 48780 ssh2 ... |
2020-04-10 05:18:17 |
106.12.189.2 | attackspambots | Feb 22 09:38:21 woltan sshd[3294]: Failed password for invalid user liuzuozhen from 106.12.189.2 port 45252 ssh2 |
2020-04-10 05:13:21 |
124.74.248.218 | attack | Apr 9 23:53:13 lukav-desktop sshd\[23008\]: Invalid user deploy from 124.74.248.218 Apr 9 23:53:13 lukav-desktop sshd\[23008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218 Apr 9 23:53:15 lukav-desktop sshd\[23008\]: Failed password for invalid user deploy from 124.74.248.218 port 53592 ssh2 Apr 9 23:57:02 lukav-desktop sshd\[14631\]: Invalid user postgres from 124.74.248.218 Apr 9 23:57:02 lukav-desktop sshd\[14631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218 |
2020-04-10 05:11:57 |
200.122.249.203 | attackbotsspam | Apr 9 16:40:09 firewall sshd[21988]: Invalid user randy from 200.122.249.203 Apr 9 16:40:11 firewall sshd[21988]: Failed password for invalid user randy from 200.122.249.203 port 36492 ssh2 Apr 9 16:44:05 firewall sshd[22201]: Invalid user sam from 200.122.249.203 ... |
2020-04-10 04:53:30 |
5.135.165.55 | attackspam | Apr 9 20:58:48 pkdns2 sshd\[45047\]: Invalid user speedtest from 5.135.165.55Apr 9 20:58:50 pkdns2 sshd\[45047\]: Failed password for invalid user speedtest from 5.135.165.55 port 33840 ssh2Apr 9 21:02:34 pkdns2 sshd\[45282\]: Invalid user tfc from 5.135.165.55Apr 9 21:02:36 pkdns2 sshd\[45282\]: Failed password for invalid user tfc from 5.135.165.55 port 43748 ssh2Apr 9 21:06:15 pkdns2 sshd\[45483\]: Invalid user kafka from 5.135.165.55Apr 9 21:06:17 pkdns2 sshd\[45483\]: Failed password for invalid user kafka from 5.135.165.55 port 53642 ssh2 ... |
2020-04-10 04:55:10 |
139.129.94.95 | attackbotsspam | SSH Brute-Force. Ports scanning. |
2020-04-10 05:24:08 |
202.29.33.245 | attack | $lgm |
2020-04-10 05:20:44 |
220.160.127.108 | attack | Helo |
2020-04-10 04:58:14 |