城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.75.39.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33752
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.75.39.234. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 00:28:26 CST 2025
;; MSG SIZE rcvd: 106
Host 234.39.75.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 234.39.75.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 158.69.194.115 | attack | prod3 ... |
2020-04-17 17:56:29 |
| 171.103.142.2 | attack | Dovecot Invalid User Login Attempt. |
2020-04-17 18:19:16 |
| 106.243.2.244 | attackbots | Apr 17 10:36:54 vps58358 sshd\[32393\]: Invalid user kt from 106.243.2.244Apr 17 10:36:56 vps58358 sshd\[32393\]: Failed password for invalid user kt from 106.243.2.244 port 53382 ssh2Apr 17 10:39:28 vps58358 sshd\[32499\]: Invalid user iu from 106.243.2.244Apr 17 10:39:30 vps58358 sshd\[32499\]: Failed password for invalid user iu from 106.243.2.244 port 34784 ssh2Apr 17 10:41:39 vps58358 sshd\[32554\]: Invalid user ob from 106.243.2.244Apr 17 10:41:41 vps58358 sshd\[32554\]: Failed password for invalid user ob from 106.243.2.244 port 40398 ssh2 ... |
2020-04-17 18:02:13 |
| 119.29.205.52 | attackbotsspam | distributed sshd attacks |
2020-04-17 17:59:10 |
| 34.80.135.20 | attack | Apr 17 11:50:27 nextcloud sshd\[28682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.135.20 user=root Apr 17 11:50:29 nextcloud sshd\[28682\]: Failed password for root from 34.80.135.20 port 38140 ssh2 Apr 17 11:56:02 nextcloud sshd\[6093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.135.20 user=root |
2020-04-17 18:08:01 |
| 222.186.30.112 | attackspambots | 04/17/2020-05:48:44.283964 222.186.30.112 Protocol: 6 ET SCAN Potential SSH Scan |
2020-04-17 18:00:53 |
| 66.70.205.186 | attackspambots | distributed sshd attacks |
2020-04-17 17:47:54 |
| 183.167.211.135 | attackbots | distributed sshd attacks |
2020-04-17 17:56:15 |
| 51.38.32.230 | attack | 2020-04-16 UTC: (20x) - admin(3x),ax,backup,bk,daijiabao,eg,hl,mi,root(6x),rq,testbed,vk,ym |
2020-04-17 18:26:19 |
| 162.247.74.217 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-04-17 17:45:00 |
| 35.226.246.200 | attackbots | Apr 17 12:14:07 vmd17057 sshd[28453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.246.200 Apr 17 12:14:10 vmd17057 sshd[28453]: Failed password for invalid user di from 35.226.246.200 port 40286 ssh2 ... |
2020-04-17 18:18:47 |
| 167.71.231.210 | attack | Port 11132 scan denied |
2020-04-17 18:21:09 |
| 67.205.161.55 | attackbotsspam | Apr 17 07:35:51 h2779839 sshd[6115]: Invalid user test from 67.205.161.55 port 37756 Apr 17 07:35:51 h2779839 sshd[6115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.161.55 Apr 17 07:35:51 h2779839 sshd[6115]: Invalid user test from 67.205.161.55 port 37756 Apr 17 07:35:54 h2779839 sshd[6115]: Failed password for invalid user test from 67.205.161.55 port 37756 ssh2 Apr 17 07:39:40 h2779839 sshd[6218]: Invalid user lk from 67.205.161.55 port 47678 Apr 17 07:39:40 h2779839 sshd[6218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.161.55 Apr 17 07:39:40 h2779839 sshd[6218]: Invalid user lk from 67.205.161.55 port 47678 Apr 17 07:39:43 h2779839 sshd[6218]: Failed password for invalid user lk from 67.205.161.55 port 47678 ssh2 Apr 17 07:43:31 h2779839 sshd[6358]: Invalid user test from 67.205.161.55 port 57598 ... |
2020-04-17 18:15:34 |
| 34.230.55.56 | attackspambots | $f2bV_matches |
2020-04-17 17:55:35 |
| 144.21.103.101 | attackspambots | Brute force SMTP login attempted. ... |
2020-04-17 18:06:44 |