城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.94.157.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.94.157.16. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 01:17:08 CST 2025
;; MSG SIZE rcvd: 106
Host 16.157.94.145.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 16.157.94.145.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 141.98.10.212 | attackspambots | Sep 4 23:32:51 game-panel sshd[30804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.212 Sep 4 23:32:53 game-panel sshd[30804]: Failed password for invalid user Administrator from 141.98.10.212 port 46163 ssh2 Sep 4 23:33:27 game-panel sshd[30866]: Failed password for root from 141.98.10.212 port 46079 ssh2 |
2020-09-05 07:40:26 |
| 180.166.117.254 | attackbots | Sep 4 18:48:08 vmd36147 sshd[21877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.117.254 Sep 4 18:48:10 vmd36147 sshd[21877]: Failed password for invalid user praveen from 180.166.117.254 port 56439 ssh2 ... |
2020-09-05 07:16:58 |
| 171.7.65.123 | attackspam | Sep 4 05:48:34 kmh-wmh-003-nbg03 sshd[31272]: Invalid user user3 from 171.7.65.123 port 51274 Sep 4 05:48:34 kmh-wmh-003-nbg03 sshd[31272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.7.65.123 Sep 4 05:48:36 kmh-wmh-003-nbg03 sshd[31272]: Failed password for invalid user user3 from 171.7.65.123 port 51274 ssh2 Sep 4 05:48:37 kmh-wmh-003-nbg03 sshd[31272]: Received disconnect from 171.7.65.123 port 51274:11: Bye Bye [preauth] Sep 4 05:48:37 kmh-wmh-003-nbg03 sshd[31272]: Disconnected from 171.7.65.123 port 51274 [preauth] Sep 4 05:53:01 kmh-wmh-003-nbg03 sshd[31690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.7.65.123 user=r.r Sep 4 05:53:03 kmh-wmh-003-nbg03 sshd[31690]: Failed password for r.r from 171.7.65.123 port 58506 ssh2 Sep 4 05:53:04 kmh-wmh-003-nbg03 sshd[31690]: Received disconnect from 171.7.65.123 port 58506:11: Bye Bye [preauth] Sep 4 05:53:04 kmh-wmh........ ------------------------------- |
2020-09-05 07:50:26 |
| 138.75.167.252 | attackbots | SSH/22 MH Probe, BF, Hack - |
2020-09-05 07:41:58 |
| 162.247.74.213 | attack | 2020-09-05T01:35[Censored Hostname] sshd[31205]: Failed password for root from 162.247.74.213 port 55900 ssh2 2020-09-05T01:35[Censored Hostname] sshd[31205]: Failed password for root from 162.247.74.213 port 55900 ssh2 2020-09-05T01:35[Censored Hostname] sshd[31205]: Failed password for root from 162.247.74.213 port 55900 ssh2[...] |
2020-09-05 07:39:14 |
| 112.85.42.173 | attackbots | Sep 5 00:40:07 sd-69548 sshd[755217]: Unable to negotiate with 112.85.42.173 port 23352: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Sep 5 01:17:12 sd-69548 sshd[757731]: Unable to negotiate with 112.85.42.173 port 11297: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-09-05 07:20:41 |
| 203.195.205.202 | attack | Time: Sat Sep 5 00:49:56 2020 +0200 IP: 203.195.205.202 (CN/China/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 5 00:38:51 mail-03 sshd[29571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.205.202 user=root Sep 5 00:38:53 mail-03 sshd[29571]: Failed password for root from 203.195.205.202 port 40376 ssh2 Sep 5 00:45:44 mail-03 sshd[29682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.205.202 user=root Sep 5 00:45:45 mail-03 sshd[29682]: Failed password for root from 203.195.205.202 port 36592 ssh2 Sep 5 00:49:54 mail-03 sshd[29742]: Invalid user magno from 203.195.205.202 port 48656 |
2020-09-05 07:36:15 |
| 185.39.11.32 | attack | Fail2Ban Ban Triggered |
2020-09-05 07:35:33 |
| 189.225.191.252 | attack | Honeypot attack, port: 445, PTR: dsl-189-225-191-252-dyn.prod-infinitum.com.mx. |
2020-09-05 07:38:08 |
| 185.153.198.229 | attackbotsspam |
|
2020-09-05 07:33:38 |
| 78.187.211.4 | attackspambots | Honeypot attack, port: 81, PTR: 78.187.211.4.dynamic.ttnet.com.tr. |
2020-09-05 07:42:26 |
| 193.29.15.169 | attackbotsspam | 193.29.15.169 was recorded 8 times by 4 hosts attempting to connect to the following ports: 389,1900,123. Incident counter (4h, 24h, all-time): 8, 17, 4401 |
2020-09-05 07:27:33 |
| 42.82.68.176 | attackspam | Sep 4 18:50:20 mellenthin postfix/smtpd[30950]: NOQUEUE: reject: RCPT from unknown[42.82.68.176]: 554 5.7.1 Service unavailable; Client host [42.82.68.176] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/42.82.68.176 / https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-09-05 07:32:29 |
| 185.200.118.53 | attack | Port Scan: TCP/3128 |
2020-09-05 07:31:27 |
| 139.99.203.12 | attackspambots | (sshd) Failed SSH login from 139.99.203.12 (AU/Australia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 4 15:51:41 server4 sshd[23678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.203.12 user=root Sep 4 15:51:43 server4 sshd[23678]: Failed password for root from 139.99.203.12 port 51122 ssh2 Sep 4 15:58:58 server4 sshd[28369]: Invalid user bitnami from 139.99.203.12 Sep 4 15:58:58 server4 sshd[28369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.203.12 Sep 4 15:59:00 server4 sshd[28369]: Failed password for invalid user bitnami from 139.99.203.12 port 47564 ssh2 |
2020-09-05 07:23:26 |