城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.74.149.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.74.149.16. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:21:05 CST 2025
;; MSG SIZE rcvd: 106
16.149.74.148.in-addr.arpa domain name pointer ool-944a9510.dyn.optonline.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
16.149.74.148.in-addr.arpa name = ool-944a9510.dyn.optonline.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.164.242.113 | attackspam | Sep 4 18:50:25 mellenthin postfix/smtpd[32087]: NOQUEUE: reject: RCPT from unknown[122.164.242.113]: 554 5.7.1 Service unavailable; Client host [122.164.242.113] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/122.164.242.113; from= |
2020-09-05 23:12:50 |
| 190.245.193.48 | attack | Sep 5 00:33:23 mxgate1 postfix/postscreen[5429]: CONNECT from [190.245.193.48]:35392 to [176.31.12.44]:25 Sep 5 00:33:23 mxgate1 postfix/dnsblog[5430]: addr 190.245.193.48 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Sep 5 00:33:23 mxgate1 postfix/dnsblog[5430]: addr 190.245.193.48 listed by domain zen.spamhaus.org as 127.0.0.11 Sep 5 00:33:23 mxgate1 postfix/dnsblog[5430]: addr 190.245.193.48 listed by domain zen.spamhaus.org as 127.0.0.4 Sep 5 00:33:23 mxgate1 postfix/dnsblog[5433]: addr 190.245.193.48 listed by domain cbl.abuseat.org as 127.0.0.2 Sep 5 00:33:23 mxgate1 postfix/dnsblog[5431]: addr 190.245.193.48 listed by domain b.barracudacentral.org as 127.0.0.2 Sep 5 00:33:29 mxgate1 postfix/postscreen[5429]: DNSBL rank 5 for [190.245.193.48]:35392 Sep x@x Sep 5 00:33:31 mxgate1 postfix/postscreen[5429]: HANGUP after 1.9 from [190.245.193.48]:35392 in tests after SMTP handshake Sep 5 00:33:31 mxgate1 postfix/postscreen[5429]: DISCONNECT [190.245.193.4........ ------------------------------- |
2020-09-05 23:47:27 |
| 178.207.247.44 | attackspambots | 1599238209 - 09/04/2020 18:50:09 Host: 178.207.247.44/178.207.247.44 Port: 445 TCP Blocked |
2020-09-05 23:33:04 |
| 96.54.228.119 | attack | reported through recidive - multiple failed attempts(SSH) |
2020-09-05 23:38:34 |
| 143.204.194.67 | attackspambots | TCP Port: 443 invalid blocked Listed on zen-spamhaus Client xx.xx.6.14 (164) |
2020-09-05 23:23:25 |
| 45.142.120.117 | attack | Sep 5 17:06:41 v22019058497090703 postfix/smtpd[11398]: warning: unknown[45.142.120.117]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 17:07:19 v22019058497090703 postfix/smtpd[11398]: warning: unknown[45.142.120.117]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 5 17:07:58 v22019058497090703 postfix/smtpd[12838]: warning: unknown[45.142.120.117]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-05 23:09:37 |
| 217.182.205.27 | attackspambots | Sep 5 14:08:49 h1745522 sshd[13663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.205.27 user=root Sep 5 14:08:51 h1745522 sshd[13663]: Failed password for root from 217.182.205.27 port 52554 ssh2 Sep 5 14:12:17 h1745522 sshd[13979]: Invalid user tom from 217.182.205.27 port 57300 Sep 5 14:12:17 h1745522 sshd[13979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.205.27 Sep 5 14:12:17 h1745522 sshd[13979]: Invalid user tom from 217.182.205.27 port 57300 Sep 5 14:12:18 h1745522 sshd[13979]: Failed password for invalid user tom from 217.182.205.27 port 57300 ssh2 Sep 5 14:15:48 h1745522 sshd[14034]: Invalid user nina from 217.182.205.27 port 33816 Sep 5 14:15:48 h1745522 sshd[14034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.205.27 Sep 5 14:15:48 h1745522 sshd[14034]: Invalid user nina from 217.182.205.27 port 33816 Sep 5 14: ... |
2020-09-05 23:20:18 |
| 205.185.127.217 | attack | $f2bV_matches |
2020-09-05 23:16:39 |
| 88.218.17.103 | attackspambots |
|
2020-09-05 23:38:48 |
| 185.250.205.84 | attackbots | firewall-block, port(s): 8752/tcp, 14931/tcp, 14977/tcp, 49788/tcp, 59231/tcp, 64085/tcp |
2020-09-05 23:17:05 |
| 191.234.178.249 | attackbotsspam | (mod_security) mod_security (id:210492) triggered by 191.234.178.249 (BR/Brazil/-): 5 in the last 3600 secs |
2020-09-05 23:14:25 |
| 171.15.17.161 | attackbotsspam | Sep 5 04:13:38 rush sshd[2658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.15.17.161 Sep 5 04:13:41 rush sshd[2658]: Failed password for invalid user zhangyong from 171.15.17.161 port 5502 ssh2 Sep 5 04:17:46 rush sshd[2758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.15.17.161 ... |
2020-09-05 23:34:43 |
| 212.200.118.98 | attackbotsspam | Dovecot Invalid User Login Attempt. |
2020-09-05 23:16:18 |
| 187.189.51.117 | attackbotsspam | 2020-09-05T06:32:30.6241811495-001 sshd[36331]: Failed password for invalid user willy from 187.189.51.117 port 64517 ssh2 2020-09-05T06:36:39.0374281495-001 sshd[36549]: Invalid user jordan from 187.189.51.117 port 14811 2020-09-05T06:36:39.0438751495-001 sshd[36549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-189-51-117.totalplay.net 2020-09-05T06:36:39.0374281495-001 sshd[36549]: Invalid user jordan from 187.189.51.117 port 14811 2020-09-05T06:36:40.7808611495-001 sshd[36549]: Failed password for invalid user jordan from 187.189.51.117 port 14811 ssh2 2020-09-05T06:40:45.4950591495-001 sshd[36738]: Invalid user user from 187.189.51.117 port 21598 ... |
2020-09-05 23:31:37 |
| 200.27.212.22 | attackspambots | Sep 5 06:11:20 ns3033917 sshd[18701]: Invalid user gpadmin from 200.27.212.22 port 49886 Sep 5 06:11:22 ns3033917 sshd[18701]: Failed password for invalid user gpadmin from 200.27.212.22 port 49886 ssh2 Sep 5 06:25:43 ns3033917 sshd[18765]: Invalid user nei from 200.27.212.22 port 49896 ... |
2020-09-05 23:13:16 |