城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.145.168.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.145.168.27. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 21:46:19 CST 2025
;; MSG SIZE rcvd: 107
Host 27.168.145.149.in-addr.arpa not found: 2(SERVFAIL)
server can't find 149.145.168.27.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
211.228.116.100 | attackspam | Automatic report - Port Scan Attack |
2020-08-23 23:32:30 |
103.205.68.2 | attackbots | Automatic Fail2ban report - Trying login SSH |
2020-08-23 23:09:46 |
18.237.13.107 | attackspambots | Aug 23 14:31:17 home sshd[3721293]: Failed password for invalid user rabbitmq from 18.237.13.107 port 54560 ssh2 Aug 23 14:34:11 home sshd[3722290]: Invalid user sn from 18.237.13.107 port 41214 Aug 23 14:34:11 home sshd[3722290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.237.13.107 Aug 23 14:34:11 home sshd[3722290]: Invalid user sn from 18.237.13.107 port 41214 Aug 23 14:34:12 home sshd[3722290]: Failed password for invalid user sn from 18.237.13.107 port 41214 ssh2 ... |
2020-08-23 23:19:50 |
185.220.101.15 | attackspambots | "$f2bV_matches" |
2020-08-23 23:45:14 |
42.159.228.125 | attack | Aug 23 17:07:50 ns381471 sshd[28828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.228.125 Aug 23 17:07:52 ns381471 sshd[28828]: Failed password for invalid user teamspeak3 from 42.159.228.125 port 24398 ssh2 |
2020-08-23 23:17:17 |
115.212.8.72 | attackbots | Aug 23 17:16:04 srv01 postfix/smtpd\[3286\]: warning: unknown\[115.212.8.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 23 17:16:21 srv01 postfix/smtpd\[3286\]: warning: unknown\[115.212.8.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 23 17:16:38 srv01 postfix/smtpd\[3286\]: warning: unknown\[115.212.8.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 23 17:16:57 srv01 postfix/smtpd\[3286\]: warning: unknown\[115.212.8.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 23 17:17:09 srv01 postfix/smtpd\[3286\]: warning: unknown\[115.212.8.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-08-23 23:39:44 |
49.88.112.112 | attack | August 23 2020, 11:08:15 [sshd] - Banned from the Mad Pony WordPress hosting platform by Fail2ban. |
2020-08-23 23:18:40 |
122.180.246.7 | attackbots | 1598185359 - 08/23/2020 14:22:39 Host: 122.180.246.7/122.180.246.7 Port: 445 TCP Blocked |
2020-08-23 23:15:02 |
212.70.149.4 | attackbots | Rude login attack (270 tries in 1d) |
2020-08-23 23:10:13 |
219.79.201.40 | attack | Aug 23 13:00:43 www sshd[6145]: Failed password for r.r from 219.79.201.40 port 36163 ssh2 Aug 23 13:00:43 www sshd[6145]: Connection closed by 219.79.201.40 [preauth] Aug 23 14:04:35 www sshd[11387]: Invalid user nagios from 219.79.201.40 Aug 23 14:04:37 www sshd[11387]: Failed password for invalid user nagios from 219.79.201.40 port 42873 ssh2 Aug 23 14:04:37 www sshd[11387]: Connection closed by 219.79.201.40 [preauth] Aug 23 14:05:02 www sshd[11482]: Failed password for r.r from 219.79.201.40 port 43149 ssh2 Aug 23 14:05:03 www sshd[11482]: Connection closed by 219.79.201.40 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=219.79.201.40 |
2020-08-23 23:30:37 |
50.2.251.139 | attackspam | Aug 23 14:09:30 mxgate1 postfix/postscreen[19126]: CONNECT from [50.2.251.139]:44597 to [176.31.12.44]:25 Aug 23 14:09:30 mxgate1 postfix/dnsblog[19144]: addr 50.2.251.139 listed by domain zen.spamhaus.org as 127.0.0.3 Aug 23 14:09:30 mxgate1 postfix/dnsblog[19144]: addr 50.2.251.139 listed by domain zen.spamhaus.org as 127.0.0.2 Aug 23 14:09:36 mxgate1 postfix/postscreen[19126]: DNSBL rank 2 for [50.2.251.139]:44597 Aug x@x Aug 23 14:09:36 mxgate1 postfix/postscreen[19126]: DISCONNECT [50.2.251.139]:44597 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=50.2.251.139 |
2020-08-23 23:49:09 |
61.177.172.61 | attackspambots | $f2bV_matches |
2020-08-23 23:34:43 |
106.75.3.59 | attack | Automatic report BANNED IP |
2020-08-23 23:40:14 |
2405:201:5504:9835:e0a7:4ba7:5356:a7e9 | attackbotsspam | C2,WP GET /wp-login.php |
2020-08-23 23:11:07 |
138.197.151.213 | attack | Aug 23 08:50:15 NPSTNNYC01T sshd[17547]: Failed password for root from 138.197.151.213 port 57464 ssh2 Aug 23 08:54:25 NPSTNNYC01T sshd[17930]: Failed password for root from 138.197.151.213 port 38206 ssh2 ... |
2020-08-23 23:37:50 |