城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.199.42.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.199.42.148. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 13:28:27 CST 2025
;; MSG SIZE rcvd: 107
148.42.199.149.in-addr.arpa domain name pointer unknown-42-148.xilinx.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
148.42.199.149.in-addr.arpa name = unknown-42-148.xilinx.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 212.87.9.155 | attackspam | Invalid user globalflash from 212.87.9.155 port 32910 |
2019-09-01 10:37:46 |
| 31.170.12.17 | attackspam | WordPress XMLRPC scan :: 31.170.12.17 0.148 BYPASS [01/Sep/2019:07:48:04 1000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-09-01 10:40:04 |
| 54.36.108.162 | attack | 2019-08-11T09:56:48.240768wiz-ks3 sshd[16066]: Invalid user amx from 54.36.108.162 port 39747 2019-08-11T09:56:48.242858wiz-ks3 sshd[16066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3112521.ip-54-36-108.eu 2019-08-11T09:56:48.240768wiz-ks3 sshd[16066]: Invalid user amx from 54.36.108.162 port 39747 2019-08-11T09:56:50.492083wiz-ks3 sshd[16066]: Failed password for invalid user amx from 54.36.108.162 port 39747 ssh2 2019-08-11T09:56:48.242858wiz-ks3 sshd[16066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3112521.ip-54-36-108.eu 2019-08-11T09:56:48.240768wiz-ks3 sshd[16066]: Invalid user amx from 54.36.108.162 port 39747 2019-08-11T09:56:50.492083wiz-ks3 sshd[16066]: Failed password for invalid user amx from 54.36.108.162 port 39747 ssh2 2019-08-11T09:56:52.748778wiz-ks3 sshd[16066]: Failed password for invalid user amx from 54.36.108.162 port 39747 ssh2 2019-08-11T09:56:59.561250wiz-ks3 sshd[16068]: Invalid user adm |
2019-09-01 10:41:04 |
| 202.88.241.107 | attack | 2019-08-23T18:32:59.758657wiz-ks3 sshd[5668]: Invalid user cforziati from 202.88.241.107 port 40318 2019-08-23T18:32:59.760676wiz-ks3 sshd[5668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.241.107 2019-08-23T18:32:59.758657wiz-ks3 sshd[5668]: Invalid user cforziati from 202.88.241.107 port 40318 2019-08-23T18:33:02.039409wiz-ks3 sshd[5668]: Failed password for invalid user cforziati from 202.88.241.107 port 40318 ssh2 2019-08-23T18:39:01.785003wiz-ks3 sshd[5760]: Invalid user interalt from 202.88.241.107 port 55618 2019-08-23T18:39:01.786989wiz-ks3 sshd[5760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.241.107 2019-08-23T18:39:01.785003wiz-ks3 sshd[5760]: Invalid user interalt from 202.88.241.107 port 55618 2019-08-23T18:39:04.093891wiz-ks3 sshd[5760]: Failed password for invalid user interalt from 202.88.241.107 port 55618 ssh2 2019-08-23T18:46:12.159126wiz-ks3 sshd[5921]: Invalid user cardini from 202.88. |
2019-09-01 10:10:32 |
| 167.114.2.28 | attackbots | $f2bV_matches |
2019-09-01 10:19:47 |
| 51.254.33.188 | attackspam | Aug 31 23:48:07 dedicated sshd[8788]: Invalid user horst from 51.254.33.188 port 56634 |
2019-09-01 10:32:45 |
| 151.51.129.87 | attackspambots | kp-sea2-01 recorded 2 login violations from 151.51.129.87 and was blocked at 2019-09-01 02:24:30. 151.51.129.87 has been blocked on 0 previous occasions. 151.51.129.87's first attempt was recorded at 2019-09-01 02:24:30 |
2019-09-01 10:27:00 |
| 104.236.124.249 | attackbots | Aug 31 19:51:01 ny01 sshd[14127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.249 Aug 31 19:51:03 ny01 sshd[14127]: Failed password for invalid user cafe from 104.236.124.249 port 49896 ssh2 Aug 31 19:55:06 ny01 sshd[15176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.249 |
2019-09-01 09:59:56 |
| 218.150.220.198 | attack | Sep 1 03:45:22 XXX sshd[20133]: Invalid user ofsaa from 218.150.220.198 port 34832 |
2019-09-01 10:06:03 |
| 159.89.166.50 | attack | Sep 1 01:46:29 mail sshd\[32150\]: Invalid user sabrina from 159.89.166.50 port 38194 Sep 1 01:46:29 mail sshd\[32150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.166.50 Sep 1 01:46:31 mail sshd\[32150\]: Failed password for invalid user sabrina from 159.89.166.50 port 38194 ssh2 Sep 1 01:52:22 mail sshd\[544\]: Invalid user multparts from 159.89.166.50 port 54558 Sep 1 01:52:22 mail sshd\[544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.166.50 |
2019-09-01 10:30:52 |
| 123.207.140.248 | attackspam | Sep 1 01:55:37 * sshd[7347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.140.248 Sep 1 01:55:39 * sshd[7347]: Failed password for invalid user jmail from 123.207.140.248 port 36779 ssh2 |
2019-09-01 10:40:38 |
| 148.103.8.13 | attackbots | 19/8/31@17:48:55: FAIL: Alarm-Intrusion address from=148.103.8.13 ... |
2019-09-01 10:06:30 |
| 58.250.161.97 | attackbots | Sep 1 07:19:26 lcl-usvr-02 sshd[1476]: Invalid user r00t from 58.250.161.97 port 47384 Sep 1 07:19:26 lcl-usvr-02 sshd[1476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.161.97 Sep 1 07:19:26 lcl-usvr-02 sshd[1476]: Invalid user r00t from 58.250.161.97 port 47384 Sep 1 07:19:27 lcl-usvr-02 sshd[1476]: Failed password for invalid user r00t from 58.250.161.97 port 47384 ssh2 Sep 1 07:24:40 lcl-usvr-02 sshd[2783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.161.97 user=root Sep 1 07:24:42 lcl-usvr-02 sshd[2783]: Failed password for root from 58.250.161.97 port 3257 ssh2 ... |
2019-09-01 10:24:32 |
| 112.30.185.8 | attackbots | " " |
2019-09-01 10:37:28 |
| 138.197.180.16 | attack | Sep 1 04:24:58 root sshd[25098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.16 Sep 1 04:25:00 root sshd[25098]: Failed password for invalid user test from 138.197.180.16 port 39254 ssh2 Sep 1 04:30:37 root sshd[25161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.16 ... |
2019-09-01 10:39:09 |