城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.47.45.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.47.45.157. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:19:37 CST 2025
;; MSG SIZE rcvd: 106
Host 157.45.47.149.in-addr.arpa not found: 2(SERVFAIL)
server can't find 149.47.45.157.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 165.227.93.144 | attack | Invalid user 1234 from 165.227.93.144 port 49248 |
2019-10-19 05:33:48 |
| 177.24.15.137 | attackspambots | Oct 18 21:36:42 iago sshd[31021]: Address 177.24.15.137 maps to ip-177-24-15-137.user.vivozap.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Oct 18 21:36:42 iago sshd[31021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.24.15.137 user=r.r Oct 18 21:36:45 iago sshd[31021]: Failed password for r.r from 177.24.15.137 port 63554 ssh2 Oct 18 21:36:45 iago sshd[31022]: Received disconnect from 177.24.15.137: 11: Bye Bye ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=177.24.15.137 |
2019-10-19 05:29:40 |
| 222.180.168.38 | attack | Oct 18 23:09:22 andromeda postfix/smtpd\[19669\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:24 andromeda postfix/smtpd\[19669\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:28 andromeda postfix/smtpd\[25199\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:48 andromeda postfix/smtpd\[25199\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:54 andromeda postfix/smtpd\[29621\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure |
2019-10-19 05:22:41 |
| 218.197.16.152 | attackbots | Oct 18 22:57:33 MK-Soft-Root1 sshd[12106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.197.16.152 Oct 18 22:57:35 MK-Soft-Root1 sshd[12106]: Failed password for invalid user ashish from 218.197.16.152 port 47320 ssh2 ... |
2019-10-19 05:02:24 |
| 89.248.168.51 | attackbots | 10/18/2019-21:52:09.944912 89.248.168.51 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-19 05:10:30 |
| 5.196.225.45 | attack | Oct 18 23:15:42 vps01 sshd[13495]: Failed password for root from 5.196.225.45 port 55066 ssh2 |
2019-10-19 05:32:41 |
| 77.42.105.196 | attack | Automatic report - Port Scan Attack |
2019-10-19 05:17:44 |
| 68.183.236.92 | attackspambots | Oct 18 22:57:02 markkoudstaal sshd[15723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92 Oct 18 22:57:04 markkoudstaal sshd[15723]: Failed password for invalid user distcache from 68.183.236.92 port 35000 ssh2 Oct 18 23:01:41 markkoudstaal sshd[16137]: Failed password for root from 68.183.236.92 port 46770 ssh2 |
2019-10-19 05:07:36 |
| 118.121.204.109 | attackspam | Oct 18 22:36:20 server sshd\[8978\]: Invalid user wordpress from 118.121.204.109 Oct 18 22:36:20 server sshd\[8978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.121.204.109 Oct 18 22:36:21 server sshd\[8978\]: Failed password for invalid user wordpress from 118.121.204.109 port 46533 ssh2 Oct 18 22:51:32 server sshd\[12973\]: Invalid user cang from 118.121.204.109 Oct 18 22:51:32 server sshd\[12973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.121.204.109 ... |
2019-10-19 05:36:25 |
| 46.38.144.57 | attack | Brute Force attack - banned by Fail2Ban |
2019-10-19 05:10:47 |
| 81.22.45.190 | attackbots | Oct 18 22:40:47 mc1 kernel: \[2717610.328538\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=7949 PROTO=TCP SPT=42732 DPT=15310 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 18 22:41:44 mc1 kernel: \[2717667.258627\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=21745 PROTO=TCP SPT=42732 DPT=15430 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 18 22:44:08 mc1 kernel: \[2717811.239601\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=47263 PROTO=TCP SPT=42732 DPT=15168 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-10-19 05:04:53 |
| 60.250.23.105 | attackbots | $f2bV_matches |
2019-10-19 05:02:11 |
| 187.189.126.118 | attackspam | " " |
2019-10-19 05:35:36 |
| 119.251.90.45 | attack | Telnet Server BruteForce Attack |
2019-10-19 05:14:50 |
| 185.42.170.203 | attackspam | Oct 18 21:51:17 rotator sshd\[2154\]: Failed password for root from 185.42.170.203 port 1782 ssh2Oct 18 21:51:20 rotator sshd\[2154\]: Failed password for root from 185.42.170.203 port 1782 ssh2Oct 18 21:51:22 rotator sshd\[2154\]: Failed password for root from 185.42.170.203 port 1782 ssh2Oct 18 21:51:25 rotator sshd\[2154\]: Failed password for root from 185.42.170.203 port 1782 ssh2Oct 18 21:51:28 rotator sshd\[2154\]: Failed password for root from 185.42.170.203 port 1782 ssh2Oct 18 21:51:32 rotator sshd\[2154\]: Failed password for root from 185.42.170.203 port 1782 ssh2 ... |
2019-10-19 05:31:52 |