城市(city): unknown
省份(region): unknown
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.146.73.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.146.73.10. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 22:57:30 CST 2025
;; MSG SIZE rcvd: 106
Host 10.73.146.150.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 10.73.146.150.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 41.79.93.124 | attack | $f2bV_matches |
2019-06-21 18:59:40 |
| 113.172.21.33 | attackspam | Automatic report - SSH Brute-Force Attack |
2019-06-21 19:09:26 |
| 178.128.79.169 | attackbots | Jun 21 11:21:38 MK-Soft-Root2 sshd\[15030\]: Invalid user test from 178.128.79.169 port 46522 Jun 21 11:21:38 MK-Soft-Root2 sshd\[15030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.79.169 Jun 21 11:21:39 MK-Soft-Root2 sshd\[15030\]: Failed password for invalid user test from 178.128.79.169 port 46522 ssh2 ... |
2019-06-21 19:07:47 |
| 42.118.10.118 | attack | TCP port 445 (SMB) attempt blocked by firewall. [2019-06-21 11:21:08] |
2019-06-21 18:58:56 |
| 108.59.8.70 | attackbotsspam | Automatic report - Web App Attack |
2019-06-21 19:28:59 |
| 23.27.127.139 | attack | firewall-block, port(s): 60001/tcp |
2019-06-21 19:38:35 |
| 216.243.31.2 | attack | Jun 21 10:07:38 DDOS Attack: SRC=216.243.31.2 DST=[Masked] LEN=40 TOS=0x08 PREC=0x60 TTL=46 DF PROTO=TCP SPT=55735 DPT=80 WINDOW=0 RES=0x00 RST URGP=0 |
2019-06-21 19:31:32 |
| 40.124.4.131 | attack | Jun 21 12:31:54 Ubuntu-1404-trusty-64-minimal sshd\[21535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.124.4.131 user=root Jun 21 12:31:56 Ubuntu-1404-trusty-64-minimal sshd\[21535\]: Failed password for root from 40.124.4.131 port 54774 ssh2 Jun 21 12:43:51 Ubuntu-1404-trusty-64-minimal sshd\[29969\]: Invalid user hadoop from 40.124.4.131 Jun 21 12:43:51 Ubuntu-1404-trusty-64-minimal sshd\[29969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.124.4.131 Jun 21 12:43:53 Ubuntu-1404-trusty-64-minimal sshd\[29969\]: Failed password for invalid user hadoop from 40.124.4.131 port 34476 ssh2 |
2019-06-21 19:41:42 |
| 192.236.179.222 | attackspambots | Lines containing failures of 192.236.179.222 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=192.236.179.222 |
2019-06-21 19:01:15 |
| 152.243.150.31 | attackspambots | Jun 21 12:19:53 srv-4 sshd\[10252\]: Invalid user admin from 152.243.150.31 Jun 21 12:19:53 srv-4 sshd\[10252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.243.150.31 Jun 21 12:19:55 srv-4 sshd\[10252\]: Failed password for invalid user admin from 152.243.150.31 port 34104 ssh2 ... |
2019-06-21 19:38:58 |
| 113.10.152.199 | attack | Jun 21 09:42:23 localhost sshd\[87125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.10.152.199 user=root Jun 21 09:42:25 localhost sshd\[87125\]: Failed password for root from 113.10.152.199 port 50891 ssh2 Jun 21 09:42:27 localhost sshd\[87125\]: Failed password for root from 113.10.152.199 port 50891 ssh2 Jun 21 09:42:30 localhost sshd\[87125\]: Failed password for root from 113.10.152.199 port 50891 ssh2 Jun 21 09:42:32 localhost sshd\[87125\]: Failed password for root from 113.10.152.199 port 50891 ssh2 ... |
2019-06-21 19:06:37 |
| 95.130.9.90 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.130.9.90 user=root Failed password for root from 95.130.9.90 port 44608 ssh2 Failed password for root from 95.130.9.90 port 44608 ssh2 Failed password for root from 95.130.9.90 port 44608 ssh2 Failed password for root from 95.130.9.90 port 44608 ssh2 |
2019-06-21 19:20:36 |
| 123.16.4.152 | attackspam | Automatic report - SSH Brute-Force Attack |
2019-06-21 19:06:54 |
| 122.49.28.45 | attack | port scan and connect, tcp 80 (http) |
2019-06-21 19:02:40 |
| 185.131.191.77 | attack | port scan and connect, tcp 8080 (http-proxy) |
2019-06-21 19:32:44 |