城市(city): unknown
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.220.149.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;154.220.149.81. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 03:41:56 CST 2025
;; MSG SIZE rcvd: 107
Host 81.149.220.154.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 81.149.220.154.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 123.205.104.16 | attack | 9527/tcp 9001/tcp... [2019-10-18/11-19]10pkt,2pt.(tcp) |
2019-11-20 07:53:51 |
| 122.51.116.169 | attackspambots | Nov 20 00:51:31 pkdns2 sshd\[51925\]: Invalid user aaguirre from 122.51.116.169Nov 20 00:51:33 pkdns2 sshd\[51925\]: Failed password for invalid user aaguirre from 122.51.116.169 port 27112 ssh2Nov 20 00:55:39 pkdns2 sshd\[52091\]: Invalid user resve from 122.51.116.169Nov 20 00:55:41 pkdns2 sshd\[52091\]: Failed password for invalid user resve from 122.51.116.169 port 16601 ssh2Nov 20 00:59:43 pkdns2 sshd\[52223\]: Invalid user test from 122.51.116.169Nov 20 00:59:45 pkdns2 sshd\[52223\]: Failed password for invalid user test from 122.51.116.169 port 62571 ssh2 ... |
2019-11-20 07:57:55 |
| 185.176.27.2 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2019-11-20 08:01:27 |
| 106.53.90.75 | attackbots | 2019-11-19T23:14:18.027266abusebot-6.cloudsearch.cf sshd\[24812\]: Invalid user fvial from 106.53.90.75 port 54762 |
2019-11-20 07:39:16 |
| 51.255.109.164 | attackbots | attempt to hack xmlrpc.php on wordpress site |
2019-11-20 07:51:48 |
| 45.116.113.180 | attack | 2019-11-19T23:54:27.904252ns386461 sshd\[16496\]: Invalid user nfs from 45.116.113.180 port 44024 2019-11-19T23:54:27.908724ns386461 sshd\[16496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.116.113.180 2019-11-19T23:54:29.578581ns386461 sshd\[16496\]: Failed password for invalid user nfs from 45.116.113.180 port 44024 ssh2 2019-11-20T00:18:40.333528ns386461 sshd\[5555\]: Invalid user server from 45.116.113.180 port 36616 2019-11-20T00:18:40.338535ns386461 sshd\[5555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.116.113.180 ... |
2019-11-20 07:52:24 |
| 68.183.48.172 | attack | Nov 19 13:37:54 php1 sshd\[25464\]: Invalid user aud from 68.183.48.172 Nov 19 13:37:54 php1 sshd\[25464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172 Nov 19 13:37:56 php1 sshd\[25464\]: Failed password for invalid user aud from 68.183.48.172 port 39163 ssh2 Nov 19 13:41:48 php1 sshd\[25891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172 user=root Nov 19 13:41:50 php1 sshd\[25891\]: Failed password for root from 68.183.48.172 port 57272 ssh2 |
2019-11-20 07:52:07 |
| 216.10.249.73 | attack | Invalid user selenite from 216.10.249.73 port 38280 |
2019-11-20 07:48:45 |
| 85.30.68.194 | attackbots | Brute force attempt |
2019-11-20 08:07:52 |
| 188.149.150.120 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/188.149.150.120/ SE - 1H : (31) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : SE NAME ASN : ASN202116 IP : 188.149.150.120 CIDR : 188.149.0.0/16 PREFIX COUNT : 99 UNIQUE IP COUNT : 1217024 ATTACKS DETECTED ASN202116 : 1H - 1 3H - 2 6H - 2 12H - 2 24H - 4 DateTime : 2019-11-19 22:11:23 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-20 08:04:36 |
| 31.171.138.33 | attackbots | IDS |
2019-11-20 08:02:04 |
| 165.22.193.16 | attack | Nov 19 22:11:54 v22018086721571380 sshd[4414]: Failed password for invalid user ljudmilla from 165.22.193.16 port 46074 ssh2 Nov 19 23:13:25 v22018086721571380 sshd[7276]: Failed password for invalid user carbray from 165.22.193.16 port 44594 ssh2 |
2019-11-20 07:39:00 |
| 107.175.214.83 | attackbotsspam | 1433/tcp 445/tcp... [2019-09-18/11-19]14pkt,2pt.(tcp) |
2019-11-20 08:05:07 |
| 180.150.177.120 | attack | Brute-force attempt banned |
2019-11-20 07:50:52 |
| 101.68.70.14 | attack | Nov 19 13:00:47 web9 sshd\[3690\]: Invalid user ubnt from 101.68.70.14 Nov 19 13:00:47 web9 sshd\[3690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.70.14 Nov 19 13:00:49 web9 sshd\[3690\]: Failed password for invalid user ubnt from 101.68.70.14 port 41243 ssh2 Nov 19 13:10:16 web9 sshd\[4840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.70.14 user=mysql Nov 19 13:10:18 web9 sshd\[4840\]: Failed password for mysql from 101.68.70.14 port 37871 ssh2 |
2019-11-20 07:43:51 |