城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.1.49.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.1.49.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 12:06:30 CST 2025
;; MSG SIZE rcvd: 105
Host 242.49.1.158.in-addr.arpa not found: 2(SERVFAIL)
server can't find 158.1.49.242.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 207.46.13.189 | attackbots | Automatic report - Banned IP Access |
2019-10-20 19:20:46 |
| 106.52.102.190 | attackbotsspam | Oct 19 21:10:15 sachi sshd\[18260\]: Invalid user P4SS@2020 from 106.52.102.190 Oct 19 21:10:15 sachi sshd\[18260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.102.190 Oct 19 21:10:17 sachi sshd\[18260\]: Failed password for invalid user P4SS@2020 from 106.52.102.190 port 59566 ssh2 Oct 19 21:16:23 sachi sshd\[18726\]: Invalid user fackQQ from 106.52.102.190 Oct 19 21:16:23 sachi sshd\[18726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.102.190 |
2019-10-20 19:08:00 |
| 212.156.173.125 | attack | Automatic report - Banned IP Access |
2019-10-20 19:33:16 |
| 103.14.96.241 | attackspambots | Oct 20 12:41:10 ms-srv sshd[7173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.96.241 user=root Oct 20 12:41:11 ms-srv sshd[7173]: Failed password for invalid user root from 103.14.96.241 port 37992 ssh2 |
2019-10-20 19:43:45 |
| 13.80.112.16 | attackspambots | Oct 20 07:01:15 www sshd\[12159\]: Failed password for root from 13.80.112.16 port 44452 ssh2Oct 20 07:08:39 www sshd\[12461\]: Invalid user upload from 13.80.112.16Oct 20 07:08:41 www sshd\[12461\]: Failed password for invalid user upload from 13.80.112.16 port 50382 ssh2 ... |
2019-10-20 19:45:47 |
| 144.217.166.92 | attackbotsspam | Oct 19 19:09:03 php1 sshd\[25126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.166.92 user=root Oct 19 19:09:05 php1 sshd\[25126\]: Failed password for root from 144.217.166.92 port 52370 ssh2 Oct 19 19:13:03 php1 sshd\[25438\]: Invalid user th from 144.217.166.92 Oct 19 19:13:03 php1 sshd\[25438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.166.92 Oct 19 19:13:06 php1 sshd\[25438\]: Failed password for invalid user th from 144.217.166.92 port 43817 ssh2 |
2019-10-20 19:15:41 |
| 95.86.32.4 | attack | Mail sent to address hacked/leaked from atari.st |
2019-10-20 19:11:29 |
| 83.249.145.81 | attackspam | Oct 20 05:45:59 tux-35-217 sshd\[7668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.249.145.81 user=root Oct 20 05:46:00 tux-35-217 sshd\[7668\]: Failed password for root from 83.249.145.81 port 52602 ssh2 Oct 20 05:46:02 tux-35-217 sshd\[7668\]: Failed password for root from 83.249.145.81 port 52602 ssh2 Oct 20 05:46:04 tux-35-217 sshd\[7668\]: Failed password for root from 83.249.145.81 port 52602 ssh2 ... |
2019-10-20 19:12:07 |
| 54.36.172.105 | attackspambots | Invalid user audreym from 54.36.172.105 port 50576 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.172.105 Failed password for invalid user audreym from 54.36.172.105 port 50576 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.172.105 user=root Failed password for root from 54.36.172.105 port 42016 ssh2 |
2019-10-20 19:15:07 |
| 202.157.176.95 | attack | Oct 16 18:02:30 eola sshd[18281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.157.176.95 user=r.r Oct 16 18:02:31 eola sshd[18281]: Failed password for r.r from 202.157.176.95 port 54980 ssh2 Oct 16 18:02:32 eola sshd[18281]: Received disconnect from 202.157.176.95 port 54980:11: Bye Bye [preauth] Oct 16 18:02:32 eola sshd[18281]: Disconnected from 202.157.176.95 port 54980 [preauth] Oct 16 18:15:01 eola sshd[18639]: Invalid user jules from 202.157.176.95 port 41101 Oct 16 18:15:01 eola sshd[18639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.157.176.95 Oct 16 18:15:03 eola sshd[18639]: Failed password for invalid user jules from 202.157.176.95 port 41101 ssh2 Oct 16 18:15:03 eola sshd[18639]: Received disconnect from 202.157.176.95 port 41101:11: Bye Bye [preauth] Oct 16 18:15:03 eola sshd[18639]: Disconnected from 202.157.176.95 port 41101 [preauth] Oct 16 18:19:21 eola s........ ------------------------------- |
2019-10-20 19:40:34 |
| 106.12.17.43 | attack | Invalid user chandru from 106.12.17.43 port 37336 |
2019-10-20 19:32:37 |
| 167.99.74.119 | attackbots | C1,WP GET /chicken-house2018/wp-login.php |
2019-10-20 19:29:54 |
| 79.12.166.141 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/79.12.166.141/ IT - 1H : (90) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : IT NAME ASN : ASN3269 IP : 79.12.166.141 CIDR : 79.12.0.0/15 PREFIX COUNT : 550 UNIQUE IP COUNT : 19507712 ATTACKS DETECTED ASN3269 : 1H - 3 3H - 6 6H - 10 12H - 21 24H - 42 DateTime : 2019-10-20 05:44:52 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-20 19:46:44 |
| 139.99.76.120 | attack | Oct 16 19:21:16 localhost postfix/smtpd[2773]: disconnect from unknown[139.99.76.120] ehlo=1 auth=0/1 quhostname=1 commands=2/3 Oct 16 19:50:45 localhost postfix/smtpd[10820]: disconnect from unknown[139.99.76.120] ehlo=1 auth=0/1 quhostname=1 commands=2/3 Oct 16 19:51:08 localhost postfix/smtpd[10820]: disconnect from unknown[139.99.76.120] ehlo=1 auth=0/1 quhostname=1 commands=2/3 Oct 16 19:51:25 localhost postfix/smtpd[10820]: disconnect from unknown[139.99.76.120] ehlo=1 auth=0/1 quhostname=1 commands=2/3 Oct 16 20:23:21 localhost postfix/smtpd[18930]: disconnect from unknown[139.99.76.120] ehlo=1 auth=0/1 quhostname=1 commands=2/3 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=139.99.76.120 |
2019-10-20 19:44:45 |
| 212.48.93.183 | attackspam | Sat, 19 Oct 2019 16:15:58 -0400 Received: from blue3011.server-cp.com ([212.48.93.183]:52227 helo=mail2.universalmedia365.com) From: "Andrew Palmer" |
2019-10-20 19:10:56 |