城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.124.148.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40683
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.124.148.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:58:28 CST 2025
;; MSG SIZE rcvd: 107
Host 50.148.124.158.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 50.148.124.158.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 211.159.218.251 | attackbots | Sep 7 03:35:12 home sshd[1065992]: Failed password for root from 211.159.218.251 port 37876 ssh2 Sep 7 03:37:26 home sshd[1066188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.218.251 user=root Sep 7 03:37:28 home sshd[1066188]: Failed password for root from 211.159.218.251 port 41356 ssh2 Sep 7 03:39:42 home sshd[1066462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.218.251 user=mysql Sep 7 03:39:44 home sshd[1066462]: Failed password for mysql from 211.159.218.251 port 44828 ssh2 ... |
2020-09-07 12:23:54 |
| 140.143.207.57 | attackbotsspam | Sep 6 23:28:38 onepixel sshd[2247016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.207.57 Sep 6 23:28:38 onepixel sshd[2247016]: Invalid user ubuntu from 140.143.207.57 port 42848 Sep 6 23:28:40 onepixel sshd[2247016]: Failed password for invalid user ubuntu from 140.143.207.57 port 42848 ssh2 Sep 6 23:30:16 onepixel sshd[2247296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.207.57 user=root Sep 6 23:30:17 onepixel sshd[2247296]: Failed password for root from 140.143.207.57 port 60512 ssh2 |
2020-09-07 12:19:01 |
| 123.22.212.99 | attack | Brute force attempt |
2020-09-07 12:37:01 |
| 61.133.232.253 | attack | Sep 7 10:35:17 webhost01 sshd[28108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.253 Sep 7 10:35:19 webhost01 sshd[28108]: Failed password for invalid user P@ssw0rd from 61.133.232.253 port 11362 ssh2 ... |
2020-09-07 12:40:34 |
| 117.212.53.111 | attackbotsspam | /wp-login.php |
2020-09-07 13:00:39 |
| 194.180.224.130 | attackspam | $f2bV_matches |
2020-09-07 12:23:14 |
| 222.186.169.192 | attackbots | Sep 7 04:11:09 instance-2 sshd[4347]: Failed password for root from 222.186.169.192 port 30092 ssh2 Sep 7 04:11:12 instance-2 sshd[4347]: Failed password for root from 222.186.169.192 port 30092 ssh2 Sep 7 04:11:16 instance-2 sshd[4347]: Failed password for root from 222.186.169.192 port 30092 ssh2 Sep 7 04:11:20 instance-2 sshd[4347]: Failed password for root from 222.186.169.192 port 30092 ssh2 |
2020-09-07 12:30:09 |
| 217.172.77.106 | attack | Attempts to probe for or exploit a Drupal 7.69 site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb. |
2020-09-07 12:47:03 |
| 171.221.150.182 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-07 13:00:19 |
| 45.95.168.96 | attackspambots | Sep 7 06:44:07 mail postfix/smtpd\[19972\]: warning: unknown\[45.95.168.96\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 7 06:45:10 mail postfix/smtpd\[19972\]: warning: unknown\[45.95.168.96\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 7 06:45:10 mail postfix/smtpd\[20444\]: warning: unknown\[45.95.168.96\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 7 06:45:10 mail postfix/smtpd\[19971\]: warning: unknown\[45.95.168.96\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-09-07 12:53:55 |
| 112.85.42.200 | attackspam | Sep 7 06:20:36 ucs sshd\[10761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200 user=root Sep 7 06:20:38 ucs sshd\[10754\]: error: PAM: User not known to the underlying authentication module for root from 112.85.42.200 Sep 7 06:20:40 ucs sshd\[10764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200 user=root ... |
2020-09-07 12:21:36 |
| 218.245.1.169 | attackbotsspam | Ssh brute force |
2020-09-07 12:57:04 |
| 112.85.42.194 | attackspambots | 2020-09-07T06:15:13.714317snf-827550 sshd[23271]: Failed password for root from 112.85.42.194 port 64839 ssh2 2020-09-07T06:15:15.506625snf-827550 sshd[23271]: Failed password for root from 112.85.42.194 port 64839 ssh2 2020-09-07T06:15:17.600685snf-827550 sshd[23271]: Failed password for root from 112.85.42.194 port 64839 ssh2 ... |
2020-09-07 12:24:57 |
| 2402:3a80:df6:921a:455:b325:7188:abea | attack | Wordpress attack |
2020-09-07 12:40:56 |
| 124.236.22.12 | attackbotsspam | Sep 7 03:20:45 mavik sshd[14540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.236.22.12 user=root Sep 7 03:20:47 mavik sshd[14540]: Failed password for root from 124.236.22.12 port 45982 ssh2 Sep 7 03:24:45 mavik sshd[14673]: Invalid user developer from 124.236.22.12 Sep 7 03:24:45 mavik sshd[14673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.236.22.12 Sep 7 03:24:47 mavik sshd[14673]: Failed password for invalid user developer from 124.236.22.12 port 44604 ssh2 ... |
2020-09-07 12:23:36 |