城市(city): unknown
省份(region): unknown
国家(country): Lithuania
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.129.230.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1642
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.129.230.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022300 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 22:50:29 CST 2025
;; MSG SIZE rcvd: 107
Host 12.230.129.158.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 12.230.129.158.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.61.81.13 | attack | Unauthorized connection attempt detected from IP address 111.61.81.13 to port 1433 [T] |
2020-01-08 23:50:49 |
| 77.28.23.157 | attackbotsspam | Jan 8 13:43:38 h2421860 postfix/postscreen[19196]: CONNECT from [77.28.23.157]:31477 to [85.214.119.52]:25 Jan 8 13:43:38 h2421860 postfix/dnsblog[19802]: addr 77.28.23.157 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jan 8 13:43:38 h2421860 postfix/dnsblog[19802]: addr 77.28.23.157 listed by domain zen.spamhaus.org as 127.0.0.11 Jan 8 13:43:38 h2421860 postfix/dnsblog[19802]: addr 77.28.23.157 listed by domain zen.spamhaus.org as 127.0.0.4 Jan 8 13:43:38 h2421860 postfix/dnsblog[19802]: addr 77.28.23.157 listed by domain zen.spamhaus.org as 127.0.0.3 Jan 8 13:43:38 h2421860 postfix/dnsblog[19807]: addr 77.28.23.157 listed by domain Unknown.trblspam.com as 185.53.179.7 Jan 8 13:43:38 h2421860 postfix/dnsblog[19804]: addr 77.28.23.157 listed by domain b.barracudacentral.org as 127.0.0.2 Jan 8 13:43:44 h2421860 postfix/postscreen[19196]: DNSBL rank 7 for [77.28.23.157]:31477 Jan x@x Jan 8 13:43:45 h2421860 postfix/postscreen[19196]: HANGUP after 0.75 from [7........ ------------------------------- |
2020-01-08 23:18:13 |
| 27.61.166.184 | attackspambots | Jan 8 13:04:12 unicornsoft sshd\[9684\]: User root from 27.61.166.184 not allowed because not listed in AllowUsers Jan 8 13:04:12 unicornsoft sshd\[9684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.61.166.184 user=root Jan 8 13:04:14 unicornsoft sshd\[9684\]: Failed password for invalid user root from 27.61.166.184 port 12700 ssh2 |
2020-01-08 23:11:01 |
| 103.249.192.35 | attackbots | Unauthorized connection attempt detected from IP address 103.249.192.35 to port 1433 [T] |
2020-01-08 23:52:36 |
| 102.176.246.225 | attack | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-01-08 23:23:29 |
| 186.249.13.146 | attackspambots | Unauthorized connection attempt detected from IP address 186.249.13.146 to port 445 |
2020-01-08 23:30:34 |
| 111.59.31.109 | attackspambots | Unauthorized connection attempt detected from IP address 111.59.31.109 to port 6379 [T] |
2020-01-08 23:51:04 |
| 181.48.139.118 | attackspam | Jan 8 14:03:49 [snip] sshd[8291]: Invalid user ec2-user from 181.48.139.118 port 51078 Jan 8 14:03:49 [snip] sshd[8291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.139.118 Jan 8 14:03:50 [snip] sshd[8291]: Failed password for invalid user ec2-user from 181.48.139.118 port 51078 ssh2[...] |
2020-01-08 23:29:18 |
| 112.85.42.178 | attackbotsspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178 user=root Failed password for root from 112.85.42.178 port 23077 ssh2 Failed password for root from 112.85.42.178 port 23077 ssh2 Failed password for root from 112.85.42.178 port 23077 ssh2 Failed password for root from 112.85.42.178 port 23077 ssh2 |
2020-01-08 23:17:41 |
| 180.123.33.230 | attack | Unauthorized connection attempt detected from IP address 180.123.33.230 to port 8080 [T] |
2020-01-08 23:39:15 |
| 112.243.224.211 | attack | Unauthorized connection attempt detected from IP address 112.243.224.211 to port 23 [T] |
2020-01-08 23:49:04 |
| 112.23.11.213 | attackbotsspam | Unauthorized connection attempt detected from IP address 112.23.11.213 to port 5555 [T] |
2020-01-08 23:50:07 |
| 189.75.48.112 | attackspam | 2020-01-08T14:56:15.014682shield sshd\[11942\]: Invalid user dieakuma from 189.75.48.112 port 45512 2020-01-08T14:56:15.019950shield sshd\[11942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.75.48.112 2020-01-08T14:56:17.539559shield sshd\[11942\]: Failed password for invalid user dieakuma from 189.75.48.112 port 45512 ssh2 2020-01-08T15:02:30.868707shield sshd\[15708\]: Invalid user jboss from 189.75.48.112 port 56736 2020-01-08T15:02:30.875158shield sshd\[15708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.75.48.112 |
2020-01-08 23:12:17 |
| 83.234.218.29 | attackbotsspam | Unauthorized connection attempt detected from IP address 83.234.218.29 to port 23 [T] |
2020-01-08 23:53:29 |
| 221.215.172.26 | attackspam | Unauthorized connection attempt detected from IP address 221.215.172.26 to port 23 [T] |
2020-01-08 23:36:31 |