城市(city): unknown
省份(region): unknown
国家(country): Sweden
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.193.12.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;159.193.12.242. IN A
;; AUTHORITY SECTION:
. 441 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 22:11:51 CST 2022
;; MSG SIZE rcvd: 107
Host 242.12.193.159.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 242.12.193.159.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.244.142.189 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-15 15:00:23 |
| 27.70.153.187 | attackbots | 2019-11-15T06:52:26.020468abusebot-5.cloudsearch.cf sshd\[13562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.70.153.187 user=root |
2019-11-15 14:53:09 |
| 68.183.105.52 | attackbotsspam | Nov 15 07:31:50 arianus sshd\[27185\]: Unable to negotiate with 68.183.105.52 port 48256: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\] ... |
2019-11-15 14:50:39 |
| 104.244.79.222 | attackbots | Automatic report - XMLRPC Attack |
2019-11-15 14:59:51 |
| 185.208.211.144 | attackspam | Nov 15 07:30:34 localhost postfix/smtpd\[10356\]: warning: unknown\[185.208.211.144\]: SASL login authentication failed: UGFzc3dvcmQ6 Nov 15 07:30:42 localhost postfix/smtpd\[10356\]: warning: unknown\[185.208.211.144\]: SASL login authentication failed: UGFzc3dvcmQ6 Nov 15 07:30:55 localhost postfix/smtpd\[10356\]: warning: unknown\[185.208.211.144\]: SASL login authentication failed: UGFzc3dvcmQ6 Nov 15 07:31:12 localhost postfix/smtpd\[10788\]: warning: unknown\[185.208.211.144\]: SASL login authentication failed: UGFzc3dvcmQ6 Nov 15 07:31:21 localhost postfix/smtpd\[10356\]: warning: unknown\[185.208.211.144\]: SASL login authentication failed: UGFzc3dvcmQ6 ... |
2019-11-15 14:55:21 |
| 79.137.73.253 | attack | Nov 15 06:30:47 ws25vmsma01 sshd[168180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.73.253 Nov 15 06:30:49 ws25vmsma01 sshd[168180]: Failed password for invalid user guest from 79.137.73.253 port 50740 ssh2 ... |
2019-11-15 15:07:39 |
| 182.71.108.154 | attackbots | Nov 15 07:19:45 Ubuntu-1404-trusty-64-minimal sshd\[28946\]: Invalid user server from 182.71.108.154 Nov 15 07:19:45 Ubuntu-1404-trusty-64-minimal sshd\[28946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.108.154 Nov 15 07:19:47 Ubuntu-1404-trusty-64-minimal sshd\[28946\]: Failed password for invalid user server from 182.71.108.154 port 55850 ssh2 Nov 15 07:30:41 Ubuntu-1404-trusty-64-minimal sshd\[10224\]: Invalid user guest from 182.71.108.154 Nov 15 07:30:41 Ubuntu-1404-trusty-64-minimal sshd\[10224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.108.154 |
2019-11-15 15:12:58 |
| 201.248.218.225 | attack | Automatic report - Port Scan Attack |
2019-11-15 14:41:29 |
| 202.120.39.132 | attack | 2019-11-15T06:31:40.606366abusebot-2.cloudsearch.cf sshd\[7653\]: Invalid user admin from 202.120.39.132 port 26593 |
2019-11-15 14:41:04 |
| 185.206.224.245 | attackbotsspam | 0,48-10/02 [bc02/m50] PostRequest-Spammer scoring: Dodoma |
2019-11-15 14:55:35 |
| 218.17.185.31 | attack | Nov 15 07:58:02 ns382633 sshd\[10093\]: Invalid user rochella from 218.17.185.31 port 47738 Nov 15 07:58:02 ns382633 sshd\[10093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.185.31 Nov 15 07:58:04 ns382633 sshd\[10093\]: Failed password for invalid user rochella from 218.17.185.31 port 47738 ssh2 Nov 15 08:08:13 ns382633 sshd\[11973\]: Invalid user rochella from 218.17.185.31 port 47994 Nov 15 08:08:13 ns382633 sshd\[11973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.185.31 |
2019-11-15 15:09:43 |
| 212.64.91.66 | attackbots | Nov 14 20:26:27 tdfoods sshd\[15036\]: Invalid user cyrus1 from 212.64.91.66 Nov 14 20:26:27 tdfoods sshd\[15036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.91.66 Nov 14 20:26:30 tdfoods sshd\[15036\]: Failed password for invalid user cyrus1 from 212.64.91.66 port 49376 ssh2 Nov 14 20:31:22 tdfoods sshd\[15396\]: Invalid user bording from 212.64.91.66 Nov 14 20:31:22 tdfoods sshd\[15396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.91.66 |
2019-11-15 14:54:20 |
| 165.22.191.129 | attackspam | www.ft-1848-basketball.de 165.22.191.129 \[15/Nov/2019:05:57:43 +0100\] "POST /wp-login.php HTTP/1.1" 200 2804 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" www.ft-1848-basketball.de 165.22.191.129 \[15/Nov/2019:05:57:44 +0100\] "POST /wp-login.php HTTP/1.1" 200 2781 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" www.ft-1848-basketball.de 165.22.191.129 \[15/Nov/2019:05:57:45 +0100\] "POST /wp-login.php HTTP/1.1" 200 2767 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-11-15 14:27:58 |
| 49.236.192.74 | attackspambots | 2019-11-15T07:20:47.043648tmaserv sshd\[27334\]: Failed password for root from 49.236.192.74 port 44456 ssh2 2019-11-15T08:24:48.385505tmaserv sshd\[30670\]: Invalid user priscella from 49.236.192.74 port 53624 2019-11-15T08:24:48.391316tmaserv sshd\[30670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.192.74 2019-11-15T08:24:50.166577tmaserv sshd\[30670\]: Failed password for invalid user priscella from 49.236.192.74 port 53624 ssh2 2019-11-15T08:29:12.779930tmaserv sshd\[30897\]: Invalid user pcap from 49.236.192.74 port 33530 2019-11-15T08:29:12.786428tmaserv sshd\[30897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.192.74 ... |
2019-11-15 15:02:02 |
| 221.120.189.177 | attackspam | Nov 14 20:26:15 sachi sshd\[18310\]: Invalid user root1234567 from 221.120.189.177 Nov 14 20:26:15 sachi sshd\[18310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.120.189.177 Nov 14 20:26:17 sachi sshd\[18310\]: Failed password for invalid user root1234567 from 221.120.189.177 port 47800 ssh2 Nov 14 20:30:32 sachi sshd\[18682\]: Invalid user passwd from 221.120.189.177 Nov 14 20:30:32 sachi sshd\[18682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.120.189.177 |
2019-11-15 14:53:26 |