城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.40.194.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;16.40.194.81. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:42:10 CST 2025
;; MSG SIZE rcvd: 105
Host 81.194.40.16.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 81.194.40.16.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 5.188.210.242 | attackspambots | Automatic report - Banned IP Access |
2020-06-01 21:08:57 |
| 222.186.30.218 | attackbotsspam | Jun 1 15:13:24 home sshd[14357]: Failed password for root from 222.186.30.218 port 11228 ssh2 Jun 1 15:13:33 home sshd[14380]: Failed password for root from 222.186.30.218 port 50155 ssh2 ... |
2020-06-01 21:14:24 |
| 139.209.149.116 | attack | Mon Jun 1 10:53:11 2020 [pid 15801] CONNECT: Client "139.209.149.116" Mon Jun 1 10:53:12 2020 [pid 15800] [anonymous] FAIL LOGIN: Client "139.209.149.116" Mon Jun 1 10:53:15 2020 [pid 15803] CONNECT: Client "139.209.149.116" Mon Jun 1 10:53:16 2020 [pid 15802] [www] FAIL LOGIN: Client "139.209.149.116" Mon Jun 1 10:53:19 2020 [pid 15805] CONNECT: Client "139.209.149.116" ... |
2020-06-01 21:00:39 |
| 106.12.202.192 | attackbotsspam | May 31 18:26:50 serwer sshd\[14731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.192 user=root May 31 18:26:52 serwer sshd\[14731\]: Failed password for root from 106.12.202.192 port 38376 ssh2 May 31 18:28:34 serwer sshd\[14853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.192 user=root May 31 18:28:36 serwer sshd\[14853\]: Failed password for root from 106.12.202.192 port 49278 ssh2 May 31 18:29:44 serwer sshd\[14924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.192 user=root May 31 18:29:46 serwer sshd\[14924\]: Failed password for root from 106.12.202.192 port 56846 ssh2 May 31 18:30:51 serwer sshd\[15097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.192 user=root May 31 18:30:54 serwer sshd\[15097\]: Failed password for root from 106.12.202.192 ... |
2020-06-01 21:13:00 |
| 165.22.31.24 | attackspambots | Automatic report - Banned IP Access |
2020-06-01 21:28:22 |
| 192.241.197.141 | attackspambots | $f2bV_matches |
2020-06-01 21:14:51 |
| 37.148.212.15 | attackspam | Automatic report - WordPress Brute Force |
2020-06-01 21:39:43 |
| 118.24.13.248 | attackspam | Jun 1 15:05:13 server sshd[23837]: Failed password for root from 118.24.13.248 port 38650 ssh2 Jun 1 15:06:53 server sshd[25623]: Failed password for root from 118.24.13.248 port 55846 ssh2 Jun 1 15:10:13 server sshd[29433]: Failed password for root from 118.24.13.248 port 33776 ssh2 |
2020-06-01 21:25:40 |
| 138.68.148.177 | attack | Jun 1 07:15:28 server1 sshd\[27987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177 user=root Jun 1 07:15:30 server1 sshd\[27987\]: Failed password for root from 138.68.148.177 port 38160 ssh2 Jun 1 07:19:24 server1 sshd\[29510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177 user=root Jun 1 07:19:27 server1 sshd\[29510\]: Failed password for root from 138.68.148.177 port 43786 ssh2 Jun 1 07:23:31 server1 sshd\[30683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.148.177 user=root ... |
2020-06-01 21:41:04 |
| 101.100.131.115 | attackspam | 2020-03-13 10:12:47 H=\(101-100-131-115.myrepublic.co.nz\) \[101.100.131.115\]:60096 I=\[193.107.88.166\]:25 F=\ |
2020-06-01 21:03:40 |
| 1.55.195.153 | attackbots | 2019-07-06 15:46:54 1hjl1f-0000bQ-JV SMTP connection from \(\[1.55.195.153\]\) \[1.55.195.153\]:2819 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 15:47:39 1hjl2Q-0000cE-8U SMTP connection from \(\[1.55.195.153\]\) \[1.55.195.153\]:22102 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 15:48:10 1hjl2s-0000d2-B3 SMTP connection from \(\[1.55.195.153\]\) \[1.55.195.153\]:8113 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-06-01 21:18:19 |
| 118.24.19.111 | attack | Multiple web server 500 error code (Internal Error). |
2020-06-01 21:23:31 |
| 27.72.195.145 | attackbots | Jun 1 14:06:30 server sshd[28866]: Failed password for root from 27.72.195.145 port 19502 ssh2 Jun 1 14:09:27 server sshd[32251]: Failed password for root from 27.72.195.145 port 20793 ssh2 Jun 1 14:12:53 server sshd[3466]: Failed password for root from 27.72.195.145 port 13379 ssh2 |
2020-06-01 21:24:06 |
| 123.207.19.105 | attack | Jun 1 12:26:30 zn008 sshd[31493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.19.105 user=r.r Jun 1 12:26:32 zn008 sshd[31493]: Failed password for r.r from 123.207.19.105 port 45648 ssh2 Jun 1 12:26:32 zn008 sshd[31493]: Received disconnect from 123.207.19.105: 11: Bye Bye [preauth] Jun 1 12:28:52 zn008 sshd[31527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.19.105 user=r.r Jun 1 12:28:54 zn008 sshd[31527]: Failed password for r.r from 123.207.19.105 port 40682 ssh2 Jun 1 12:28:55 zn008 sshd[31527]: Received disconnect from 123.207.19.105: 11: Bye Bye [preauth] Jun 1 12:30:28 zn008 sshd[31910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.19.105 user=r.r Jun 1 12:30:30 zn008 sshd[31910]: Failed password for r.r from 123.207.19.105 port 56086 ssh2 Jun 1 12:30:30 zn008 sshd[31910]: Received disconnect from........ ------------------------------- |
2020-06-01 21:43:43 |
| 18.188.102.240 | attackbotsspam | mue-Direct access to plugin not allowed |
2020-06-01 21:02:59 |