城市(city): Kwai Chung
省份(region): Kwai Tsing New Territories
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.1.6.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54033
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;166.1.6.8. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026022600 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 26 16:15:30 CST 2026
;; MSG SIZE rcvd: 102
Host 8.6.1.166.in-addr.arpa not found: 2(SERVFAIL)
server can't find 166.1.6.8.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.211.116.102 | attack | Oct 27 07:39:20 server sshd\[18288\]: User root from 80.211.116.102 not allowed because listed in DenyUsers Oct 27 07:39:20 server sshd\[18288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.116.102 user=root Oct 27 07:39:22 server sshd\[18288\]: Failed password for invalid user root from 80.211.116.102 port 56972 ssh2 Oct 27 07:43:10 server sshd\[14318\]: User root from 80.211.116.102 not allowed because listed in DenyUsers Oct 27 07:43:10 server sshd\[14318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.116.102 user=root |
2019-10-27 13:53:02 |
| 46.101.249.232 | attackbotsspam | web-1 [ssh] SSH Attack |
2019-10-27 13:44:43 |
| 88.252.83.61 | attackbots | Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb. |
2019-10-27 14:03:30 |
| 13.235.150.69 | attack | 2019-10-27T04:40:13.202508abusebot-7.cloudsearch.cf sshd\[27869\]: Invalid user liverpoo from 13.235.150.69 port 48570 |
2019-10-27 13:19:05 |
| 42.157.129.158 | attackbotsspam | 2019-10-27T05:00:30.093431abusebot-8.cloudsearch.cf sshd\[8276\]: Invalid user web5 from 42.157.129.158 port 38978 |
2019-10-27 14:04:50 |
| 80.79.179.2 | attack | Oct 27 05:53:05 host sshd[5625]: Invalid user ec2-user from 80.79.179.2 port 51798 ... |
2019-10-27 14:00:32 |
| 159.89.229.244 | attackspam | Oct 26 19:29:02 hpm sshd\[3630\]: Invalid user mserver from 159.89.229.244 Oct 26 19:29:02 hpm sshd\[3630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.229.244 Oct 26 19:29:03 hpm sshd\[3630\]: Failed password for invalid user mserver from 159.89.229.244 port 48330 ssh2 Oct 26 19:33:03 hpm sshd\[3938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.229.244 user=root Oct 26 19:33:05 hpm sshd\[3938\]: Failed password for root from 159.89.229.244 port 57486 ssh2 |
2019-10-27 13:47:45 |
| 113.182.247.128 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/113.182.247.128/ VN - 1H : (24) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : VN NAME ASN : ASN45899 IP : 113.182.247.128 CIDR : 113.182.224.0/19 PREFIX COUNT : 2411 UNIQUE IP COUNT : 7209216 ATTACKS DETECTED ASN45899 : 1H - 1 3H - 1 6H - 1 12H - 3 24H - 5 DateTime : 2019-10-27 04:56:30 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-27 13:24:18 |
| 45.40.251.51 | attackbotsspam | Automatic report - XMLRPC Attack |
2019-10-27 14:07:48 |
| 90.150.234.230 | attackbots | Chat Spam |
2019-10-27 13:18:13 |
| 59.46.112.34 | attackspambots | postfix |
2019-10-27 13:29:07 |
| 103.28.219.171 | attack | Oct 27 05:56:35 www sshd\[185506\]: Invalid user skaner from 103.28.219.171 Oct 27 05:56:35 www sshd\[185506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.219.171 Oct 27 05:56:37 www sshd\[185506\]: Failed password for invalid user skaner from 103.28.219.171 port 39322 ssh2 ... |
2019-10-27 13:20:33 |
| 46.101.63.219 | attackspambots | [munged]::443 46.101.63.219 - - [27/Oct/2019:06:18:05 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 46.101.63.219 - - [27/Oct/2019:06:18:05 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 46.101.63.219 - - [27/Oct/2019:06:18:05 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 46.101.63.219 - - [27/Oct/2019:06:18:05 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 46.101.63.219 - - [27/Oct/2019:06:18:05 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 46.101.63.219 - - [27/Oct/2019:06:18:05 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubun |
2019-10-27 14:01:59 |
| 128.199.242.84 | attack | Oct 27 00:06:28 server sshd\[10704\]: Failed password for invalid user ubuntu from 128.199.242.84 port 38110 ssh2 Oct 27 07:44:07 server sshd\[24913\]: Invalid user usuario from 128.199.242.84 Oct 27 07:44:07 server sshd\[24913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.242.84 Oct 27 07:44:09 server sshd\[24913\]: Failed password for invalid user usuario from 128.199.242.84 port 33200 ssh2 Oct 27 08:52:46 server sshd\[8728\]: Invalid user ubuntu from 128.199.242.84 Oct 27 08:52:46 server sshd\[8728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.242.84 ... |
2019-10-27 13:56:53 |
| 81.22.45.107 | attackspam | Oct 27 06:20:44 mc1 kernel: \[3439978.475644\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=63851 PROTO=TCP SPT=46683 DPT=31158 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 27 06:22:40 mc1 kernel: \[3440094.497536\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=52720 PROTO=TCP SPT=46683 DPT=30977 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 27 06:23:37 mc1 kernel: \[3440152.080174\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=24778 PROTO=TCP SPT=46683 DPT=31488 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-10-27 13:51:24 |