城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.78.34.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;166.78.34.139. IN A
;; AUTHORITY SECTION:
. 279 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:52:54 CST 2022
;; MSG SIZE rcvd: 106
Host 139.34.78.166.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.34.78.166.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 138.197.158.35 | attack | Jul 5 09:37:47 our-server-hostname postfix/smtpd[14749]: connect from unknown[138.197.158.35] Jul x@x Jul 5 09:37:48 our-server-hostname postfix/smtpd[14749]: lost connection after RCPT from unknown[138.197.158.35] Jul 5 09:37:48 our-server-hostname postfix/smtpd[14749]: disconnect from unknown[138.197.158.35] Jul 5 09:45:08 our-server-hostname postfix/smtpd[22344]: connect from unknown[138.197.158.35] Jul 5 09:45:09 our-server-hostname postfix/smtpd[22344]: NOQUEUE: reject: RCPT from unknown[138.197.158.35]: 554 5.7.1 Service unavailable; Client host [138.197.158.35] blocked using .... truncated .... 4:06 our-server-hostname postfix/smtpd[9351]: lost connection after RCPT from unknown[138.197.158.35] Jul 5 11:44:06 our-server-hostname postfix/smtpd[9351]: disconnect from unknown[138.197.158.35] Jul 5 12:26:44 our-server-hostname postfix/smtpd[29058]: connect from unknown[138.197.158.35] Jul x@x Jul 5 12:26:45 our-server-hostname postfix/smtpd[29058]: lost conn........ ------------------------------- |
2019-07-08 07:44:36 |
| 177.244.2.221 | attack | Jul 7 21:30:34 localhost sshd\[593\]: Invalid user postgres from 177.244.2.221 port 34730 Jul 7 21:30:34 localhost sshd\[593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.244.2.221 Jul 7 21:30:37 localhost sshd\[593\]: Failed password for invalid user postgres from 177.244.2.221 port 34730 ssh2 Jul 7 21:33:13 localhost sshd\[606\]: Invalid user luat from 177.244.2.221 port 60582 |
2019-07-08 07:16:10 |
| 35.198.241.105 | attack | (Jul 8) LEN=40 PREC=0x20 TTL=53 ID=6910 TCP DPT=8080 WINDOW=6452 SYN (Jul 7) LEN=40 TTL=50 ID=47997 TCP DPT=23 WINDOW=27343 SYN (Jul 7) LEN=40 TTL=50 ID=11207 TCP DPT=8080 WINDOW=46503 SYN (Jul 7) LEN=40 PREC=0x20 TTL=51 ID=30531 TCP DPT=8080 WINDOW=57807 SYN (Jul 7) LEN=40 TTL=51 ID=36433 TCP DPT=8080 WINDOW=50202 SYN (Jul 7) LEN=40 TTL=51 ID=35132 TCP DPT=8080 WINDOW=29290 SYN (Jul 7) LEN=40 TTL=50 ID=54992 TCP DPT=8080 WINDOW=42150 SYN (Jul 6) LEN=40 PREC=0x20 TTL=50 ID=34983 TCP DPT=8080 WINDOW=32179 SYN (Jul 6) LEN=40 PREC=0x20 TTL=50 ID=14855 TCP DPT=8080 WINDOW=36263 SYN (Jul 6) LEN=40 PREC=0x20 TTL=53 ID=62780 TCP DPT=23 WINDOW=51426 SYN (Jul 6) LEN=40 TTL=50 ID=53855 TCP DPT=8080 WINDOW=23058 SYN (Jul 6) LEN=40 TTL=50 ID=55774 TCP DPT=8080 WINDOW=15390 SYN (Jul 5) LEN=40 PREC=0x20 TTL=50 ID=54821 TCP DPT=8080 WINDOW=47972 SYN (Jul 5) LEN=40 PREC=0x20 TTL=52 ID=5103 TCP DPT=23 WINDOW=3419 SYN |
2019-07-08 07:32:11 |
| 181.143.69.27 | attack | proto=tcp . spt=45805 . dpt=25 . (listed on Blocklist de Jul 07) (19) |
2019-07-08 07:54:43 |
| 190.109.160.73 | attack | proto=tcp . spt=37711 . dpt=25 . (listed on Blocklist de Jul 07) (20) |
2019-07-08 07:53:56 |
| 117.1.94.200 | attackspam | Caught in portsentry honeypot |
2019-07-08 07:31:20 |
| 77.88.5.49 | attack | EventTime:Mon Jul 8 09:14:29 AEST 2019,Protocol:UDP,VendorEventCode:RT_FLOW_SESSION_DENY,TargetPort:53,SourceIP:77.88.5.49,SourcePort:59591 |
2019-07-08 07:22:07 |
| 212.129.55.152 | attack | Jul 8 01:18:17 server sshd[20130]: Failed password for root from 212.129.55.152 port 7369 ssh2 Jul 8 01:18:17 server sshd[20132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.55.152 ... |
2019-07-08 07:50:49 |
| 93.67.73.188 | attack | Unauthorised access (Jul 7) SRC=93.67.73.188 LEN=44 TTL=54 ID=12428 TCP DPT=8080 WINDOW=55311 SYN Unauthorised access (Jul 7) SRC=93.67.73.188 LEN=44 TTL=54 ID=59368 TCP DPT=8080 WINDOW=15335 SYN Unauthorised access (Jul 6) SRC=93.67.73.188 LEN=44 TTL=54 ID=65527 TCP DPT=8080 WINDOW=15335 SYN Unauthorised access (Jul 6) SRC=93.67.73.188 LEN=44 TTL=54 ID=29931 TCP DPT=8080 WINDOW=55311 SYN Unauthorised access (Jul 6) SRC=93.67.73.188 LEN=44 TTL=54 ID=34643 TCP DPT=8080 WINDOW=55311 SYN Unauthorised access (Jul 4) SRC=93.67.73.188 LEN=44 TTL=54 ID=61252 TCP DPT=8080 WINDOW=15335 SYN Unauthorised access (Jul 4) SRC=93.67.73.188 LEN=44 TTL=54 ID=6967 TCP DPT=8080 WINDOW=55311 SYN Unauthorised access (Jul 4) SRC=93.67.73.188 LEN=44 TTL=54 ID=47662 TCP DPT=8080 WINDOW=55311 SYN Unauthorised access (Jul 3) SRC=93.67.73.188 LEN=44 TTL=54 ID=47578 TCP DPT=8080 WINDOW=55311 SYN |
2019-07-08 07:14:23 |
| 192.99.70.12 | attackbotsspam | Jul 7 21:06:54 lnxmysql61 sshd[2708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.12 Jul 7 21:06:56 lnxmysql61 sshd[2708]: Failed password for invalid user git from 192.99.70.12 port 54510 ssh2 Jul 7 21:08:16 lnxmysql61 sshd[2762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.12 |
2019-07-08 07:09:47 |
| 191.53.249.120 | attack | smtp auth brute force |
2019-07-08 07:17:42 |
| 210.245.51.14 | attack | proto=tcp . spt=52377 . dpt=25 . (listed on Blocklist de Jul 07) (25) |
2019-07-08 07:44:55 |
| 59.133.41.183 | attackspambots | Jul 3 04:13:32 srv01 sshd[23209]: Failed password for r.r from 59.133.41.183 port 59738 ssh2 Jul 3 04:13:37 srv01 sshd[23209]: Failed password for r.r from 59.133.41.183 port 59738 ssh2 Jul 3 04:13:42 srv01 sshd[23209]: Failed password for r.r from 59.133.41.183 port 59738 ssh2 Jul 3 04:13:47 srv01 sshd[23209]: Failed password for r.r from 59.133.41.183 port 59738 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=59.133.41.183 |
2019-07-08 07:53:22 |
| 194.93.39.255 | attackbotsspam | WordPress XMLRPC scan :: 194.93.39.255 4.228 BYPASS [08/Jul/2019:09:14:04 1000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 382 "https://www.[censored_1]/" "PHP/5.2.73" |
2019-07-08 07:47:33 |
| 94.23.145.156 | attackspambots | Blocked range because of multiple attacks in the past. @ 2019-07-08T01:09:30+02:00. |
2019-07-08 07:20:14 |