城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 170.50.139.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;170.50.139.11. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:52:13 CST 2025
;; MSG SIZE rcvd: 106
Host 11.139.50.170.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 11.139.50.170.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 62.173.149.58 | attack | Invalid user ident from 62.173.149.58 port 49958 |
2019-11-13 16:50:39 |
| 163.172.199.18 | attackspam | 163.172.199.18 - - [13/Nov/2019:07:27:27 +0100] "POST /wp-login.php HTTP/1.1" 200 3126 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 163.172.199.18 - - [13/Nov/2019:07:27:27 +0100] "POST /wp-login.php HTTP/1.1" 200 3105 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-11-13 16:40:47 |
| 51.91.66.169 | attackspambots | 51.91.66.169 was recorded 27 times by 27 hosts attempting to connect to the following ports: 26. Incident counter (4h, 24h, all-time): 27, 53, 53 |
2019-11-13 17:16:13 |
| 41.221.168.167 | attack | Nov 13 07:27:17 srv1 sshd[3449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167 Nov 13 07:27:18 srv1 sshd[3449]: Failed password for invalid user abcdefghijklmnopqrstuvwxyz from 41.221.168.167 port 58597 ssh2 ... |
2019-11-13 16:46:01 |
| 182.93.28.186 | attackspam | SMB Server BruteForce Attack |
2019-11-13 16:42:05 |
| 221.203.38.71 | attackbotsspam | The IP address [221.203.38.71] experienced 5 failed attempts when attempting to log into SSH |
2019-11-13 17:14:49 |
| 106.12.54.182 | attackspambots | Nov 13 09:50:36 mout sshd[2634]: Invalid user seymour from 106.12.54.182 port 49740 |
2019-11-13 16:58:32 |
| 142.93.49.202 | attackspam | 2019-11-13T08:48:05.701681abusebot-6.cloudsearch.cf sshd\[26093\]: Invalid user bergel from 142.93.49.202 port 35916 |
2019-11-13 17:08:19 |
| 185.176.27.254 | attackbotsspam | 11/13/2019-04:18:19.937751 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-13 17:18:31 |
| 123.16.139.144 | attack | Automatic report - Port Scan Attack |
2019-11-13 17:00:11 |
| 82.64.30.16 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-13 17:07:48 |
| 104.248.151.112 | attack | 104.248.151.112 - - \[13/Nov/2019:10:02:31 +0100\] "POST /wp-login.php HTTP/1.0" 200 5269 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.248.151.112 - - \[13/Nov/2019:10:02:35 +0100\] "POST /wp-login.php HTTP/1.0" 200 5099 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.248.151.112 - - \[13/Nov/2019:10:02:39 +0100\] "POST /wp-login.php HTTP/1.0" 200 5093 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-11-13 17:04:31 |
| 179.93.249.213 | attack | scan z |
2019-11-13 17:09:33 |
| 45.76.110.63 | attackbotsspam | Nov 12 22:27:18 wbs sshd\[10097\]: Invalid user deasya from 45.76.110.63 Nov 12 22:27:18 wbs sshd\[10097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.110.63 Nov 12 22:27:20 wbs sshd\[10097\]: Failed password for invalid user deasya from 45.76.110.63 port 41654 ssh2 Nov 12 22:31:11 wbs sshd\[10448\]: Invalid user eee from 45.76.110.63 Nov 12 22:31:11 wbs sshd\[10448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.110.63 |
2019-11-13 16:54:50 |
| 202.29.176.21 | attackbotsspam | Nov 12 21:11:02 tdfoods sshd\[31109\]: Invalid user nuc9ntp40 from 202.29.176.21 Nov 12 21:11:02 tdfoods sshd\[31109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.176.21 Nov 12 21:11:05 tdfoods sshd\[31109\]: Failed password for invalid user nuc9ntp40 from 202.29.176.21 port 7267 ssh2 Nov 12 21:15:10 tdfoods sshd\[31461\]: Invalid user swsgest from 202.29.176.21 Nov 12 21:15:10 tdfoods sshd\[31461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.176.21 |
2019-11-13 17:09:11 |