城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.142.129.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19910
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;172.142.129.95. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 15:27:57 CST 2025
;; MSG SIZE rcvd: 107
Host 95.129.142.172.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 95.129.142.172.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 1.202.240.163 | attackspam | Sent packet to closed port: 1433 |
2020-08-09 18:09:59 |
| 51.75.76.201 | attack | Aug 9 07:12:36 server sshd[24787]: Failed password for root from 51.75.76.201 port 36702 ssh2 Aug 9 07:17:03 server sshd[30666]: Failed password for root from 51.75.76.201 port 48202 ssh2 Aug 9 07:21:15 server sshd[3779]: Failed password for root from 51.75.76.201 port 59704 ssh2 |
2020-08-09 17:39:00 |
| 129.211.65.70 | attackbotsspam | $f2bV_matches |
2020-08-09 18:07:59 |
| 197.249.0.20 | attackbots | Repeated RDP login failures. Last user: Backup |
2020-08-09 18:16:23 |
| 112.205.234.102 | attack | 20/8/8@23:48:58: FAIL: Alarm-Intrusion address from=112.205.234.102 ... |
2020-08-09 17:55:20 |
| 2.138.180.9 | attackbots | Telnet Server BruteForce Attack |
2020-08-09 18:00:04 |
| 80.251.219.170 | attack | Aug 3 00:50:24 mailserver sshd[13808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.251.219.170 user=r.r Aug 3 00:50:25 mailserver sshd[13808]: Failed password for r.r from 80.251.219.170 port 59638 ssh2 Aug 3 00:50:26 mailserver sshd[13808]: Received disconnect from 80.251.219.170 port 59638:11: Bye Bye [preauth] Aug 3 00:50:26 mailserver sshd[13808]: Disconnected from 80.251.219.170 port 59638 [preauth] Aug 3 01:01:09 mailserver sshd[14525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.251.219.170 user=r.r Aug 3 01:01:11 mailserver sshd[14525]: Failed password for r.r from 80.251.219.170 port 60046 ssh2 Aug 3 01:01:11 mailserver sshd[14525]: Received disconnect from 80.251.219.170 port 60046:11: Bye Bye [preauth] Aug 3 01:01:11 mailserver sshd[14525]: Disconnected from 80.251.219.170 port 60046 [preauth] Aug 3 01:09:42 mailserver sshd[15196]: pam_unix(sshd:auth): aut........ ------------------------------- |
2020-08-09 17:40:25 |
| 194.42.112.107 | attackbotsspam | Hits on port : 23 |
2020-08-09 17:51:53 |
| 51.178.182.35 | attackbotsspam | Aug 9 11:08:46 roki-contabo sshd\[18368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.182.35 user=root Aug 9 11:08:48 roki-contabo sshd\[18368\]: Failed password for root from 51.178.182.35 port 35212 ssh2 Aug 9 11:23:21 roki-contabo sshd\[18664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.182.35 user=root Aug 9 11:23:23 roki-contabo sshd\[18664\]: Failed password for root from 51.178.182.35 port 56518 ssh2 Aug 9 11:27:07 roki-contabo sshd\[18790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.182.35 user=root ... |
2020-08-09 17:41:15 |
| 177.126.186.146 | attackspam | Sent packet to closed port: 1433 |
2020-08-09 18:09:18 |
| 114.67.241.174 | attack | Bruteforce detected by fail2ban |
2020-08-09 17:58:49 |
| 49.234.96.210 | attackbotsspam | Aug 9 05:35:09 ns382633 sshd\[11384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210 user=root Aug 9 05:35:11 ns382633 sshd\[11384\]: Failed password for root from 49.234.96.210 port 59986 ssh2 Aug 9 05:45:01 ns382633 sshd\[13441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210 user=root Aug 9 05:45:03 ns382633 sshd\[13441\]: Failed password for root from 49.234.96.210 port 42020 ssh2 Aug 9 05:48:31 ns382633 sshd\[14290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210 user=root |
2020-08-09 18:12:13 |
| 58.250.89.46 | attack | 2020-08-09T04:47:34.894312shield sshd\[26021\]: Invalid user yd2008slkui from 58.250.89.46 port 47166 2020-08-09T04:47:34.912162shield sshd\[26021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.89.46 2020-08-09T04:47:36.786714shield sshd\[26021\]: Failed password for invalid user yd2008slkui from 58.250.89.46 port 47166 ssh2 2020-08-09T04:51:36.166819shield sshd\[26673\]: Invalid user pmgradmin from 58.250.89.46 port 44526 2020-08-09T04:51:36.175389shield sshd\[26673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.89.46 |
2020-08-09 17:59:48 |
| 111.229.27.180 | attackbotsspam | Brute-force attempt banned |
2020-08-09 18:15:03 |
| 123.157.78.171 | attackbotsspam | Aug 9 06:50:29 jane sshd[22197]: Failed password for root from 123.157.78.171 port 47692 ssh2 ... |
2020-08-09 17:48:58 |