城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.120.140.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15477
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.120.140.71. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:39:11 CST 2025
;; MSG SIZE rcvd: 106
Host 71.140.120.18.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 71.140.120.18.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 60.48.100.210 | attackbotsspam | Brute-force general attack. |
2020-03-11 14:20:56 |
| 103.247.226.114 | attackbots | TCP src-port=43651 dst-port=25 Listed on dnsbl-sorbs abuseat-org barracuda (Project Honey Pot rated Suspicious & Spammer) (45) |
2020-03-11 15:05:06 |
| 46.35.19.18 | attackspambots | Mar 11 07:47:40 ArkNodeAT sshd\[29225\]: Invalid user robi from 46.35.19.18 Mar 11 07:47:40 ArkNodeAT sshd\[29225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.35.19.18 Mar 11 07:47:42 ArkNodeAT sshd\[29225\]: Failed password for invalid user robi from 46.35.19.18 port 45967 ssh2 |
2020-03-11 15:05:43 |
| 218.3.48.49 | attack | Mar 11 06:56:11 cp sshd[9334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.48.49 Mar 11 06:56:11 cp sshd[9334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.3.48.49 |
2020-03-11 14:26:05 |
| 13.232.66.188 | attackbots | Mar 10 15:37:49 josie sshd[18239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.232.66.188 user=r.r Mar 10 15:37:51 josie sshd[18239]: Failed password for r.r from 13.232.66.188 port 52464 ssh2 Mar 10 15:37:51 josie sshd[18241]: Received disconnect from 13.232.66.188: 11: Bye Bye Mar 10 15:42:32 josie sshd[19141]: Invalid user mapred from 13.232.66.188 Mar 10 15:42:32 josie sshd[19141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.232.66.188 Mar 10 15:42:34 josie sshd[19141]: Failed password for invalid user mapred from 13.232.66.188 port 39592 ssh2 Mar 10 15:42:34 josie sshd[19143]: Received disconnect from 13.232.66.188: 11: Bye Bye Mar 10 15:44:49 josie sshd[19523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.232.66.188 user=r.r Mar 10 15:44:51 josie sshd[19523]: Failed password for r.r from 13.232.66.188 port 52386 ssh2 Mar 10........ ------------------------------- |
2020-03-11 14:54:49 |
| 78.128.113.182 | attack | 15 attempts against mh-mag-login-ban on comet |
2020-03-11 15:04:20 |
| 134.209.109.246 | attackspambots | Mar 11 07:31:07 lnxded63 sshd[11329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.109.246 Mar 11 07:31:07 lnxded63 sshd[11329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.109.246 |
2020-03-11 14:44:46 |
| 51.75.207.61 | attackspambots | Mar 11 06:20:26 v22018086721571380 sshd[18358]: Failed password for invalid user ads3cret from 51.75.207.61 port 57394 ssh2 |
2020-03-11 14:30:22 |
| 213.244.123.182 | attackspam | SSH Authentication Attempts Exceeded |
2020-03-11 14:35:44 |
| 218.92.0.178 | attack | Mar 11 07:47:36 vps647732 sshd[25643]: Failed password for root from 218.92.0.178 port 40870 ssh2 Mar 11 07:47:40 vps647732 sshd[25643]: Failed password for root from 218.92.0.178 port 40870 ssh2 ... |
2020-03-11 14:56:56 |
| 54.39.138.246 | attackbots | Invalid user student from 54.39.138.246 port 34404 |
2020-03-11 15:04:42 |
| 191.179.173.245 | attackspambots | Mar 11 02:57:08 vps46666688 sshd[29518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.179.173.245 Mar 11 02:57:10 vps46666688 sshd[29518]: Failed password for invalid user 1234q from 191.179.173.245 port 57404 ssh2 ... |
2020-03-11 14:36:05 |
| 36.71.239.23 | attackspam | Unauthorized connection attempt detected from IP address 36.71.239.23 to port 445 |
2020-03-11 15:03:37 |
| 218.202.196.182 | attack | Automatic report - Port Scan Attack |
2020-03-11 14:22:10 |
| 45.55.158.8 | attack | Mar 10 23:10:18 firewall sshd[27343]: Failed password for root from 45.55.158.8 port 50678 ssh2 Mar 10 23:11:43 firewall sshd[27368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.158.8 user=root Mar 10 23:11:45 firewall sshd[27368]: Failed password for root from 45.55.158.8 port 45790 ssh2 ... |
2020-03-11 15:03:17 |