城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.144.79.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18128
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.144.79.145. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:22:57 CST 2025
;; MSG SIZE rcvd: 106
145.79.144.18.in-addr.arpa domain name pointer ec2-18-144-79-145.us-west-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.79.144.18.in-addr.arpa name = ec2-18-144-79-145.us-west-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.50.149.13 | attack | Apr 23 01:56:17 georgia postfix/smtpd[3154]: connect from unknown[185.50.149.13] Apr 23 01:56:22 georgia postfix/smtpd[3154]: warning: unknown[185.50.149.13]: SASL LOGIN authentication failed: authentication failure Apr 23 01:56:23 georgia postfix/smtpd[3154]: lost connection after AUTH from unknown[185.50.149.13] Apr 23 01:56:23 georgia postfix/smtpd[3154]: disconnect from unknown[185.50.149.13] ehlo=1 auth=0/1 commands=1/2 Apr 23 01:56:23 georgia postfix/smtpd[3154]: connect from unknown[185.50.149.13] Apr 23 01:56:27 georgia postfix/smtpd[3154]: warning: unknown[185.50.149.13]: SASL LOGIN authentication failed: authentication failure Apr 23 01:56:28 georgia postfix/smtpd[3154]: lost connection after AUTH from unknown[185.50.149.13] Apr 23 01:56:28 georgia postfix/smtpd[3154]: disconnect from unknown[185.50.149.13] ehlo=1 auth=0/1 commands=1/2 Apr 23 01:56:33 georgia postfix/smtpd[3154]: connect from unknown[185.50.149.13] Apr 23 01:56:38 georgia postfix/smtpd[3154]: ........ ------------------------------- |
2020-04-24 03:27:27 |
| 222.186.30.57 | attackbotsspam | 2020-04-23T20:42:16.818707vps751288.ovh.net sshd\[6309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57 user=root 2020-04-23T20:42:19.172937vps751288.ovh.net sshd\[6309\]: Failed password for root from 222.186.30.57 port 42655 ssh2 2020-04-23T20:42:20.850000vps751288.ovh.net sshd\[6309\]: Failed password for root from 222.186.30.57 port 42655 ssh2 2020-04-23T20:42:23.133730vps751288.ovh.net sshd\[6309\]: Failed password for root from 222.186.30.57 port 42655 ssh2 2020-04-23T20:42:25.212341vps751288.ovh.net sshd\[6311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57 user=root |
2020-04-24 02:44:53 |
| 67.205.162.223 | attackspambots | Invalid user admin from 67.205.162.223 port 42720 |
2020-04-24 03:17:20 |
| 41.225.242.27 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-24 02:58:36 |
| 107.6.171.133 | attack | Fail2Ban Ban Triggered |
2020-04-24 03:18:18 |
| 37.187.150.194 | attackspambots | Automated report - ssh fail2ban: Apr 23 20:52:11 Unable to negotiate with 37.187.150.194 port=60426: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 23 20:52:49 Unable to negotiate with 37.187.150.194 port=35492: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 23 20:53:28 Unable to negotiate with 37.187.150.194 port=38790: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Apr 23 20:54:08 Unable to negotiate with 37.187.150.194 port=42088: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] |
2020-04-24 03:18:50 |
| 222.186.173.180 | attackspam | Apr 23 20:41:52 mail sshd[4361]: Failed password for root from 222.186.173.180 port 9852 ssh2 Apr 23 20:42:02 mail sshd[4361]: Failed password for root from 222.186.173.180 port 9852 ssh2 Apr 23 20:42:05 mail sshd[4361]: Failed password for root from 222.186.173.180 port 9852 ssh2 Apr 23 20:42:05 mail sshd[4361]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 9852 ssh2 [preauth] |
2020-04-24 02:54:09 |
| 59.148.173.231 | attackbotsspam | Unauthorized SSH login attempts |
2020-04-24 03:09:47 |
| 186.179.103.107 | attackbots | Apr 23 16:43:58 sshgateway sshd\[16226\]: Invalid user ubuntu from 186.179.103.107 Apr 23 16:43:58 sshgateway sshd\[16226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.179.103.107 Apr 23 16:44:00 sshgateway sshd\[16226\]: Failed password for invalid user ubuntu from 186.179.103.107 port 43759 ssh2 |
2020-04-24 03:13:45 |
| 115.238.129.140 | attack | 24368/tcp 10556/tcp 13080/tcp... [2020-04-21/23]19pkt,7pt.(tcp) |
2020-04-24 02:50:17 |
| 112.185.189.30 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-04-24 02:45:52 |
| 168.61.0.127 | attack | RDP Bruteforce |
2020-04-24 03:14:10 |
| 106.12.93.141 | attackspam | SSH Brute-Force Attack |
2020-04-24 02:55:22 |
| 45.55.38.39 | attackbotsspam | Fail2Ban Ban Triggered |
2020-04-24 02:58:14 |
| 187.157.144.196 | attack | Honeypot attack, port: 445, PTR: customer-187-157-144-196-sta.uninet-ide.com.mx. |
2020-04-24 03:16:37 |