城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.149.141.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.149.141.198. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:47:26 CST 2025
;; MSG SIZE rcvd: 107
Host 198.141.149.18.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 198.141.149.18.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 217.144.54.144 | attack | Unauthorized connection attempt from IP address 217.144.54.144 on Port 445(SMB) |
2020-06-02 03:01:24 |
| 62.60.194.243 | attackspam | Unauthorized connection attempt from IP address 62.60.194.243 on Port 445(SMB) |
2020-06-02 03:13:08 |
| 117.4.31.86 | attack | Unauthorized connection attempt from IP address 117.4.31.86 on Port 445(SMB) |
2020-06-02 03:15:03 |
| 187.174.255.114 | attack | Unauthorized connection attempt from IP address 187.174.255.114 on Port 445(SMB) |
2020-06-02 03:32:38 |
| 49.235.91.145 | attackbotsspam | Jun 1 11:58:25 ns3033917 sshd[5861]: Failed password for root from 49.235.91.145 port 48956 ssh2 Jun 1 12:03:11 ns3033917 sshd[5908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.91.145 user=root Jun 1 12:03:12 ns3033917 sshd[5908]: Failed password for root from 49.235.91.145 port 42088 ssh2 ... |
2020-06-02 03:18:55 |
| 125.119.35.127 | attackbots | Lines containing failures of 125.119.35.127 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=125.119.35.127 |
2020-06-02 03:00:36 |
| 31.208.233.27 | attack | Ended TCP connection 192.168.0.22 23, 31.208.233.27 34162 Ended TCP connection 192.168.0.22 23, 31.208.233.27 34224 Ended TCP connection 192.168.0.22 23, 31.208.233.27 34259 Ended TCP connection 192.168.0.22 23, 31.208.233.27 34323 Ended TCP connection 192.168.0.22 23, 31.208.233.27 34490 Ended TCP connection 192.168.0.22 23, 31.208.233.27 34528 Ended TCP connection 192.168.0.22 23, 31.208.233.27 34601 Ended TCP connection 192.168.0.22 23, 31.208.233.27 35279 Ended TCP connection 192.168.0.22 23, 31.208.233.27 35354 Ended TCP connection 192.168.0.22 23, 31.208.233.27 35385 Ended TCP connection 192.168.0.22 23, 31.208.233.27 35407 Ended TCP connection 192.168.0.22 23, 31.208.233.27 35449 Ended TCP connection 192.168.0.22 23, 31.208.233.27 36081 Ended TCP connection 192.168.0.22 23, 31.208.233.27 36408 |
2020-06-02 03:05:35 |
| 23.237.4.26 | attackspambots | [Mon Jun 01 06:02:55.710730 2020] [authz_core:error] [pid 17921:tid 140175572813568] [client 23.237.4.26:17242] AH01630: client denied by server configuration: /home/vestibte/public_html/PreventFalls.com/ [Mon Jun 01 06:02:55.716179 2020] [authz_core:error] [pid 17921:tid 140175572813568] [client 23.237.4.26:17242] AH01630: client denied by server configuration: /home/vestibte/public_rsrc/ErrDocs/error.php [Mon Jun 01 06:02:56.079765 2020] [authz_core:error] [pid 17921:tid 140175409653504] [client 23.237.4.26:42374] AH01630: client denied by server configuration: /home/vestibte/public_html/PreventFalls.com/ ... |
2020-06-02 03:36:25 |
| 213.142.156.248 | attackbots | [01/Jun/2020 x@x [01/Jun/2020 x@x [01/Jun/2020 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=213.142.156.248 |
2020-06-02 03:02:57 |
| 95.172.50.199 | attackspambots | port scan and connect, tcp 23 (telnet) |
2020-06-02 03:15:26 |
| 51.75.19.45 | attackbots | Jun 1 18:09:07 vmd17057 sshd[29679]: Failed password for root from 51.75.19.45 port 32980 ssh2 ... |
2020-06-02 03:08:58 |
| 118.107.139.181 | attack | Unauthorized connection attempt from IP address 118.107.139.181 on Port 445(SMB) |
2020-06-02 03:29:28 |
| 94.141.121.111 | attackspambots | Unauthorized connection attempt from IP address 94.141.121.111 on Port 445(SMB) |
2020-06-02 03:12:47 |
| 106.54.191.247 | attack | (sshd) Failed SSH login from 106.54.191.247 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 1 17:05:52 amsweb01 sshd[2595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.191.247 user=root Jun 1 17:05:54 amsweb01 sshd[2595]: Failed password for root from 106.54.191.247 port 40000 ssh2 Jun 1 17:19:02 amsweb01 sshd[4906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.191.247 user=root Jun 1 17:19:04 amsweb01 sshd[4906]: Failed password for root from 106.54.191.247 port 42626 ssh2 Jun 1 17:22:37 amsweb01 sshd[5838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.191.247 user=root |
2020-06-02 03:31:46 |
| 49.206.2.146 | attack | Unauthorized connection attempt from IP address 49.206.2.146 on Port 445(SMB) |
2020-06-02 03:38:15 |