城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.61.253.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;180.61.253.214. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 14:55:16 CST 2025
;; MSG SIZE rcvd: 107
Host 214.253.61.180.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 214.253.61.180.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 179.49.119.67 | attackbotsspam | Mar 31 05:53:45 debian-2gb-nbg1-2 kernel: \[7885879.691234\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=179.49.119.67 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=50 ID=0 DF PROTO=TCP SPT=80 DPT=56915 WINDOW=14600 RES=0x00 ACK SYN URGP=0 |
2020-03-31 13:50:54 |
| 45.12.161.31 | attackspambots | 2020-03-31T07:07:29.647899v22018076590370373 sshd[22444]: Failed password for root from 45.12.161.31 port 45796 ssh2 2020-03-31T07:11:29.597690v22018076590370373 sshd[1964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.12.161.31 user=root 2020-03-31T07:11:31.283129v22018076590370373 sshd[1964]: Failed password for root from 45.12.161.31 port 60294 ssh2 2020-03-31T07:15:56.480479v22018076590370373 sshd[26123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.12.161.31 user=root 2020-03-31T07:15:58.487007v22018076590370373 sshd[26123]: Failed password for root from 45.12.161.31 port 46560 ssh2 ... |
2020-03-31 13:32:59 |
| 129.28.188.115 | attackbots | 03/31/2020-00:00:38.680466 129.28.188.115 Protocol: 6 ET SCAN Potential SSH Scan |
2020-03-31 13:40:22 |
| 186.185.231.18 | attackbots | IP address logged by my Netflix account after the individual hacked into and locked me out of my account. Individual also changed my account settings to the most expensive plan, which allows multiple people (profiles) to watch, and several profiles were added. The name on my account was changed to "Juan". I contacted Netflix to have my account restored, so I was able to see the various IP addresses used. I will report all of them as well. |
2020-03-31 13:51:29 |
| 206.189.202.165 | attackspam | Mar 31 07:47:09 jane sshd[30699]: Failed password for root from 206.189.202.165 port 32800 ssh2 ... |
2020-03-31 13:53:41 |
| 217.112.142.173 | attackspambots | Mar 31 05:41:49 mail.srvfarm.net postfix/smtpd[380628]: NOQUEUE: reject: RCPT from unknown[217.112.142.173]: 450 4.1.8 |
2020-03-31 13:34:57 |
| 106.12.14.130 | attack | Mar 31 05:43:35 vserver sshd\[21716\]: Invalid user xgues from 106.12.14.130Mar 31 05:43:37 vserver sshd\[21716\]: Failed password for invalid user xgues from 106.12.14.130 port 35050 ssh2Mar 31 05:48:33 vserver sshd\[21760\]: Failed password for root from 106.12.14.130 port 39064 ssh2Mar 31 05:53:30 vserver sshd\[21779\]: Failed password for root from 106.12.14.130 port 43078 ssh2 ... |
2020-03-31 14:01:53 |
| 175.24.72.144 | attack | Mar 31 06:39:12 haigwepa sshd[31927]: Failed password for mysql from 175.24.72.144 port 58818 ssh2 ... |
2020-03-31 14:07:59 |
| 217.112.142.196 | attackbotsspam | Mar 31 05:46:14 mail.srvfarm.net postfix/smtpd[382811]: NOQUEUE: reject: RCPT from unknown[217.112.142.196]: 450 4.1.8 |
2020-03-31 13:34:30 |
| 212.237.33.112 | attackbotsspam | $f2bV_matches |
2020-03-31 13:55:03 |
| 189.69.116.172 | attackbots | Mar 30 18:39:06 hanapaa sshd\[1285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189-69-116-172.dsl.telesp.net.br user=root Mar 30 18:39:08 hanapaa sshd\[1285\]: Failed password for root from 189.69.116.172 port 39874 ssh2 Mar 30 18:45:24 hanapaa sshd\[1766\]: Invalid user student from 189.69.116.172 Mar 30 18:45:24 hanapaa sshd\[1766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189-69-116-172.dsl.telesp.net.br Mar 30 18:45:26 hanapaa sshd\[1766\]: Failed password for invalid user student from 189.69.116.172 port 47558 ssh2 |
2020-03-31 14:10:40 |
| 134.73.51.12 | attackspam | Mar 31 05:27:16 mail.srvfarm.net postfix/smtpd[361760]: NOQUEUE: reject: RCPT from unknown[134.73.51.12]: 450 4.1.8 |
2020-03-31 13:36:25 |
| 131.221.247.105 | attackspam | Mar 30 20:39:16 server sshd\[25014\]: Failed password for invalid user sandeep from 131.221.247.105 port 56364 ssh2 Mar 31 08:22:22 server sshd\[2497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.247.105 user=root Mar 31 08:22:25 server sshd\[2497\]: Failed password for root from 131.221.247.105 port 57013 ssh2 Mar 31 08:27:54 server sshd\[3895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.247.105 user=root Mar 31 08:27:57 server sshd\[3895\]: Failed password for root from 131.221.247.105 port 40243 ssh2 ... |
2020-03-31 13:31:53 |
| 113.167.96.249 | attackspam | 20/3/30@23:54:15: FAIL: Alarm-Network address from=113.167.96.249 ... |
2020-03-31 13:30:49 |
| 54.39.50.204 | attackspam | 2020-03-29 03:20:38 server sshd[90471]: Failed password for invalid user adrian from 54.39.50.204 port 20806 ssh2 |
2020-03-31 14:03:19 |