城市(city): Montevideo
省份(region): Montevideo
国家(country): Uruguay
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 186.54.142.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46711
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;186.54.142.230. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 05:18:35 CST 2025
;; MSG SIZE rcvd: 107
230.142.54.186.in-addr.arpa domain name pointer r186-54-142-230.dialup.adsl.anteldata.net.uy.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
230.142.54.186.in-addr.arpa name = r186-54-142-230.dialup.adsl.anteldata.net.uy.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.248.80.221 | attackspam | firewall-block, port(s): 20473/tcp |
2020-05-09 05:43:20 |
| 111.67.195.106 | attackbots | May 8 23:46:50 [host] sshd[11463]: Invalid user c May 8 23:46:50 [host] sshd[11463]: pam_unix(sshd: May 8 23:46:52 [host] sshd[11463]: Failed passwor |
2020-05-09 05:54:03 |
| 193.118.53.198 | attack | firewall-block, port(s): 8081/tcp |
2020-05-09 05:35:15 |
| 159.89.164.199 | attackbots | May 8 23:31:04 plex sshd[2882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.164.199 May 8 23:31:04 plex sshd[2882]: Invalid user fileshare from 159.89.164.199 port 45746 May 8 23:31:06 plex sshd[2882]: Failed password for invalid user fileshare from 159.89.164.199 port 45746 ssh2 May 8 23:35:00 plex sshd[3043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.164.199 user=root May 8 23:35:02 plex sshd[3043]: Failed password for root from 159.89.164.199 port 54024 ssh2 |
2020-05-09 05:55:30 |
| 159.65.147.235 | attackspambots | SSH Invalid Login |
2020-05-09 06:00:17 |
| 195.231.4.203 | attackspam | sshd |
2020-05-09 05:58:20 |
| 54.36.150.123 | attack | [Sat May 09 03:50:08.046003 2020] [:error] [pid 6963:tid 139913183377152] [client 54.36.150.123:58972] [client 54.36.150.123] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "AhrefsBot" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-913-SCANNER-DETECTION.conf"] [line "183"] [id "913102"] [msg "Found User-Agent associated with web crawler/bot"] [data "Matched Data: AhrefsBot found within REQUEST_HEADERS:User-Agent: mozilla/5.0 (compatible; ahrefsbot/6.1; +http://ahrefs.com/robot/)"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-reputation-crawler"] [tag "OWASP_CRS"] [tag "OWASP_CRS/AUTOMATION/CRAWLER"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/pelayanan-jasa/868-klimatologi/agroklimatologi/kalender-tanam-katam-terpadu/kalender-ta ... |
2020-05-09 05:48:40 |
| 91.231.113.113 | attack | 2020-05-08T21:04:03.762583shield sshd\[28773\]: Invalid user test from 91.231.113.113 port 46620 2020-05-08T21:04:03.767601shield sshd\[28773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.231.113.113 2020-05-08T21:04:05.213735shield sshd\[28773\]: Failed password for invalid user test from 91.231.113.113 port 46620 ssh2 2020-05-08T21:07:39.864185shield sshd\[29855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.231.113.113 user=root 2020-05-08T21:07:41.962738shield sshd\[29855\]: Failed password for root from 91.231.113.113 port 40744 ssh2 |
2020-05-09 05:39:53 |
| 222.186.31.83 | attackbotsspam | May 9 00:05:16 inter-technics sshd[3570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83 user=root May 9 00:05:18 inter-technics sshd[3570]: Failed password for root from 222.186.31.83 port 29777 ssh2 May 9 00:05:20 inter-technics sshd[3570]: Failed password for root from 222.186.31.83 port 29777 ssh2 May 9 00:05:16 inter-technics sshd[3570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83 user=root May 9 00:05:18 inter-technics sshd[3570]: Failed password for root from 222.186.31.83 port 29777 ssh2 May 9 00:05:20 inter-technics sshd[3570]: Failed password for root from 222.186.31.83 port 29777 ssh2 May 9 00:05:16 inter-technics sshd[3570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83 user=root May 9 00:05:18 inter-technics sshd[3570]: Failed password for root from 222.186.31.83 port 29777 ssh2 May 9 00:05:20 i ... |
2020-05-09 06:09:26 |
| 222.73.134.148 | attack | May 8 22:36:06 xeon sshd[65216]: Failed password for invalid user vncuser from 222.73.134.148 port 44112 ssh2 |
2020-05-09 05:50:17 |
| 140.143.233.133 | attack | 2020-05-08T16:26:33.9628831495-001 sshd[48851]: Invalid user postgres from 140.143.233.133 port 49840 2020-05-08T16:26:33.9658891495-001 sshd[48851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.233.133 2020-05-08T16:26:33.9628831495-001 sshd[48851]: Invalid user postgres from 140.143.233.133 port 49840 2020-05-08T16:26:35.1916371495-001 sshd[48851]: Failed password for invalid user postgres from 140.143.233.133 port 49840 ssh2 2020-05-08T16:32:08.4918931495-001 sshd[49078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.233.133 user=root 2020-05-08T16:32:11.0425551495-001 sshd[49078]: Failed password for root from 140.143.233.133 port 50210 ssh2 ... |
2020-05-09 06:00:46 |
| 112.85.42.181 | attack | 2020-05-08T23:41:44.110031sd-86998 sshd[47833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181 user=root 2020-05-08T23:41:46.619730sd-86998 sshd[47833]: Failed password for root from 112.85.42.181 port 3004 ssh2 2020-05-08T23:41:50.206227sd-86998 sshd[47833]: Failed password for root from 112.85.42.181 port 3004 ssh2 2020-05-08T23:41:44.110031sd-86998 sshd[47833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181 user=root 2020-05-08T23:41:46.619730sd-86998 sshd[47833]: Failed password for root from 112.85.42.181 port 3004 ssh2 2020-05-08T23:41:50.206227sd-86998 sshd[47833]: Failed password for root from 112.85.42.181 port 3004 ssh2 2020-05-08T23:41:44.110031sd-86998 sshd[47833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181 user=root 2020-05-08T23:41:46.619730sd-86998 sshd[47833]: Failed password for root from 112.85.42.1 ... |
2020-05-09 05:59:22 |
| 51.83.98.104 | attackspambots | ... |
2020-05-09 05:51:37 |
| 157.245.133.78 | attack | 157.245.133.78 - - \[08/May/2020:22:49:28 +0200\] "POST /wp-login.php HTTP/1.0" 200 2894 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 157.245.133.78 - - \[08/May/2020:22:49:31 +0200\] "POST /wp-login.php HTTP/1.0" 200 2854 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 157.245.133.78 - - \[08/May/2020:22:49:34 +0200\] "POST /wp-login.php HTTP/1.0" 200 2851 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2020-05-09 06:10:30 |
| 50.70.229.239 | attack | May 8 22:49:54 sso sshd[14324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.70.229.239 May 8 22:49:56 sso sshd[14324]: Failed password for invalid user ariane from 50.70.229.239 port 54412 ssh2 ... |
2020-05-09 05:56:54 |