城市(city): unknown
省份(region): unknown
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.216.130.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;188.216.130.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121502 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 13:43:21 CST 2025
;; MSG SIZE rcvd: 108
150.130.216.188.in-addr.arpa domain name pointer net-188-216-130-150.cust.vodafonedsl.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
150.130.216.188.in-addr.arpa name = net-188-216-130-150.cust.vodafonedsl.it.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 89.133.103.216 | attackspambots | Jul 16 04:50:35 OPSO sshd\[29603\]: Invalid user shop from 89.133.103.216 port 43694 Jul 16 04:50:35 OPSO sshd\[29603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.133.103.216 Jul 16 04:50:37 OPSO sshd\[29603\]: Failed password for invalid user shop from 89.133.103.216 port 43694 ssh2 Jul 16 04:55:25 OPSO sshd\[30252\]: Invalid user daw from 89.133.103.216 port 41568 Jul 16 04:55:25 OPSO sshd\[30252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.133.103.216 |
2019-07-16 11:12:01 |
| 142.93.198.86 | attackspam | Jul 16 04:18:17 Proxmox sshd\[26231\]: Invalid user malcolm from 142.93.198.86 port 34724 Jul 16 04:18:17 Proxmox sshd\[26231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.86 Jul 16 04:18:19 Proxmox sshd\[26231\]: Failed password for invalid user malcolm from 142.93.198.86 port 34724 ssh2 |
2019-07-16 11:29:05 |
| 42.202.34.140 | attack | Sypware Activity |
2019-07-16 11:22:04 |
| 180.250.162.9 | attackbots | Jul 16 04:26:44 tuxlinux sshd[53024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.162.9 user=lp Jul 16 04:26:46 tuxlinux sshd[53024]: Failed password for lp from 180.250.162.9 port 21590 ssh2 Jul 16 04:26:44 tuxlinux sshd[53024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.162.9 user=lp Jul 16 04:26:46 tuxlinux sshd[53024]: Failed password for lp from 180.250.162.9 port 21590 ssh2 ... |
2019-07-16 11:52:23 |
| 106.52.198.75 | attackbotsspam | PHP Injection Attack: High-Risk PHP Function Name Found
Matched phrase "call_user_func" at ARGS:function.
Restricted File Access Attempt
Matched phrase "wp-config.php" at REQUEST_FILENAME.
PHP Injection Attack: Serialized Object Injection
Pattern match "[oOcC]:\\d+:".+?":\\d+:{.*}" at REQUEST_HEADERS:X-Forwarded-For.
SQL Injection Attack Detected via libinjection
Matched Data: sUE1c found within REQUEST_HEADERS:Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:3:{s:2:\x22id\x22;s:3:\x22'/*\x22;s:3:\x22num\x22;s:141:\x22*/ union select 1,0x272F2A,3,4,5,6,7,8,0x7b247b24524345275d3b6469652f2a2a2f286d6435284449524543544f52595f534550415241544f5229293b2f2f7d7d,0--\x22;s:4:\x22name\x22;s:3:\x22ads\x22;}554fcae493e564ee0dc75bdf2ebf94ca |
2019-07-16 11:09:50 |
| 54.38.192.96 | attackspam | Jul 16 05:05:49 SilenceServices sshd[29493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.192.96 Jul 16 05:05:51 SilenceServices sshd[29493]: Failed password for invalid user web2 from 54.38.192.96 port 39668 ssh2 Jul 16 05:10:27 SilenceServices sshd[32420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.192.96 |
2019-07-16 11:16:34 |
| 211.107.220.68 | attackspambots | Jul 16 05:32:39 vps691689 sshd[22780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.107.220.68 Jul 16 05:32:41 vps691689 sshd[22780]: Failed password for invalid user heike from 211.107.220.68 port 41806 ssh2 ... |
2019-07-16 11:44:48 |
| 167.99.200.84 | attack | 2019-07-16T03:06:35.232299abusebot.cloudsearch.cf sshd\[28199\]: Invalid user caroline from 167.99.200.84 port 59214 2019-07-16T03:06:35.236300abusebot.cloudsearch.cf sshd\[28199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.200.84 |
2019-07-16 11:15:08 |
| 142.93.47.125 | attackbotsspam | Jul 16 04:43:10 h2177944 sshd\[30392\]: Failed password for invalid user photo from 142.93.47.125 port 56740 ssh2 Jul 16 05:43:30 h2177944 sshd\[947\]: Invalid user dante from 142.93.47.125 port 39596 Jul 16 05:43:30 h2177944 sshd\[947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.47.125 Jul 16 05:43:32 h2177944 sshd\[947\]: Failed password for invalid user dante from 142.93.47.125 port 39596 ssh2 ... |
2019-07-16 11:47:38 |
| 68.183.219.43 | attackspambots | Jul 14 15:06:14 ingram sshd[31501]: Failed password for sync from 68.183.219.43 port 41548 ssh2 Jul 14 16:57:23 ingram sshd[534]: Invalid user ci from 68.183.219.43 Jul 14 16:57:23 ingram sshd[534]: Failed password for invalid user ci from 68.183.219.43 port 58138 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=68.183.219.43 |
2019-07-16 11:50:16 |
| 49.249.237.226 | attackspam | Automatic report - Banned IP Access |
2019-07-16 11:25:06 |
| 54.37.136.213 | attackbots | Jul 16 03:38:44 mail sshd\[17478\]: Invalid user nathan from 54.37.136.213 Jul 16 03:38:44 mail sshd\[17478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.213 Jul 16 03:38:46 mail sshd\[17478\]: Failed password for invalid user nathan from 54.37.136.213 port 58178 ssh2 ... |
2019-07-16 11:35:07 |
| 62.4.23.104 | attack | Jul 15 23:05:31 vps200512 sshd\[24712\]: Invalid user somebody from 62.4.23.104 Jul 15 23:05:31 vps200512 sshd\[24712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.23.104 Jul 15 23:05:33 vps200512 sshd\[24712\]: Failed password for invalid user somebody from 62.4.23.104 port 46786 ssh2 Jul 15 23:10:17 vps200512 sshd\[24831\]: Invalid user webadmin from 62.4.23.104 Jul 15 23:10:17 vps200512 sshd\[24831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.23.104 |
2019-07-16 11:15:42 |
| 185.137.111.132 | attack | Jul 16 04:26:42 mail postfix/smtpd\[8688\]: warning: unknown\[185.137.111.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 16 04:27:58 mail postfix/smtpd\[9715\]: warning: unknown\[185.137.111.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 16 04:29:14 mail postfix/smtpd\[4133\]: warning: unknown\[185.137.111.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-07-16 11:39:28 |
| 159.65.135.11 | attack | 2019-07-16T09:41:56.379430enmeeting.mahidol.ac.th sshd\[23543\]: Invalid user angel from 159.65.135.11 port 44264 2019-07-16T09:41:56.394337enmeeting.mahidol.ac.th sshd\[23543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.135.11 2019-07-16T09:41:58.841261enmeeting.mahidol.ac.th sshd\[23543\]: Failed password for invalid user angel from 159.65.135.11 port 44264 ssh2 ... |
2019-07-16 11:42:31 |