城市(city): unknown
省份(region): unknown
国家(country): Brazil
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.21.160.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26173
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;189.21.160.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 23:17:01 CST 2025
;; MSG SIZE rcvd: 107
164.160.21.189.in-addr.arpa domain name pointer 189-21-160-164.ded.intelignet.com.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
164.160.21.189.in-addr.arpa name = 189-21-160-164.ded.intelignet.com.br.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 67.225.224.62 | attackbots | Jun 28 14:12:56 xxxxx postfix/smtpd[2028]: disconnect from unknown[67.225.224.62] ehlo=1 auth=0/1 commands=1/2 Jun 28 14:12:59 xxxxx postfix/smtpd[2028]: disconnect from unknown[67.225.224.62] ehlo=1 auth=0/1 commands=1/2 Jun 28 14:13:02 xxxxx postfix/smtpd[2028]: disconnect from unknown[67.225.224.62] ehlo=1 auth=0/1 commands=1/2 Jun 28 14:13:08 xxxxx postfix/smtpd[2028]: disconnect from unknown[67.225.224.62] ehlo=1 auth=0/1 commands=1/2 Jun 28 14:13:11 xxxxx postfix/smtpd[2028]: disconnect from unknown[67.225.224.62] ehlo=1 auth=0/1 commands=1/2 |
2020-06-28 22:37:43 |
| 200.37.197.132 | attack | Jun 28 16:29:08 [host] sshd[32552]: Invalid user p Jun 28 16:29:08 [host] sshd[32552]: pam_unix(sshd: Jun 28 16:29:11 [host] sshd[32552]: Failed passwor |
2020-06-28 22:37:16 |
| 85.209.0.102 | attackbots | Jun 29 00:16:29 localhost sshd[933670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.102 user=root Jun 29 00:16:31 localhost sshd[933670]: Failed password for root from 85.209.0.102 port 3472 ssh2 Jun 29 00:16:31 localhost sshd[933670]: Connection closed by authenticating user root 85.209.0.102 port 3472 [preauth] ... |
2020-06-28 22:56:22 |
| 176.74.124.234 | attackspambots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-06-28 22:40:22 |
| 52.172.216.220 | attackspam | 2020-06-28T15:56:51.388918ks3355764 sshd[9443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.216.220 user=root 2020-06-28T15:56:53.648583ks3355764 sshd[9443]: Failed password for root from 52.172.216.220 port 38703 ssh2 ... |
2020-06-28 22:44:33 |
| 218.92.0.253 | attackbotsspam | Jun 28 16:25:55 OPSO sshd\[2786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.253 user=root Jun 28 16:25:57 OPSO sshd\[2786\]: Failed password for root from 218.92.0.253 port 49948 ssh2 Jun 28 16:26:00 OPSO sshd\[2786\]: Failed password for root from 218.92.0.253 port 49948 ssh2 Jun 28 16:26:04 OPSO sshd\[2786\]: Failed password for root from 218.92.0.253 port 49948 ssh2 Jun 28 16:26:07 OPSO sshd\[2786\]: Failed password for root from 218.92.0.253 port 49948 ssh2 |
2020-06-28 22:34:04 |
| 191.191.100.177 | attack | Invalid user bkpuser from 191.191.100.177 port 58555 sshd[3847197]: pam_unix(sshd:auth): check pass; user unknown 403 Jun 21 14:35:40 sshd[3847197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.191.100.177 404 Jun 21 14:35:42 sshd[3847197]: Failed password for invalid user bkpuser from 191.191.100.177 port 58555 ssh2 405 Jun 21 14:35:43 sshd[3847197]: Received disconnect from 191.191.100.177 port 58555:11: Bye Bye [preauth] 406 Jun 21 14:35:43 sshd[3847197]: Disconnected from invalid user bkpuser 191.191.100.177 port 58555 [preauth] |
2020-06-28 22:55:08 |
| 41.249.250.209 | attack | 2020-06-28T12:57:31.584394shield sshd\[4195\]: Invalid user jxl from 41.249.250.209 port 37680 2020-06-28T12:57:31.588914shield sshd\[4195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.249.250.209 2020-06-28T12:57:33.788581shield sshd\[4195\]: Failed password for invalid user jxl from 41.249.250.209 port 37680 ssh2 2020-06-28T13:01:00.720307shield sshd\[5457\]: Invalid user popeye from 41.249.250.209 port 36372 2020-06-28T13:01:00.724716shield sshd\[5457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.249.250.209 |
2020-06-28 22:46:33 |
| 43.248.126.124 | attack | Jun 28 10:08:53 ny01 sshd[29827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.126.124 Jun 28 10:08:55 ny01 sshd[29827]: Failed password for invalid user admin from 43.248.126.124 port 48440 ssh2 Jun 28 10:12:42 ny01 sshd[30291]: Failed password for root from 43.248.126.124 port 58602 ssh2 |
2020-06-28 22:23:08 |
| 189.113.140.212 | attack | Port probing on unauthorized port 2323 |
2020-06-28 22:57:33 |
| 128.199.106.169 | attackspambots | Jun 28 16:16:19 sip sshd[782764]: Invalid user tk from 128.199.106.169 port 50316 Jun 28 16:16:22 sip sshd[782764]: Failed password for invalid user tk from 128.199.106.169 port 50316 ssh2 Jun 28 16:20:04 sip sshd[782780]: Invalid user khalid from 128.199.106.169 port 48704 ... |
2020-06-28 22:29:31 |
| 172.245.10.86 | attackspambots |
|
2020-06-28 22:54:22 |
| 197.249.236.47 | attack | /xmlrpc.php As always with Mozambique |
2020-06-28 22:51:59 |
| 129.211.124.29 | attack | (sshd) Failed SSH login from 129.211.124.29 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 28 14:55:10 s1 sshd[19019]: Invalid user pia from 129.211.124.29 port 33430 Jun 28 14:55:11 s1 sshd[19019]: Failed password for invalid user pia from 129.211.124.29 port 33430 ssh2 Jun 28 15:08:33 s1 sshd[20930]: Invalid user vadmin from 129.211.124.29 port 58352 Jun 28 15:08:35 s1 sshd[20930]: Failed password for invalid user vadmin from 129.211.124.29 port 58352 ssh2 Jun 28 15:13:19 s1 sshd[21333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.124.29 user=root |
2020-06-28 22:24:14 |
| 138.121.120.91 | attack | 2020-06-28T08:11:10.253370na-vps210223 sshd[13338]: Invalid user test from 138.121.120.91 port 54426 2020-06-28T08:11:10.256596na-vps210223 sshd[13338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.120.91 2020-06-28T08:11:10.253370na-vps210223 sshd[13338]: Invalid user test from 138.121.120.91 port 54426 2020-06-28T08:11:12.340489na-vps210223 sshd[13338]: Failed password for invalid user test from 138.121.120.91 port 54426 ssh2 2020-06-28T08:13:16.376645na-vps210223 sshd[19310]: Invalid user admin from 138.121.120.91 port 41129 ... |
2020-06-28 22:31:55 |