城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.148.51.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63651
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;19.148.51.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 22:48:45 CST 2025
;; MSG SIZE rcvd: 105
Host 21.51.148.19.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.51.148.19.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.77.147.51 | attack | Dec 22 10:37:48 markkoudstaal sshd[32764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.147.51 Dec 22 10:37:50 markkoudstaal sshd[32764]: Failed password for invalid user meyn from 51.77.147.51 port 47470 ssh2 Dec 22 10:43:02 markkoudstaal sshd[730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.147.51 |
2019-12-22 17:53:59 |
| 36.108.170.241 | attack | 2019-12-22T09:06:27.505489shield sshd\[26667\]: Invalid user news from 36.108.170.241 port 33271 2019-12-22T09:06:27.510783shield sshd\[26667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.108.170.241 2019-12-22T09:06:29.751460shield sshd\[26667\]: Failed password for invalid user news from 36.108.170.241 port 33271 ssh2 2019-12-22T09:13:05.361609shield sshd\[29321\]: Invalid user wwwrun from 36.108.170.241 port 57317 2019-12-22T09:13:05.366071shield sshd\[29321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.108.170.241 |
2019-12-22 18:07:04 |
| 194.180.224.152 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services |
2019-12-22 18:00:49 |
| 217.112.142.148 | attackbots | Dec 17 01:20:30 web01 postfix/smtpd[27564]: connect from accept.yobaat.com[217.112.142.148] Dec 17 01:20:30 web01 policyd-spf[28242]: None; identhostnamey=helo; client-ip=217.112.142.148; helo=accept.noinsectssk1.com; envelope-from=x@x Dec 17 01:20:30 web01 policyd-spf[28242]: Pass; identhostnamey=mailfrom; client-ip=217.112.142.148; helo=accept.noinsectssk1.com; envelope-from=x@x Dec x@x Dec 17 01:20:30 web01 postfix/smtpd[27564]: disconnect from accept.yobaat.com[217.112.142.148] Dec 17 01:23:08 web01 postfix/smtpd[28598]: connect from accept.yobaat.com[217.112.142.148] Dec 17 01:23:08 web01 policyd-spf[28670]: None; identhostnamey=helo; client-ip=217.112.142.148; helo=accept.noinsectssk1.com; envelope-from=x@x Dec 17 01:23:08 web01 policyd-spf[28670]: Pass; identhostnamey=mailfrom; client-ip=217.112.142.148; helo=accept.noinsectssk1.com; envelope-from=x@x Dec x@x Dec 17 01:23:09 web01 postfix/smtpd[28598]: disconnect from accept.yobaat.com[217.112.142.148] Dec 17 01:........ ------------------------------- |
2019-12-22 17:54:38 |
| 157.230.133.15 | attackspambots | Too many connections or unauthorized access detected from Arctic banned ip |
2019-12-22 18:12:40 |
| 188.213.49.60 | attackspam | Dec 22 01:49:27 server sshd\[32147\]: Failed password for invalid user admin from 188.213.49.60 port 39238 ssh2 Dec 22 09:18:46 server sshd\[26480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.49.60 user=root Dec 22 09:18:48 server sshd\[26480\]: Failed password for root from 188.213.49.60 port 56456 ssh2 Dec 22 09:27:13 server sshd\[28911\]: Invalid user sim from 188.213.49.60 Dec 22 09:27:13 server sshd\[28911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.49.60 ... |
2019-12-22 17:58:28 |
| 54.37.121.239 | attackbots | schuetzenmusikanten.de 54.37.121.239 [22/Dec/2019:09:15:03 +0100] "POST /wp-login.php HTTP/1.1" 200 6346 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" schuetzenmusikanten.de 54.37.121.239 [22/Dec/2019:09:15:04 +0100] "POST /wp-login.php HTTP/1.1" 200 6316 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-12-22 18:07:19 |
| 218.17.185.31 | attackspam | detected by Fail2Ban |
2019-12-22 18:29:49 |
| 112.221.179.133 | attackbots | Dec 22 13:52:26 areeb-Workstation sshd[626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.221.179.133 Dec 22 13:52:28 areeb-Workstation sshd[626]: Failed password for invalid user lloyd from 112.221.179.133 port 43022 ssh2 ... |
2019-12-22 18:03:33 |
| 106.12.56.151 | attackspam | Dec 17 03:04:19 zimbra sshd[32426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.151 user=r.r Dec 17 03:04:21 zimbra sshd[32426]: Failed password for r.r from 106.12.56.151 port 50112 ssh2 Dec 17 03:04:21 zimbra sshd[32426]: Received disconnect from 106.12.56.151 port 50112:11: Bye Bye [preauth] Dec 17 03:04:21 zimbra sshd[32426]: Disconnected from 106.12.56.151 port 50112 [preauth] Dec 17 08:46:32 zimbra sshd[29504]: Invalid user leiba from 106.12.56.151 Dec 17 08:46:32 zimbra sshd[29504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.151 Dec 17 08:46:35 zimbra sshd[29504]: Failed password for invalid user leiba from 106.12.56.151 port 41540 ssh2 Dec 17 08:46:36 zimbra sshd[29504]: Received disconnect from 106.12.56.151 port 41540:11: Bye Bye [preauth] Dec 17 08:46:36 zimbra sshd[29504]: Disconnected from 106.12.56.151 port 41540 [preauth] Dec 17 08:53:41 zimbra ss........ ------------------------------- |
2019-12-22 18:22:33 |
| 103.236.114.38 | attack | Dec 22 07:27:17 grey postfix/smtpd\[24544\]: NOQUEUE: reject: RCPT from unknown\[103.236.114.38\]: 554 5.7.1 Service unavailable\; Client host \[103.236.114.38\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?103.236.114.38\; from=\ |
2019-12-22 17:53:34 |
| 159.65.8.65 | attackbotsspam | Dec 21 21:17:05 php1 sshd\[17391\]: Invalid user stacey from 159.65.8.65 Dec 21 21:17:05 php1 sshd\[17391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.65 Dec 21 21:17:07 php1 sshd\[17391\]: Failed password for invalid user stacey from 159.65.8.65 port 40028 ssh2 Dec 21 21:23:22 php1 sshd\[18140\]: Invalid user Tarmo from 159.65.8.65 Dec 21 21:23:22 php1 sshd\[18140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.8.65 |
2019-12-22 17:52:14 |
| 218.92.0.172 | attackbots | $f2bV_matches |
2019-12-22 17:58:43 |
| 192.210.189.120 | attackbotsspam | 1576996019 - 12/22/2019 07:26:59 Host: 192.210.189.120/192.210.189.120 Port: 445 TCP Blocked |
2019-12-22 18:11:50 |
| 191.54.165.130 | attack | Dec 22 13:58:41 gw1 sshd[14064]: Failed password for root from 191.54.165.130 port 47279 ssh2 ... |
2019-12-22 17:58:07 |