城市(city): unknown
省份(region): unknown
国家(country): Netherlands (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.120.154.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.120.154.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 11:56:00 CST 2025
;; MSG SIZE rcvd: 107
66.154.120.194.in-addr.arpa domain name pointer static.kpn.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.154.120.194.in-addr.arpa name = static.kpn.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 171.246.116.86 | attack | Jan 10 07:46:22 grey postfix/smtpd\[16363\]: NOQUEUE: reject: RCPT from unknown\[171.246.116.86\]: 554 5.7.1 Service unavailable\; Client host \[171.246.116.86\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[171.246.116.86\]\; from=\ |
2020-01-10 19:32:27 |
| 119.40.33.22 | attack | Jan 10 07:28:20 marvibiene sshd[32452]: Invalid user elw from 119.40.33.22 port 56737 Jan 10 07:28:20 marvibiene sshd[32452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.40.33.22 Jan 10 07:28:20 marvibiene sshd[32452]: Invalid user elw from 119.40.33.22 port 56737 Jan 10 07:28:22 marvibiene sshd[32452]: Failed password for invalid user elw from 119.40.33.22 port 56737 ssh2 ... |
2020-01-10 19:42:06 |
| 68.183.31.138 | attackbotsspam | Jan 10 01:18:25 eddieflores sshd\[2683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.31.138 user=root Jan 10 01:18:27 eddieflores sshd\[2683\]: Failed password for root from 68.183.31.138 port 43102 ssh2 Jan 10 01:20:48 eddieflores sshd\[2893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.31.138 user=root Jan 10 01:20:51 eddieflores sshd\[2893\]: Failed password for root from 68.183.31.138 port 39940 ssh2 Jan 10 01:23:17 eddieflores sshd\[3119\]: Invalid user 6888 from 68.183.31.138 |
2020-01-10 19:42:31 |
| 219.139.128.59 | attackspambots | " " |
2020-01-10 19:29:09 |
| 180.166.10.19 | attackbots | 1433/tcp 1433/tcp 1433/tcp... [2019-11-10/2020-01-10]4pkt,1pt.(tcp) |
2020-01-10 19:19:10 |
| 39.164.161.51 | attack | Unauthorized connection attempt detected from IP address 39.164.161.51 to port 1433 [T] |
2020-01-10 19:06:19 |
| 51.83.45.65 | attackspam | Jan 10 11:37:26 ns392434 sshd[11692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.45.65 user=root Jan 10 11:37:29 ns392434 sshd[11692]: Failed password for root from 51.83.45.65 port 57114 ssh2 Jan 10 11:53:54 ns392434 sshd[12300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.45.65 user=root Jan 10 11:53:56 ns392434 sshd[12300]: Failed password for root from 51.83.45.65 port 44150 ssh2 Jan 10 11:56:43 ns392434 sshd[12338]: Invalid user ioz from 51.83.45.65 port 47890 Jan 10 11:56:43 ns392434 sshd[12338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.45.65 Jan 10 11:56:43 ns392434 sshd[12338]: Invalid user ioz from 51.83.45.65 port 47890 Jan 10 11:56:46 ns392434 sshd[12338]: Failed password for invalid user ioz from 51.83.45.65 port 47890 ssh2 Jan 10 11:59:36 ns392434 sshd[12411]: Invalid user admin from 51.83.45.65 port 51634 |
2020-01-10 19:09:01 |
| 110.138.150.152 | attack | 20/1/9@23:48:40: FAIL: Alarm-Network address from=110.138.150.152 ... |
2020-01-10 19:36:10 |
| 159.138.158.15 | spambotsattackproxynormal | spam |
2020-01-10 19:09:22 |
| 41.231.8.188 | attackspambots | Jan 10 11:33:44 grey postfix/smtpd\[25696\]: NOQUEUE: reject: RCPT from unknown\[41.231.8.188\]: 554 5.7.1 Service unavailable\; Client host \[41.231.8.188\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?41.231.8.188\; from=\ |
2020-01-10 19:23:25 |
| 95.9.61.234 | attackbotsspam | 37215/tcp 23/tcp 23/tcp [2019-12-22/2020-01-10]3pkt |
2020-01-10 19:41:40 |
| 14.160.85.230 | attack | 445/tcp 445/tcp 445/tcp... [2019-11-25/2020-01-10]5pkt,1pt.(tcp) |
2020-01-10 19:33:19 |
| 46.17.166.151 | attackspambots | Lines containing failures of 46.17.166.151 Jan 9 02:39:24 srv sshd[240668]: Invalid user ftp from 46.17.166.151 port 48386 Jan 9 02:39:24 srv sshd[240668]: Received disconnect from 46.17.166.151 port 48386:11: Bye Bye [preauth] Jan 9 02:39:24 srv sshd[240668]: Disconnected from invalid user ftp 46.17.166.151 port 48386 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=46.17.166.151 |
2020-01-10 19:32:55 |
| 182.23.1.163 | attackbots | $f2bV_matches |
2020-01-10 19:18:44 |
| 42.159.7.130 | attackbots | SSH bruteforce (Triggered fail2ban) |
2020-01-10 19:07:46 |