城市(city): unknown
省份(region): unknown
国家(country): Ukraine
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.44.45.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64196
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;194.44.45.121. IN A
;; AUTHORITY SECTION:
. 394 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:17:37 CST 2022
;; MSG SIZE rcvd: 106
Host 121.45.44.194.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 121.45.44.194.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 74.82.213.249 | attackspam | Failed password for root from 74.82.213.249 port 56832 ssh2 |
2020-08-11 04:38:58 |
| 51.79.55.141 | attack | Tried sshing with brute force. |
2020-08-11 04:35:07 |
| 113.166.14.121 | attackbotsspam | Unauthorized connection attempt from IP address 113.166.14.121 on Port 445(SMB) |
2020-08-11 04:28:00 |
| 13.79.191.179 | attack | Aug 10 17:27:57 firewall sshd[25488]: Failed password for root from 13.79.191.179 port 49198 ssh2 Aug 10 17:32:01 firewall sshd[25596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.79.191.179 user=root Aug 10 17:32:03 firewall sshd[25596]: Failed password for root from 13.79.191.179 port 60930 ssh2 ... |
2020-08-11 04:45:50 |
| 76.14.133.76 | attackspambots | Port scan on 1 port(s): 22 |
2020-08-11 04:49:35 |
| 198.136.63.29 | attackspam | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-11 04:25:41 |
| 195.54.160.38 | attack | firewall-block, port(s): 3854/tcp, 5632/tcp, 5914/tcp, 8838/tcp, 9925/tcp, 9935/tcp, 10774/tcp, 11485/tcp, 12642/tcp, 14460/tcp, 16000/tcp, 16866/tcp, 16870/tcp, 19964/tcp, 20808/tcp, 21026/tcp, 21034/tcp, 21315/tcp, 21326/tcp, 21358/tcp, 21857/tcp, 21869/tcp, 22046/tcp, 22649/tcp, 22865/tcp, 23285/tcp, 23457/tcp, 24076/tcp, 24161/tcp, 27877/tcp, 28636/tcp, 32128/tcp, 32951/tcp, 36145/tcp, 37032/tcp, 38021/tcp, 38186/tcp, 38241/tcp, 39167/tcp, 39221/tcp, 39677/tcp, 39836/tcp, 42314/tcp, 42425/tcp, 43804/tcp, 45450/tcp, 45712/tcp, 46142/tcp, 46285/tcp, 46289/tcp, 46602/tcp, 47126/tcp, 47130/tcp, 51414/tcp, 52572/tcp, 52609/tcp, 53379/tcp, 53391/tcp, 54138/tcp, 55175/tcp, 55183/tcp, 55199/tcp, 55785/tcp, 58471/tcp, 58479/tcp, 58666/tcp, 59505/tcp, 61241/tcp, 64374/tcp |
2020-08-11 04:30:35 |
| 183.82.4.69 | attackspambots | Unauthorized connection attempt from IP address 183.82.4.69 on Port 445(SMB) |
2020-08-11 04:39:27 |
| 46.39.194.130 | attackspam | Automatic report - Port Scan Attack |
2020-08-11 04:42:32 |
| 210.97.40.102 | attackbots | Aug 10 21:32:59 mellenthin sshd[19550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.97.40.102 user=root Aug 10 21:33:01 mellenthin sshd[19550]: Failed password for invalid user root from 210.97.40.102 port 44458 ssh2 |
2020-08-11 04:19:38 |
| 201.75.53.29 | attack | 2020-08-10T22:20:44.368641mail.broermann.family sshd[18101]: Failed password for root from 201.75.53.29 port 54620 ssh2 2020-08-10T22:26:17.916533mail.broermann.family sshd[18333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.75.53.29 user=root 2020-08-10T22:26:20.174558mail.broermann.family sshd[18333]: Failed password for root from 201.75.53.29 port 60386 ssh2 2020-08-10T22:31:50.946254mail.broermann.family sshd[18553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.75.53.29 user=root 2020-08-10T22:31:52.918470mail.broermann.family sshd[18553]: Failed password for root from 201.75.53.29 port 37914 ssh2 ... |
2020-08-11 04:48:45 |
| 222.186.173.142 | attackspam | Aug 10 22:32:06 ns381471 sshd[22466]: Failed password for root from 222.186.173.142 port 4920 ssh2 Aug 10 22:32:17 ns381471 sshd[22466]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 4920 ssh2 [preauth] |
2020-08-11 04:33:18 |
| 166.170.222.212 | attack | Brute forcing email accounts |
2020-08-11 04:22:51 |
| 177.130.140.52 | attackspam | Automatic report - Port Scan Attack |
2020-08-11 04:47:22 |
| 1.227.100.17 | attack | Bruteforce detected by fail2ban |
2020-08-11 04:27:16 |