城市(city): unknown
省份(region): unknown
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.248.141.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;196.248.141.221. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 16:15:20 CST 2025
;; MSG SIZE rcvd: 108
Host 221.141.248.196.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 221.141.248.196.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 200.5.74.90 | attackspam | Jun 29 07:46:19 electroncash sshd[15784]: Invalid user ftp1 from 200.5.74.90 port 63134 Jun 29 07:46:19 electroncash sshd[15784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.5.74.90 Jun 29 07:46:19 electroncash sshd[15784]: Invalid user ftp1 from 200.5.74.90 port 63134 Jun 29 07:46:21 electroncash sshd[15784]: Failed password for invalid user ftp1 from 200.5.74.90 port 63134 ssh2 Jun 29 07:51:06 electroncash sshd[17065]: Invalid user test from 200.5.74.90 port 64081 ... |
2020-06-29 16:17:29 |
| 62.234.146.45 | attack | Jun 29 10:09:54 srv-ubuntu-dev3 sshd[86554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45 user=root Jun 29 10:09:56 srv-ubuntu-dev3 sshd[86554]: Failed password for root from 62.234.146.45 port 52814 ssh2 Jun 29 10:12:42 srv-ubuntu-dev3 sshd[86977]: Invalid user ravi from 62.234.146.45 Jun 29 10:12:42 srv-ubuntu-dev3 sshd[86977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45 Jun 29 10:12:42 srv-ubuntu-dev3 sshd[86977]: Invalid user ravi from 62.234.146.45 Jun 29 10:12:44 srv-ubuntu-dev3 sshd[86977]: Failed password for invalid user ravi from 62.234.146.45 port 59642 ssh2 Jun 29 10:18:20 srv-ubuntu-dev3 sshd[87965]: Invalid user idc from 62.234.146.45 Jun 29 10:18:20 srv-ubuntu-dev3 sshd[87965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.146.45 Jun 29 10:18:20 srv-ubuntu-dev3 sshd[87965]: Invalid user idc from 62.234.146.45 ... |
2020-06-29 16:26:46 |
| 46.38.150.193 | attack | 2020-06-29 08:31:07 auth_plain authenticator failed for (User) [46.38.150.193]: 535 Incorrect authentication data (set_id=teknobyen-gw2@mail.csmailer.org) 2020-06-29 08:31:34 auth_plain authenticator failed for (User) [46.38.150.193]: 535 Incorrect authentication data (set_id=listings@mail.csmailer.org) 2020-06-29 08:32:10 auth_plain authenticator failed for (User) [46.38.150.193]: 535 Incorrect authentication data (set_id=cecilia@mail.csmailer.org) 2020-06-29 08:32:42 auth_plain authenticator failed for (User) [46.38.150.193]: 535 Incorrect authentication data (set_id=wesley@mail.csmailer.org) 2020-06-29 08:33:13 auth_plain authenticator failed for (User) [46.38.150.193]: 535 Incorrect authentication data (set_id=cvasquez@mail.csmailer.org) ... |
2020-06-29 16:38:02 |
| 199.195.251.227 | attackbots | Jun 29 05:43:49 server sshd[29530]: Failed password for invalid user leos from 199.195.251.227 port 58008 ssh2 Jun 29 05:48:35 server sshd[1873]: Failed password for invalid user operator from 199.195.251.227 port 60296 ssh2 Jun 29 05:53:28 server sshd[6902]: Failed password for invalid user gpn from 199.195.251.227 port 34198 ssh2 |
2020-06-29 16:32:07 |
| 184.168.27.191 | attackspam | Automatic report - XMLRPC Attack |
2020-06-29 16:43:06 |
| 80.82.77.212 | attackspambots | 06/29/2020-04:22:36.108298 80.82.77.212 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-06-29 16:26:24 |
| 222.186.190.17 | attack | Jun 29 09:55:39 OPSO sshd\[32411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.17 user=root Jun 29 09:55:41 OPSO sshd\[32411\]: Failed password for root from 222.186.190.17 port 22099 ssh2 Jun 29 09:55:44 OPSO sshd\[32411\]: Failed password for root from 222.186.190.17 port 22099 ssh2 Jun 29 09:55:46 OPSO sshd\[32411\]: Failed password for root from 222.186.190.17 port 22099 ssh2 Jun 29 09:56:10 OPSO sshd\[32464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.17 user=root |
2020-06-29 16:02:13 |
| 91.121.145.227 | attackbots | Jun 29 10:11:39 PorscheCustomer sshd[30027]: Failed password for root from 91.121.145.227 port 58840 ssh2 Jun 29 10:13:30 PorscheCustomer sshd[30069]: Failed password for root from 91.121.145.227 port 35262 ssh2 Jun 29 10:15:14 PorscheCustomer sshd[30120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.145.227 ... |
2020-06-29 16:18:33 |
| 193.27.228.220 | attackbotsspam | firewall-block, port(s): 2379/tcp |
2020-06-29 16:19:56 |
| 148.245.13.21 | attackbotsspam | 2020-06-29T02:28:39.566329devel sshd[8908]: Failed password for invalid user wch from 148.245.13.21 port 47118 ssh2 2020-06-29T02:38:40.690878devel sshd[9626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21 user=root 2020-06-29T02:38:42.537193devel sshd[9626]: Failed password for root from 148.245.13.21 port 33048 ssh2 |
2020-06-29 16:07:05 |
| 223.240.86.204 | attack | 2020-06-29T08:31:45+0200 Failed SSH Authentication/Brute Force Attack. (Server 9) |
2020-06-29 16:10:33 |
| 222.186.180.17 | attack | 2020-06-29T08:07:02.404286shield sshd\[16080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root 2020-06-29T08:07:04.454840shield sshd\[16080\]: Failed password for root from 222.186.180.17 port 60452 ssh2 2020-06-29T08:07:07.478218shield sshd\[16080\]: Failed password for root from 222.186.180.17 port 60452 ssh2 2020-06-29T08:07:11.200429shield sshd\[16080\]: Failed password for root from 222.186.180.17 port 60452 ssh2 2020-06-29T08:07:14.519020shield sshd\[16080\]: Failed password for root from 222.186.180.17 port 60452 ssh2 |
2020-06-29 16:19:09 |
| 165.22.243.42 | attack | 2020-06-29T10:01:56.036789afi-git.jinr.ru sshd[13908]: Failed password for root from 165.22.243.42 port 36338 ssh2 2020-06-29T10:05:34.965629afi-git.jinr.ru sshd[15208]: Invalid user terrariaserver from 165.22.243.42 port 34824 2020-06-29T10:05:34.969053afi-git.jinr.ru sshd[15208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.243.42 2020-06-29T10:05:34.965629afi-git.jinr.ru sshd[15208]: Invalid user terrariaserver from 165.22.243.42 port 34824 2020-06-29T10:05:37.386664afi-git.jinr.ru sshd[15208]: Failed password for invalid user terrariaserver from 165.22.243.42 port 34824 ssh2 ... |
2020-06-29 16:06:04 |
| 115.124.64.126 | attackbots | Jun 29 09:24:01 [host] sshd[6269]: Invalid user co Jun 29 09:24:01 [host] sshd[6269]: pam_unix(sshd:a Jun 29 09:24:04 [host] sshd[6269]: Failed password |
2020-06-29 16:43:50 |
| 141.98.9.160 | attackbotsspam | Jun 29 09:27:40 zooi sshd[15261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.160 Jun 29 09:27:42 zooi sshd[15261]: Failed password for invalid user user from 141.98.9.160 port 46527 ssh2 ... |
2020-06-29 16:02:46 |