城市(city): unknown
省份(region): unknown
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.245.140.178
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;197.245.140.178. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:34:34 CST 2025
;; MSG SIZE rcvd: 108
178.140.245.197.in-addr.arpa domain name pointer dsl-197-245-140-178.voxdsl.co.za.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
178.140.245.197.in-addr.arpa name = dsl-197-245-140-178.voxdsl.co.za.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 190.28.118.221 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/190.28.118.221/ CO - 1H : (14) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CO NAME ASN : ASN27805 IP : 190.28.118.221 CIDR : 190.28.0.0/16 PREFIX COUNT : 52 UNIQUE IP COUNT : 2105088 ATTACKS DETECTED ASN27805 : 1H - 2 3H - 3 6H - 4 12H - 4 24H - 6 DateTime : 2019-11-07 07:26:36 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-07 17:34:43 |
| 200.209.174.76 | attackspambots | 2019-11-07T07:28:37.088581abusebot-4.cloudsearch.cf sshd\[4536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.174.76 user=root |
2019-11-07 17:47:22 |
| 106.12.94.65 | attack | Nov 6 22:42:38 tdfoods sshd\[9939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.94.65 user=root Nov 6 22:42:40 tdfoods sshd\[9939\]: Failed password for root from 106.12.94.65 port 47332 ssh2 Nov 6 22:47:29 tdfoods sshd\[10286\]: Invalid user angelina from 106.12.94.65 Nov 6 22:47:29 tdfoods sshd\[10286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.94.65 Nov 6 22:47:31 tdfoods sshd\[10286\]: Failed password for invalid user angelina from 106.12.94.65 port 53756 ssh2 |
2019-11-07 18:03:19 |
| 31.47.0.106 | attackspambots | 3389BruteforceFW23 |
2019-11-07 17:53:49 |
| 138.68.4.198 | attack | Nov 7 08:48:08 *** sshd[16304]: Invalid user rack from 138.68.4.198 |
2019-11-07 17:39:59 |
| 139.59.238.14 | attackbots | Nov 7 03:08:36 ny01 sshd[12348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.238.14 Nov 7 03:08:38 ny01 sshd[12348]: Failed password for invalid user ld from 139.59.238.14 port 39556 ssh2 Nov 7 03:13:11 ny01 sshd[12704]: Failed password for root from 139.59.238.14 port 49438 ssh2 |
2019-11-07 17:48:34 |
| 101.36.152.13 | attack | Lines containing failures of 101.36.152.13 Nov 4 21:55:44 jarvis sshd[11261]: Invalid user zahore from 101.36.152.13 port 36434 Nov 4 21:55:44 jarvis sshd[11261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.152.13 Nov 4 21:55:46 jarvis sshd[11261]: Failed password for invalid user zahore from 101.36.152.13 port 36434 ssh2 Nov 4 21:55:48 jarvis sshd[11261]: Received disconnect from 101.36.152.13 port 36434:11: Bye Bye [preauth] Nov 4 21:55:48 jarvis sshd[11261]: Disconnected from invalid user zahore 101.36.152.13 port 36434 [preauth] Nov 4 22:08:50 jarvis sshd[14084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.152.13 user=r.r Nov 4 22:08:52 jarvis sshd[14084]: Failed password for r.r from 101.36.152.13 port 51558 ssh2 Nov 4 22:08:54 jarvis sshd[14084]: Received disconnect from 101.36.152.13 port 51558:11: Bye Bye [preauth] Nov 4 22:08:54 jarvis sshd[14084]: Di........ ------------------------------ |
2019-11-07 17:57:36 |
| 90.159.28.67 | attackbots | Automatic report - Port Scan |
2019-11-07 17:54:53 |
| 80.82.70.239 | attack | 11/07/2019-04:40:54.786263 80.82.70.239 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-07 18:04:29 |
| 58.211.157.195 | attackspambots | Helo |
2019-11-07 17:41:37 |
| 35.158.31.154 | attack | syn dos attack on port 443 |
2019-11-07 17:42:09 |
| 13.57.137.162 | attackspambots | Nov 7 10:54:00 dedicated sshd[21472]: Invalid user raspberry from 13.57.137.162 port 32986 |
2019-11-07 18:01:26 |
| 106.13.54.207 | attackbots | $f2bV_matches |
2019-11-07 17:31:47 |
| 106.13.198.162 | attackspam | Nov 7 10:40:36 vps647732 sshd[26632]: Failed password for root from 106.13.198.162 port 33012 ssh2 ... |
2019-11-07 17:56:29 |
| 87.241.105.148 | attackspambots | 87.241.105.148 was recorded 16 times by 1 hosts attempting to connect to the following ports: 23. Incident counter (4h, 24h, all-time): 16, 42, 42 |
2019-11-07 17:37:12 |