城市(city): unknown
省份(region): unknown
国家(country): Spain
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.142.8.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20808
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.142.8.162. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 10:07:18 CST 2025
;; MSG SIZE rcvd: 104
162.8.142.2.in-addr.arpa domain name pointer 162.red-2-142-8.dynamicip.rima-tde.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
162.8.142.2.in-addr.arpa name = 162.red-2-142-8.dynamicip.rima-tde.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 187.188.153.88 | attack | Unauthorized connection attempt detected from IP address 187.188.153.88 to port 9000 [J] |
2020-02-04 08:03:21 |
| 186.19.183.70 | attack | Feb 4 01:04:24 srv01 sshd[30180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.19.183.70 user=tomcat7 Feb 4 01:04:26 srv01 sshd[30180]: Failed password for tomcat7 from 186.19.183.70 port 52192 ssh2 Feb 4 01:07:40 srv01 sshd[30359]: Invalid user lyaturinskaya from 186.19.183.70 port 50174 Feb 4 01:07:40 srv01 sshd[30359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.19.183.70 Feb 4 01:07:40 srv01 sshd[30359]: Invalid user lyaturinskaya from 186.19.183.70 port 50174 Feb 4 01:07:42 srv01 sshd[30359]: Failed password for invalid user lyaturinskaya from 186.19.183.70 port 50174 ssh2 ... |
2020-02-04 08:14:23 |
| 124.239.168.74 | attackspambots | Feb 3 19:25:02 plusreed sshd[25001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.168.74 user=root Feb 3 19:25:04 plusreed sshd[25001]: Failed password for root from 124.239.168.74 port 53214 ssh2 ... |
2020-02-04 08:31:17 |
| 125.141.56.229 | attackbots | Unauthorized connection attempt detected from IP address 125.141.56.229 to port 2220 [J] |
2020-02-04 08:09:17 |
| 162.247.74.206 | attackbotsspam | Feb 4 01:05:42 v22019058497090703 sshd[14510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.206 Feb 4 01:05:43 v22019058497090703 sshd[14510]: Failed password for invalid user admin from 162.247.74.206 port 44720 ssh2 ... |
2020-02-04 08:13:14 |
| 152.231.56.196 | attack | Unauthorized connection attempt detected from IP address 152.231.56.196 to port 8080 [J] |
2020-02-04 08:07:29 |
| 177.191.181.5 | attackspam | Feb 4 01:07:18 MK-Soft-VM7 sshd[6983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.191.181.5 Feb 4 01:07:20 MK-Soft-VM7 sshd[6983]: Failed password for invalid user davids from 177.191.181.5 port 59494 ssh2 ... |
2020-02-04 08:33:26 |
| 193.248.242.234 | attackbotsspam | Feb 3 19:02:00 NPSTNNYC01T sshd[27430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.248.242.234 Feb 3 19:02:01 NPSTNNYC01T sshd[27430]: Failed password for invalid user ted from 193.248.242.234 port 42765 ssh2 Feb 3 19:07:45 NPSTNNYC01T sshd[27785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.248.242.234 ... |
2020-02-04 08:11:12 |
| 66.220.149.28 | attackbotsspam | [Tue Feb 04 07:07:33.501108 2020] [:error] [pid 18719:tid 139896723326720] [client 66.220.149.28:52886] [client 66.220.149.28] ModSecurity: Access denied with code 403 (phase 2). Found 3 byte(s) in REQUEST_URI outside range: 32-36,38-126. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "1304"] [id "920272"] [msg "Invalid character in request (outside of printable chars below ascii 127)"] [data "REQUEST_URI=/images/Klimatologi/Analisis/02-Analisis_Dasarian/Dinamika/2020/01_Januari_2020/Das-III/Analisis_Dinamika_Atmosfer\\xe2\\x80\\x93Laut_Dan_Prediksi_Curah_Hujan_Update_Dasarian_III_Januari_2020.jpg"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/EVASION"] [tag "paranoia-level/3"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/images/Klimatologi/Analisis/02-Analisis_Dasarian/Dinamika ... |
2020-02-04 08:23:07 |
| 62.210.37.82 | attackspam | Feb 4 01:05:24 v22019058497090703 sshd[14465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.37.82 Feb 4 01:05:26 v22019058497090703 sshd[14465]: Failed password for invalid user admin from 62.210.37.82 port 39296 ssh2 ... |
2020-02-04 08:29:51 |
| 104.244.76.245 | attack | Feb 4 01:05:13 v22019058497090703 sshd[14215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.76.245 Feb 4 01:05:15 v22019058497090703 sshd[14215]: Failed password for invalid user support from 104.244.76.245 port 54196 ssh2 ... |
2020-02-04 08:35:24 |
| 117.36.152.9 | attackspam | Unauthorised access (Feb 4) SRC=117.36.152.9 LEN=44 TTL=50 ID=11968 TCP DPT=8080 WINDOW=11245 SYN Unauthorised access (Feb 2) SRC=117.36.152.9 LEN=44 TTL=50 ID=56064 TCP DPT=8080 WINDOW=3370 SYN Unauthorised access (Feb 2) SRC=117.36.152.9 LEN=44 TTL=50 ID=19662 TCP DPT=8080 WINDOW=11245 SYN |
2020-02-04 08:17:46 |
| 222.186.180.142 | attackspam | SSH login attempts |
2020-02-04 08:34:33 |
| 124.156.50.64 | attackspam | Unauthorized connection attempt detected from IP address 124.156.50.64 to port 512 [J] |
2020-02-04 08:10:05 |
| 203.228.5.1 | attackbots | Unauthorized connection attempt detected from IP address 203.228.5.1 to port 23 [J] |
2020-02-04 07:58:18 |