城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.153.96.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49747
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.153.96.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:12:51 CST 2025
;; MSG SIZE rcvd: 106
Host 140.96.153.20.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 140.96.153.20.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.99.3.144 | attack | $f2bV_matches |
2020-09-11 16:46:42 |
| 116.87.91.32 | attack | Port Scan ... |
2020-09-11 16:48:30 |
| 194.26.25.122 | attackspam | Listed on rbldns-ru / proto=6 . srcport=55656 . dstport=6728 . (85) |
2020-09-11 16:57:23 |
| 217.27.45.236 | attackspambots | Lines containing failures of 217.27.45.236 Sep 10 14:42:30 neweola sshd[14168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.27.45.236 user=r.r Sep 10 14:42:32 neweola sshd[14168]: Failed password for r.r from 217.27.45.236 port 52076 ssh2 Sep 10 14:42:33 neweola sshd[14168]: Connection closed by authenticating user r.r 217.27.45.236 port 52076 [preauth] Sep 10 14:42:33 neweola sshd[14176]: Invalid user ubnt from 217.27.45.236 port 34571 Sep 10 14:42:33 neweola sshd[14176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.27.45.236 Sep 10 14:42:36 neweola sshd[14176]: Failed password for invalid user ubnt from 217.27.45.236 port 34571 ssh2 Sep 10 14:42:37 neweola sshd[14176]: Connection closed by invalid user ubnt 217.27.45.236 port 34571 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=217.27.45.236 |
2020-09-11 16:58:38 |
| 191.53.251.218 | attackbots | Sep 7 13:28:26 mail.srvfarm.net postfix/smtps/smtpd[1075337]: warning: unknown[191.53.251.218]: SASL PLAIN authentication failed: Sep 7 13:28:26 mail.srvfarm.net postfix/smtps/smtpd[1075337]: lost connection after AUTH from unknown[191.53.251.218] Sep 7 13:31:29 mail.srvfarm.net postfix/smtps/smtpd[1073052]: warning: unknown[191.53.251.218]: SASL PLAIN authentication failed: Sep 7 13:31:29 mail.srvfarm.net postfix/smtps/smtpd[1073052]: lost connection after AUTH from unknown[191.53.251.218] Sep 7 13:35:29 mail.srvfarm.net postfix/smtps/smtpd[1077762]: warning: unknown[191.53.251.218]: SASL PLAIN authentication failed: |
2020-09-11 17:06:06 |
| 180.166.208.56 | attackbots | SMTP brute force |
2020-09-11 16:53:17 |
| 172.68.63.19 | attack | srv02 DDoS Malware Target(80:http) .. |
2020-09-11 17:04:00 |
| 200.54.51.124 | attack | 2020-09-11T08:14:04.330498shield sshd\[18808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.51.124 user=root 2020-09-11T08:14:06.906961shield sshd\[18808\]: Failed password for root from 200.54.51.124 port 60082 ssh2 2020-09-11T08:18:47.905784shield sshd\[19280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.51.124 user=root 2020-09-11T08:18:49.664879shield sshd\[19280\]: Failed password for root from 200.54.51.124 port 43648 ssh2 2020-09-11T08:23:30.822009shield sshd\[19789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.51.124 user=root |
2020-09-11 16:38:31 |
| 45.148.122.152 | attackbots | Port scan denied |
2020-09-11 16:33:08 |
| 168.205.192.111 | attack | Sep 8 15:58:22 mail.srvfarm.net postfix/smtpd[1844657]: warning: unknown[168.205.192.111]: SASL PLAIN authentication failed: Sep 8 15:58:25 mail.srvfarm.net postfix/smtpd[1844657]: lost connection after AUTH from unknown[168.205.192.111] Sep 8 15:59:59 mail.srvfarm.net postfix/smtps/smtpd[1844382]: warning: unknown[168.205.192.111]: SASL PLAIN authentication failed: Sep 8 16:00:00 mail.srvfarm.net postfix/smtps/smtpd[1844382]: lost connection after AUTH from unknown[168.205.192.111] Sep 8 16:00:11 mail.srvfarm.net postfix/smtps/smtpd[1842209]: warning: unknown[168.205.192.111]: SASL PLAIN authentication failed: |
2020-09-11 17:07:18 |
| 159.65.152.201 | attack | Sep 11 08:35:50 haigwepa sshd[25604]: Failed password for root from 159.65.152.201 port 57854 ssh2 ... |
2020-09-11 16:32:05 |
| 89.248.171.89 | attack | Sep 10 03:09:13 mail.srvfarm.net postfix/smtpd[2862777]: warning: unknown[89.248.171.89]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 10 03:09:13 mail.srvfarm.net postfix/smtpd[2862777]: lost connection after AUTH from unknown[89.248.171.89] Sep 10 03:09:21 mail.srvfarm.net postfix/smtpd[2862776]: warning: unknown[89.248.171.89]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 10 03:09:21 mail.srvfarm.net postfix/smtpd[2862776]: lost connection after AUTH from unknown[89.248.171.89] Sep 10 03:09:43 mail.srvfarm.net postfix/smtpd[2862729]: warning: unknown[89.248.171.89]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-09-11 17:09:00 |
| 168.91.36.28 | attack | 3,98-00/01 [bc01/m34] PostRequest-Spammer scoring: brussels |
2020-09-11 16:47:02 |
| 210.211.116.80 | attackspam | ... |
2020-09-11 17:00:39 |
| 195.54.167.91 | attackbots |
|
2020-09-11 16:56:52 |