城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.89.42.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.89.42.48. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:32:18 CST 2025
;; MSG SIZE rcvd: 104
Host 48.42.89.20.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 48.42.89.20.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 60.212.42.56 | attackspam | 60.212.42.56 - - [21/Sep/2019:23:29:51 +0200] "POST /wp-login.php HTTP/1.1" 200 4522 "http://mib-epas-consortium.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" 60.212.42.56 - - [21/Sep/2019:23:29:53 +0200] "POST /wp-login.php HTTP/1.1" 200 4522 "http://mib-epas-consortium.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" 60.212.42.56 - - [21/Sep/2019:23:29:54 +0200] "POST /wp-login.php HTTP/1.1" 200 4522 "http://mib-epas-consortium.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" 60.212.42.56 - - [21/Sep/2019:23:29:55 +0200] "POST /wp-login.php HTTP/1.1" 200 4522 "http://mib-epas-consortium.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" 60.212.42.56 - - [21/Sep/2019:23:29:56 +0200] "POST /wp-login.php HTTP/1.1" 200 4522 "http://mib-epas-consortium.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" 60.212.42.56 - - [21/Sep/2019 |
2019-09-22 10:23:14 |
| 222.186.15.204 | attack | 2019-09-22T04:18:24.055729abusebot-3.cloudsearch.cf sshd\[4400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.204 user=root |
2019-09-22 12:20:54 |
| 51.68.46.156 | attackbotsspam | Sep 21 23:54:26 core sshd[13683]: Invalid user GE from 51.68.46.156 port 36528 Sep 21 23:54:28 core sshd[13683]: Failed password for invalid user GE from 51.68.46.156 port 36528 ssh2 ... |
2019-09-22 10:25:06 |
| 213.150.207.5 | attackbots | Sep 21 16:10:59 sachi sshd\[707\]: Invalid user 123456 from 213.150.207.5 Sep 21 16:10:59 sachi sshd\[707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.150.207.5 Sep 21 16:11:01 sachi sshd\[707\]: Failed password for invalid user 123456 from 213.150.207.5 port 41004 ssh2 Sep 21 16:15:33 sachi sshd\[1068\]: Invalid user submitter from 213.150.207.5 Sep 21 16:15:33 sachi sshd\[1068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.150.207.5 |
2019-09-22 10:22:06 |
| 182.254.213.62 | attackbotsspam | Unauthorised access (Sep 22) SRC=182.254.213.62 LEN=40 TOS=0x10 PREC=0x40 TTL=236 ID=41087 TCP DPT=445 WINDOW=1024 SYN |
2019-09-22 10:22:31 |
| 54.39.51.31 | attackbots | 2019-09-21T23:33:15.2209441495-001 sshd\[46683\]: Failed password for invalid user softcont from 54.39.51.31 port 56202 ssh2 2019-09-21T23:44:51.5244571495-001 sshd\[47693\]: Invalid user user from 54.39.51.31 port 35634 2019-09-21T23:44:51.5276611495-001 sshd\[47693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns559310.ip-54-39-51.net 2019-09-21T23:44:53.8943261495-001 sshd\[47693\]: Failed password for invalid user user from 54.39.51.31 port 35634 ssh2 2019-09-21T23:48:45.0188321495-001 sshd\[48045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns559310.ip-54-39-51.net user=mysql 2019-09-21T23:48:47.1315571495-001 sshd\[48045\]: Failed password for mysql from 54.39.51.31 port 47628 ssh2 ... |
2019-09-22 12:21:52 |
| 172.104.242.173 | attackbots | scan z |
2019-09-22 12:17:07 |
| 107.172.82.222 | attackbots | Sep 21 19:23:09 web1 sshd[3833]: Address 107.172.82.222 maps to 107-172-82-222-host.colocrossing.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 21 19:23:09 web1 sshd[3833]: Invalid user zf from 107.172.82.222 Sep 21 19:23:09 web1 sshd[3833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.82.222 Sep 21 19:23:11 web1 sshd[3833]: Failed password for invalid user zf from 107.172.82.222 port 60268 ssh2 Sep 21 19:23:12 web1 sshd[3833]: Received disconnect from 107.172.82.222: 11: Bye Bye [preauth] Sep 21 19:39:14 web1 sshd[5247]: Address 107.172.82.222 maps to 107-172-82-222-host.colocrossing.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 21 19:39:14 web1 sshd[5247]: Invalid user openerp from 107.172.82.222 Sep 21 19:39:14 web1 sshd[5247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.82.222 Sep 21 19:39:17 web1........ ------------------------------- |
2019-09-22 12:06:40 |
| 123.31.32.150 | attackspam | Sep 22 05:53:25 markkoudstaal sshd[4670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150 Sep 22 05:53:27 markkoudstaal sshd[4670]: Failed password for invalid user sven from 123.31.32.150 port 48750 ssh2 Sep 22 05:58:02 markkoudstaal sshd[5080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150 |
2019-09-22 12:05:16 |
| 178.62.33.38 | attackspambots | Automatic report - Banned IP Access |
2019-09-22 10:28:23 |
| 222.188.29.166 | attackbotsspam | Sep 22 00:29:52 taivassalofi sshd[28821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.29.166 Sep 22 00:29:54 taivassalofi sshd[28821]: Failed password for invalid user admin from 222.188.29.166 port 23375 ssh2 ... |
2019-09-22 10:27:09 |
| 81.147.105.145 | attackbots | Automatic report - Port Scan Attack |
2019-09-22 12:31:36 |
| 68.183.85.75 | attackspambots | Sep 22 06:52:48 site1 sshd\[51442\]: Invalid user super from 68.183.85.75Sep 22 06:52:51 site1 sshd\[51442\]: Failed password for invalid user super from 68.183.85.75 port 59594 ssh2Sep 22 06:57:42 site1 sshd\[51597\]: Invalid user cav from 68.183.85.75Sep 22 06:57:45 site1 sshd\[51597\]: Failed password for invalid user cav from 68.183.85.75 port 44734 ssh2Sep 22 07:02:33 site1 sshd\[51772\]: Invalid user raiz from 68.183.85.75Sep 22 07:02:35 site1 sshd\[51772\]: Failed password for invalid user raiz from 68.183.85.75 port 58110 ssh2 ... |
2019-09-22 12:05:00 |
| 193.68.57.155 | attackbots | Sep 22 05:58:06 plex sshd[30071]: Invalid user fi from 193.68.57.155 port 53586 |
2019-09-22 12:01:20 |
| 103.207.11.10 | attackbots | Sep 22 06:53:57 server sshd\[19357\]: Invalid user jenn from 103.207.11.10 port 52430 Sep 22 06:53:57 server sshd\[19357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.10 Sep 22 06:53:59 server sshd\[19357\]: Failed password for invalid user jenn from 103.207.11.10 port 52430 ssh2 Sep 22 06:57:50 server sshd\[26732\]: Invalid user lis from 103.207.11.10 port 34522 Sep 22 06:57:50 server sshd\[26732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.10 |
2019-09-22 12:07:02 |