城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.137.54.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;204.137.54.93. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 12:14:32 CST 2025
;; MSG SIZE rcvd: 106
Host 93.54.137.204.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 93.54.137.204.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.211.86.96 | attack | (sshd) Failed SSH login from 80.211.86.96 (IT/Italy/Province of Arezzo/Arezzo/host96-86-211-80.serverdedicati.aruba.it/[AS31034 Aruba S.p.A.]): 1 in the last 3600 secs |
2019-11-01 19:19:34 |
| 141.98.81.37 | attackspambots | Jul 19 02:00:49 novum-srv2 sshd[5553]: Invalid user admin from 141.98.81.37 port 31499 Jul 19 02:00:50 novum-srv2 sshd[5555]: Invalid user ubnt from 141.98.81.37 port 40997 Jul 19 02:00:51 novum-srv2 sshd[5559]: Invalid user admin from 141.98.81.37 port 48028 ... |
2019-11-01 19:16:37 |
| 125.118.147.209 | attack | 2019-10-31 22:46:37 dovecot_login authenticator failed for (pfbtvfxist.com) [125.118.147.209]:62108 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org) 2019-10-31 22:46:45 dovecot_login authenticator failed for (pfbtvfxist.com) [125.118.147.209]:62446 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org) 2019-10-31 22:46:57 dovecot_login authenticator failed for (pfbtvfxist.com) [125.118.147.209]:63100 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org) ... |
2019-11-01 19:20:30 |
| 201.69.8.214 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/201.69.8.214/ BR - 1H : (396) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN27699 IP : 201.69.8.214 CIDR : 201.69.0.0/16 PREFIX COUNT : 267 UNIQUE IP COUNT : 6569728 ATTACKS DETECTED ASN27699 : 1H - 7 3H - 21 6H - 40 12H - 107 24H - 196 DateTime : 2019-11-01 04:47:30 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-01 18:58:04 |
| 185.137.234.87 | attackbotsspam | Connection by 185.137.234.87 on port: 4000 got caught by honeypot at 11/1/2019 10:02:40 AM |
2019-11-01 18:52:58 |
| 36.77.94.79 | attack | Unauthorized connection attempt from IP address 36.77.94.79 on Port 445(SMB) |
2019-11-01 19:21:54 |
| 169.0.148.182 | attackbots | Fail2Ban Ban Triggered |
2019-11-01 19:00:29 |
| 212.237.51.190 | attack | Nov 1 06:57:29 mout sshd[28781]: Invalid user biz from 212.237.51.190 port 34082 |
2019-11-01 18:44:34 |
| 97.68.93.237 | attackbots | Nov 1 08:58:39 apollo sshd\[13193\]: Invalid user hadoop from 97.68.93.237Nov 1 08:58:41 apollo sshd\[13193\]: Failed password for invalid user hadoop from 97.68.93.237 port 57596 ssh2Nov 1 09:20:00 apollo sshd\[13319\]: Failed password for root from 97.68.93.237 port 46702 ssh2 ... |
2019-11-01 19:06:26 |
| 185.176.27.178 | attackspambots | Nov 1 11:45:10 mc1 kernel: \[3891426.453913\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=58792 PROTO=TCP SPT=52911 DPT=40319 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 1 11:50:37 mc1 kernel: \[3891753.652520\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=38534 PROTO=TCP SPT=52911 DPT=29136 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 1 11:51:21 mc1 kernel: \[3891797.747212\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=5936 PROTO=TCP SPT=52911 DPT=35464 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-01 19:16:01 |
| 117.139.166.27 | attackbots | Oct 28 17:17:01 roadrisk sshd[9562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.139.166.27 user=r.r Oct 28 17:17:04 roadrisk sshd[9562]: Failed password for r.r from 117.139.166.27 port 2055 ssh2 Oct 28 17:17:04 roadrisk sshd[9562]: Received disconnect from 117.139.166.27: 11: Bye Bye [preauth] Oct 28 17:32:08 roadrisk sshd[9831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.139.166.27 user=r.r Oct 28 17:32:10 roadrisk sshd[9831]: Failed password for r.r from 117.139.166.27 port 2060 ssh2 Oct 28 17:32:10 roadrisk sshd[9831]: Received disconnect from 117.139.166.27: 11: Bye Bye [preauth] Oct 28 17:37:31 roadrisk sshd[9900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.139.166.27 user=r.r Oct 28 17:37:33 roadrisk sshd[9900]: Failed password for r.r from 117.139.166.27 port 2062 ssh2 Oct 28 17:37:33 roadrisk sshd[9900]: Received ........ ------------------------------- |
2019-11-01 19:18:11 |
| 208.100.26.241 | attackbotsspam | [portscan] tcp/20 [FTP] [portscan] tcp/21 [FTP] [portscan] tcp/22 [SSH] [portscan] tcp/23 [TELNET] [scan/connect: 4 time(s)] in spfbl.net:'listed' *(RWIN=1024)(11011243) |
2019-11-01 18:44:57 |
| 45.40.192.118 | attackspam | 2019-11-01T07:42:39.858089abusebot-5.cloudsearch.cf sshd\[10529\]: Invalid user lucas from 45.40.192.118 port 39848 |
2019-11-01 19:01:50 |
| 40.82.159.248 | attackbotsspam | 19/10/31@23:47:10: FAIL: Alarm-Intrusion address from=40.82.159.248 ... |
2019-11-01 19:11:15 |
| 13.56.168.247 | attack | From CCTV User Interface Log ...::ffff:13.56.168.247 - - [01/Nov/2019:00:33:58 +0000] "-" 400 179 ... |
2019-11-01 18:49:42 |