城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.135.57.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29897
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.135.57.218. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 18:44:09 CST 2025
;; MSG SIZE rcvd: 106
Host 218.57.135.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 218.57.135.21.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.173.154 | attack | Oct 4 06:11:02 *** sshd[23156]: User root from 222.186.173.154 not allowed because not listed in AllowUsers |
2019-10-04 14:37:06 |
| 138.59.167.35 | attackbots | Sep 30 07:58:21 rb06 postfix/smtpd[24642]: warning: hostname pool-138.59.167-35.pandaconect.net does not resolve to address 138.59.167.35: Name or service not known Sep 30 07:58:21 rb06 postfix/smtpd[24642]: connect from unknown[138.59.167.35] Sep 30 07:58:26 rb06 postgrey[1052]: action=greylist, reason=new, client_name=unknown, client_address=138.59.167.35, sender=x@x recipient=x@x Sep 30 07:58:26 rb06 policyd-spf[12641]: Neutral; identhostnamey=mailfrom; client-ip=138.59.167.35; helo=pool-138.59.167-35.pandaconect.net; envelope-from=x@x Sep x@x Sep 30 07:58:28 rb06 postfix/smtpd[24642]: lost connection after RCPT from unknown[138.59.167.35] Sep 30 07:58:28 rb06 postfix/smtpd[24642]: disconnect from unknown[138.59.167.35] Sep 30 20:29:39 rb06 postfix/smtpd[5799]: warning: hostname pool-138.59.167-35.pandaconect.net does not resolve to address 138.59.167.35: Name or service not known Sep 30 20:29:39 rb06 postfix/smtpd[5799]: connect from unknown[138.59.167.35] Sep 30 20........ ------------------------------- |
2019-10-04 14:57:30 |
| 114.99.0.39 | attackbotsspam | Oct 1 04:33:59 mxgate1 postfix/postscreen[15902]: CONNECT from [114.99.0.39]:51190 to [176.31.12.44]:25 Oct 1 04:33:59 mxgate1 postfix/dnsblog[15906]: addr 114.99.0.39 listed by domain zen.spamhaus.org as 127.0.0.11 Oct 1 04:33:59 mxgate1 postfix/dnsblog[15906]: addr 114.99.0.39 listed by domain zen.spamhaus.org as 127.0.0.4 Oct 1 04:33:59 mxgate1 postfix/dnsblog[15904]: addr 114.99.0.39 listed by domain b.barracudacentral.org as 127.0.0.2 Oct 1 04:34:00 mxgate1 postfix/dnsblog[15907]: addr 114.99.0.39 listed by domain cbl.abuseat.org as 127.0.0.2 Oct 1 04:34:05 mxgate1 postfix/postscreen[15902]: DNSBL rank 4 for [114.99.0.39]:51190 Oct x@x Oct 1 04:34:06 mxgate1 postfix/postscreen[15902]: DISCONNECT [114.99.0.39]:51190 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=114.99.0.39 |
2019-10-04 14:58:59 |
| 45.248.86.155 | attackbotsspam | Nov 30 12:37:48 server6 sshd[22800]: Failed password for invalid user csgoserver from 45.248.86.155 port 34030 ssh2 Nov 30 12:37:48 server6 sshd[22800]: Received disconnect from 45.248.86.155: 11: Bye Bye [preauth] Nov 30 12:46:44 server6 sshd[30787]: Failed password for invalid user oracle from 45.248.86.155 port 53680 ssh2 Nov 30 12:46:44 server6 sshd[30787]: Received disconnect from 45.248.86.155: 11: Bye Bye [preauth] Nov 30 12:55:40 server6 sshd[6390]: Failed password for invalid user rama from 45.248.86.155 port 45070 ssh2 Nov 30 12:55:40 server6 sshd[6390]: Received disconnect from 45.248.86.155: 11: Bye Bye [preauth] Nov 30 13:13:14 server6 sshd[19860]: Failed password for invalid user wpyan from 45.248.86.155 port 56150 ssh2 Nov 30 13:13:15 server6 sshd[19860]: Received disconnect from 45.248.86.155: 11: Bye Bye [preauth] Dec 1 08:44:33 server6 sshd[19759]: Failed password for invalid user skazzi from 45.248.86.155 port 53300 ssh2 Dec 1 08:44:34 server6 sshd[........ ------------------------------- |
2019-10-04 14:35:58 |
| 220.130.178.36 | attackbotsspam | Oct 4 08:30:30 SilenceServices sshd[12504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.178.36 Oct 4 08:30:32 SilenceServices sshd[12504]: Failed password for invalid user Fernanda@123 from 220.130.178.36 port 50404 ssh2 Oct 4 08:34:59 SilenceServices sshd[13666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.178.36 |
2019-10-04 14:53:38 |
| 77.234.40.132 | attackbots | Sep 3 04:04:29 localhost postfix/smtpd[30134]: lost connection after CONNECT from unknown[77.234.40.132] Sep 3 04:05:06 localhost postfix/smtpd[30176]: lost connection after AUTH from unknown[77.234.40.132] Sep 3 04:10:30 localhost postfix/smtpd[30134]: lost connection after AUTH from unknown[77.234.40.132] Sep 3 04:22:18 localhost postfix/smtpd[2333]: lost connection after EHLO from unknown[77.234.40.132] Sep 3 04:22:49 localhost postfix/smtpd[2327]: lost connection after EHLO from unknown[77.234.40.132] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=77.234.40.132 |
2019-10-04 14:25:55 |
| 218.27.224.240 | attack | Unauthorised access (Oct 4) SRC=218.27.224.240 LEN=40 TTL=49 ID=48931 TCP DPT=8080 WINDOW=42485 SYN Unauthorised access (Oct 4) SRC=218.27.224.240 LEN=40 TTL=49 ID=60588 TCP DPT=8080 WINDOW=42485 SYN Unauthorised access (Oct 3) SRC=218.27.224.240 LEN=40 TTL=49 ID=11567 TCP DPT=8080 WINDOW=35590 SYN |
2019-10-04 14:39:19 |
| 217.165.164.245 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-04 15:01:35 |
| 45.136.109.197 | attackbotsspam | Port-scan: detected 145 distinct ports within a 24-hour window. |
2019-10-04 14:49:50 |
| 172.114.244.127 | attack | DATE:2019-10-04 05:56:09, IP:172.114.244.127, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-10-04 14:39:52 |
| 103.45.154.215 | attackspam | Oct 3 18:35:41 eddieflores sshd\[16903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.154.215 user=root Oct 3 18:35:42 eddieflores sshd\[16903\]: Failed password for root from 103.45.154.215 port 39874 ssh2 Oct 3 18:40:33 eddieflores sshd\[17397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.154.215 user=root Oct 3 18:40:35 eddieflores sshd\[17397\]: Failed password for root from 103.45.154.215 port 47522 ssh2 Oct 3 18:45:21 eddieflores sshd\[17771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.154.215 user=root |
2019-10-04 14:28:54 |
| 222.186.175.183 | attackbots | Oct 4 08:46:09 arianus sshd\[17371\]: Unable to negotiate with 222.186.175.183 port 15928: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\] ... |
2019-10-04 14:48:48 |
| 187.202.221.105 | attackbots | 19/10/3@23:56:06: FAIL: IoT-Telnet address from=187.202.221.105 ... |
2019-10-04 14:41:42 |
| 202.120.38.28 | attackbots | SSH bruteforce |
2019-10-04 15:04:34 |
| 106.53.91.14 | attackspambots | Invalid user test from 106.53.91.14 port 47440 |
2019-10-04 14:46:44 |