城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.149.247.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28032
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.149.247.149. IN A
;; AUTHORITY SECTION:
. 145 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031402 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 15 10:35:06 CST 2022
;; MSG SIZE rcvd: 107
Host 149.247.149.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 149.247.149.21.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
146.155.212.69 | attackspambots | Nov 21 06:48:50 v11 sshd[19735]: Invalid user milon from 146.155.212.69 port 35062 Nov 21 06:48:52 v11 sshd[19735]: Failed password for invalid user milon from 146.155.212.69 port 35062 ssh2 Nov 21 06:48:53 v11 sshd[19735]: Received disconnect from 146.155.212.69 port 35062:11: Bye Bye [preauth] Nov 21 06:48:53 v11 sshd[19735]: Disconnected from 146.155.212.69 port 35062 [preauth] Nov 21 06:52:11 v11 sshd[19863]: Invalid user ubuntu from 146.155.212.69 port 48538 Nov 21 06:52:13 v11 sshd[19863]: Failed password for invalid user ubuntu from 146.155.212.69 port 48538 ssh2 Nov 21 06:52:13 v11 sshd[19863]: Received disconnect from 146.155.212.69 port 48538:11: Bye Bye [preauth] Nov 21 06:52:13 v11 sshd[19863]: Disconnected from 146.155.212.69 port 48538 [preauth] Nov 21 06:55:01 v11 sshd[19950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.155.212.69 user=r.r Nov 21 06:55:03 v11 sshd[19950]: Failed password for r.r from 146.15........ ------------------------------- |
2019-11-21 19:49:36 |
209.97.164.9 | attackspambots | Nov 20 23:57:36 xm3 sshd[17787]: Failed password for invalid user behl from 209.97.164.9 port 37740 ssh2 Nov 20 23:57:36 xm3 sshd[17787]: Received disconnect from 209.97.164.9: 11: Bye Bye [preauth] Nov 21 00:06:18 xm3 sshd[12599]: Failed password for invalid user mattock from 209.97.164.9 port 42460 ssh2 Nov 21 00:06:19 xm3 sshd[12599]: Received disconnect from 209.97.164.9: 11: Bye Bye [preauth] Nov 21 00:10:12 xm3 sshd[22699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.164.9 user=r.r Nov 21 00:10:14 xm3 sshd[22699]: Failed password for r.r from 209.97.164.9 port 51726 ssh2 Nov 21 00:10:14 xm3 sshd[22699]: Received disconnect from 209.97.164.9: 11: Bye Bye [preauth] Nov 21 00:14:11 xm3 sshd[28802]: Failed password for invalid user 2222222 from 209.97.164.9 port 32770 ssh2 Nov 21 00:14:11 xm3 sshd[28802]: Received disconnect from 209.97.164.9: 11: Bye Bye [preauth] Nov 21 00:19:36 xm3 sshd[7130]: Failed password for ........ ------------------------------- |
2019-11-21 19:18:36 |
103.129.109.120 | attackspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-11-21 19:39:49 |
188.165.227.151 | attackspam | Nov 18 14:21:54 hgb10502 sshd[12605]: Did not receive identification string from 188.165.227.151 port 48610 Nov 18 15:04:54 hgb10502 sshd[15797]: Invalid user soft from 188.165.227.151 port 50400 Nov 18 15:04:56 hgb10502 sshd[15797]: Failed password for invalid user soft from 188.165.227.151 port 50400 ssh2 Nov 18 15:04:56 hgb10502 sshd[15797]: Received disconnect from 188.165.227.151 port 50400:11: Normal Shutdown, Thank you for playing [preauth] Nov 18 15:04:56 hgb10502 sshd[15797]: Disconnected from 188.165.227.151 port 50400 [preauth] Nov 18 15:04:57 hgb10502 sshd[15804]: Invalid user softinstall from 188.165.227.151 port 51298 Nov 18 15:04:59 hgb10502 sshd[15804]: Failed password for invalid user softinstall from 188.165.227.151 port 51298 ssh2 Nov 18 15:04:59 hgb10502 sshd[15804]: Received disconnect from 188.165.227.151 port 51298:11: Normal Shutdown, Thank you for playing [preauth] Nov 18 15:04:59 hgb10502 sshd[15804]: Disconnected from 188.165.227.151 port 5129........ ------------------------------- |
2019-11-21 19:32:41 |
201.211.212.240 | attackspambots | Port 1433 Scan |
2019-11-21 19:25:25 |
91.158.202.101 | attack | Nov 21 10:25:23 ks10 sshd[12534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.158.202.101 Nov 21 10:25:25 ks10 sshd[12534]: Failed password for invalid user home from 91.158.202.101 port 36788 ssh2 ... |
2019-11-21 19:34:43 |
182.254.198.221 | attack | 11/21/2019-01:24:24.841959 182.254.198.221 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-11-21 19:17:44 |
212.64.88.97 | attackbots | DATE:2019-11-21 07:24:23,IP:212.64.88.97,MATCHES:10,PORT:ssh |
2019-11-21 19:17:30 |
114.34.213.197 | attackspambots | Honeypot attack, port: 23, PTR: 114-34-213-197.HINET-IP.hinet.net. |
2019-11-21 19:48:24 |
49.88.112.110 | attack | Nov 20 23:21:19 hanapaa sshd\[24208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.110 user=root Nov 20 23:21:21 hanapaa sshd\[24208\]: Failed password for root from 49.88.112.110 port 15811 ssh2 Nov 20 23:21:24 hanapaa sshd\[24208\]: Failed password for root from 49.88.112.110 port 15811 ssh2 Nov 20 23:24:26 hanapaa sshd\[24446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.110 user=root Nov 20 23:24:28 hanapaa sshd\[24446\]: Failed password for root from 49.88.112.110 port 64618 ssh2 |
2019-11-21 19:40:45 |
176.31.250.160 | attackbotsspam | Nov 7 07:38:49 odroid64 sshd\[25011\]: User root from 176.31.250.160 not allowed because not listed in AllowUsers Nov 7 07:38:49 odroid64 sshd\[25011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.160 user=root ... |
2019-11-21 19:54:23 |
103.248.174.11 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-11-21 19:50:41 |
114.67.95.49 | attackspambots | Nov 21 17:19:15 itv-usvr-01 sshd[16610]: Invalid user admin from 114.67.95.49 Nov 21 17:19:15 itv-usvr-01 sshd[16610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.95.49 Nov 21 17:19:15 itv-usvr-01 sshd[16610]: Invalid user admin from 114.67.95.49 Nov 21 17:19:17 itv-usvr-01 sshd[16610]: Failed password for invalid user admin from 114.67.95.49 port 55254 ssh2 |
2019-11-21 19:19:01 |
154.119.7.3 | attackspam | Nov 20 21:39:45 web9 sshd\[14771\]: Invalid user anatoli from 154.119.7.3 Nov 20 21:39:45 web9 sshd\[14771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.119.7.3 Nov 20 21:39:47 web9 sshd\[14771\]: Failed password for invalid user anatoli from 154.119.7.3 port 51485 ssh2 Nov 20 21:45:07 web9 sshd\[15552\]: Invalid user admin123@\# from 154.119.7.3 Nov 20 21:45:07 web9 sshd\[15552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.119.7.3 |
2019-11-21 19:30:19 |
175.119.91.147 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-11-21 19:19:42 |