城市(city): unknown
省份(region): unknown
国家(country): Spain
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.4.118.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64496
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;213.4.118.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:44:58 CST 2025
;; MSG SIZE rcvd: 105
12.118.4.213.in-addr.arpa is an alias for 12.0.118.4.213.in-addr.arpa.
12.0.118.4.213.in-addr.arpa domain name pointer 12.red-213-4-118.customer.static.ccgg.telefonica.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.118.4.213.in-addr.arpa canonical name = 12.0.118.4.213.in-addr.arpa.
12.0.118.4.213.in-addr.arpa name = 12.red-213-4-118.customer.static.ccgg.telefonica.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.13.189.172 | attackspam | Bruteforce detected by fail2ban |
2020-09-21 04:03:35 |
| 184.17.81.72 | attackspambots | 2020-09-20T17:36:02.101273ldap.arvenenaske.de sshd[873227]: Connection from 184.17.81.72 port 40794 on 5.199.128.55 port 22 rdomain "" 2020-09-20T17:36:02.806151ldap.arvenenaske.de sshd[873227]: Invalid user admin from 184.17.81.72 port 40794 2020-09-20T17:36:02.836432ldap.arvenenaske.de sshd[873227]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.17.81.72 user=admin 2020-09-20T17:36:02.837708ldap.arvenenaske.de sshd[873227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.17.81.72 2020-09-20T17:36:02.101273ldap.arvenenaske.de sshd[873227]: Connection from 184.17.81.72 port 40794 on 5.199.128.55 port 22 rdomain "" 2020-09-20T17:36:02.806151ldap.arvenenaske.de sshd[873227]: Invalid user admin from 184.17.81.72 port 40794 2020-09-20T17:36:05.141145ldap.arvenenaske.de sshd[873227]: Failed password for invalid user admin from 184.17.81.72 port 40794 ssh2 2020-09-20T17:46:17.548601ldap.arv........ ------------------------------ |
2020-09-21 03:52:59 |
| 209.141.34.104 | attack | srvr2: (mod_security) mod_security (id:920350) triggered by 209.141.34.104 (US/-/-): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/20 21:45:24 [error] 7235#0: *49761 [client 209.141.34.104] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host' [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "160063112458.029310"] [ref "o0,12v21,12"], client: 209.141.34.104, [redacted] request: "GET / HTTP/1.1" [redacted] |
2020-09-21 04:03:06 |
| 65.39.198.100 | attackbotsspam | [f2b] sshd bruteforce, retries: 1 |
2020-09-21 04:12:13 |
| 106.12.16.2 | attackbotsspam | 2020-09-21T00:37:27.831113hostname sshd[12680]: Invalid user ts from 106.12.16.2 port 45302 2020-09-21T00:37:30.256574hostname sshd[12680]: Failed password for invalid user ts from 106.12.16.2 port 45302 ssh2 2020-09-21T00:41:14.110039hostname sshd[14172]: Invalid user odoo9 from 106.12.16.2 port 47004 ... |
2020-09-21 03:57:06 |
| 218.92.0.173 | attackspam | Sep 20 22:04:30 vps639187 sshd\[797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root Sep 20 22:04:32 vps639187 sshd\[797\]: Failed password for root from 218.92.0.173 port 46465 ssh2 Sep 20 22:04:35 vps639187 sshd\[797\]: Failed password for root from 218.92.0.173 port 46465 ssh2 ... |
2020-09-21 04:11:16 |
| 212.70.149.52 | attackspam | 2020-09-20T21:47:41.297207www postfix/smtpd[20574]: warning: unknown[212.70.149.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-09-20T21:48:05.477857www postfix/smtpd[20574]: warning: unknown[212.70.149.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-09-20T21:48:31.462773www postfix/smtpd[20574]: warning: unknown[212.70.149.52]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-21 03:51:50 |
| 106.12.185.102 | attackbotsspam | Sep 21 02:41:47 web1 sshd[14820]: Invalid user upload from 106.12.185.102 port 51764 Sep 21 02:41:47 web1 sshd[14820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.185.102 Sep 21 02:41:47 web1 sshd[14820]: Invalid user upload from 106.12.185.102 port 51764 Sep 21 02:41:49 web1 sshd[14820]: Failed password for invalid user upload from 106.12.185.102 port 51764 ssh2 Sep 21 02:55:45 web1 sshd[19449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.185.102 user=root Sep 21 02:55:47 web1 sshd[19449]: Failed password for root from 106.12.185.102 port 43462 ssh2 Sep 21 03:00:36 web1 sshd[21039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.185.102 user=root Sep 21 03:00:38 web1 sshd[21039]: Failed password for root from 106.12.185.102 port 49850 ssh2 Sep 21 03:05:34 web1 sshd[22723]: Invalid user test from 106.12.185.102 port 56276 ... |
2020-09-21 04:07:44 |
| 222.186.175.216 | attackbotsspam | Sep 20 21:58:52 minden010 sshd[6636]: Failed password for root from 222.186.175.216 port 31230 ssh2 Sep 20 21:59:03 minden010 sshd[6636]: Failed password for root from 222.186.175.216 port 31230 ssh2 Sep 20 21:59:05 minden010 sshd[6636]: Failed password for root from 222.186.175.216 port 31230 ssh2 Sep 20 21:59:05 minden010 sshd[6636]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 31230 ssh2 [preauth] ... |
2020-09-21 04:16:51 |
| 106.12.28.152 | attack | Sep 20 15:38:41 george sshd[7922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.152 Sep 20 15:38:43 george sshd[7922]: Failed password for invalid user www from 106.12.28.152 port 56776 ssh2 Sep 20 15:40:48 george sshd[8055]: Invalid user user from 106.12.28.152 port 59296 Sep 20 15:40:48 george sshd[8055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.28.152 Sep 20 15:40:50 george sshd[8055]: Failed password for invalid user user from 106.12.28.152 port 59296 ssh2 ... |
2020-09-21 03:54:32 |
| 168.70.111.189 | attackbots | Sep 20 19:04:09 vps639187 sshd\[29889\]: Invalid user support from 168.70.111.189 port 42625 Sep 20 19:04:09 vps639187 sshd\[29889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.70.111.189 Sep 20 19:04:11 vps639187 sshd\[29889\]: Failed password for invalid user support from 168.70.111.189 port 42625 ssh2 ... |
2020-09-21 03:55:49 |
| 195.54.166.118 | attack | RDP brute forcing (r) |
2020-09-21 04:23:53 |
| 209.17.97.18 | attack | Brute force attack stopped by firewall |
2020-09-21 03:49:45 |
| 121.116.98.130 | attackspambots | 20 attempts against mh-ssh on sonic |
2020-09-21 04:01:17 |
| 91.121.116.65 | attackbotsspam | Sep 20 21:41:50 mout sshd[8118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.116.65 Sep 20 21:41:50 mout sshd[8118]: Invalid user admin from 91.121.116.65 port 58820 Sep 20 21:41:52 mout sshd[8118]: Failed password for invalid user admin from 91.121.116.65 port 58820 ssh2 |
2020-09-21 04:16:26 |