城市(city): unknown
省份(region): unknown
国家(country): Taiwan (Province of China)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.162.193.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;218.162.193.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 09:20:21 CST 2025
;; MSG SIZE rcvd: 108
134.193.162.218.in-addr.arpa domain name pointer 218-162-193-134.dynamic-ip.hinet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.193.162.218.in-addr.arpa name = 218-162-193-134.dynamic-ip.hinet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 36.112.128.99 | attackbots | Sep 15 04:47:44 dedicated sshd[14480]: Invalid user ubuntu from 36.112.128.99 port 42217 |
2019-09-15 10:53:34 |
| 92.118.160.9 | attackspam | Port scan |
2019-09-15 10:54:41 |
| 61.228.246.54 | attackbotsspam | 2019-09-14T22:48:55.985333 sshd[9244]: Invalid user admin from 61.228.246.54 port 34596 2019-09-14T22:48:55.998609 sshd[9244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.228.246.54 2019-09-14T22:48:55.985333 sshd[9244]: Invalid user admin from 61.228.246.54 port 34596 2019-09-14T22:48:57.787542 sshd[9244]: Failed password for invalid user admin from 61.228.246.54 port 34596 ssh2 2019-09-14T22:48:55.998609 sshd[9244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.228.246.54 2019-09-14T22:48:55.985333 sshd[9244]: Invalid user admin from 61.228.246.54 port 34596 2019-09-14T22:48:57.787542 sshd[9244]: Failed password for invalid user admin from 61.228.246.54 port 34596 ssh2 2019-09-14T22:49:01.587410 sshd[9244]: Failed password for invalid user admin from 61.228.246.54 port 34596 ssh2 ... |
2019-09-15 10:32:33 |
| 61.68.242.195 | attackspambots | Sep 14 19:49:19 isowiki sshd[16887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.68.242.195 user=r.r Sep 14 19:49:20 isowiki sshd[16887]: Failed password for r.r from 61.68.242.195 port 51229 ssh2 Sep 14 19:49:23 isowiki sshd[16887]: Failed password for r.r from 61.68.242.195 port 51229 ssh2 Sep 14 19:49:26 isowiki sshd[16887]: Failed password for r.r from 61.68.242.195 port 51229 ssh2 Sep 14 19:49:28 isowiki sshd[16887]: Failed password for r.r from 61.68.242.195 port 51229 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=61.68.242.195 |
2019-09-15 10:26:21 |
| 115.236.190.75 | attackbotsspam | 2019-09-15T03:14:09.989430beta postfix/smtpd[29346]: warning: unknown[115.236.190.75]: SASL LOGIN authentication failed: authentication failure 2019-09-15T03:14:15.380676beta postfix/smtpd[29346]: warning: unknown[115.236.190.75]: SASL LOGIN authentication failed: authentication failure 2019-09-15T03:14:20.783805beta postfix/smtpd[29346]: warning: unknown[115.236.190.75]: SASL LOGIN authentication failed: authentication failure ... |
2019-09-15 10:16:54 |
| 45.181.196.105 | attack | BR - 1H : (107) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN0 IP : 45.181.196.105 CIDR : 45.181.196.0/22 PREFIX COUNT : 50243 UNIQUE IP COUNT : 856105392 WYKRYTE ATAKI Z ASN0 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-09-15 10:08:17 |
| 106.122.191.207 | attackbots | " " |
2019-09-15 10:19:44 |
| 159.89.13.139 | attackbots | Sep 14 11:51:34 eddieflores sshd\[7735\]: Invalid user 1010 from 159.89.13.139 Sep 14 11:51:34 eddieflores sshd\[7735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.13.139 Sep 14 11:51:36 eddieflores sshd\[7735\]: Failed password for invalid user 1010 from 159.89.13.139 port 50464 ssh2 Sep 14 11:55:56 eddieflores sshd\[8075\]: Invalid user !@\#123 from 159.89.13.139 Sep 14 11:55:56 eddieflores sshd\[8075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.13.139 |
2019-09-15 10:28:11 |
| 120.92.119.155 | attackspam | Invalid user wwwadm from 120.92.119.155 port 38096 |
2019-09-15 10:39:30 |
| 89.45.17.11 | attackbots | Sep 14 10:44:20 friendsofhawaii sshd\[19340\]: Invalid user roger from 89.45.17.11 Sep 14 10:44:20 friendsofhawaii sshd\[19340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11 Sep 14 10:44:22 friendsofhawaii sshd\[19340\]: Failed password for invalid user roger from 89.45.17.11 port 33127 ssh2 Sep 14 10:48:45 friendsofhawaii sshd\[19721\]: Invalid user chef from 89.45.17.11 Sep 14 10:48:45 friendsofhawaii sshd\[19721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11 |
2019-09-15 10:43:01 |
| 182.61.33.137 | attackbotsspam | Sep 15 03:17:32 master sshd[15352]: Failed password for invalid user ftpusr from 182.61.33.137 port 43178 ssh2 Sep 15 03:27:21 master sshd[15376]: Failed password for invalid user victor from 182.61.33.137 port 40516 ssh2 Sep 15 03:31:42 master sshd[15722]: Failed password for invalid user tomcat from 182.61.33.137 port 53050 ssh2 Sep 15 03:35:50 master sshd[15740]: Failed password for root from 182.61.33.137 port 37358 ssh2 Sep 15 03:39:56 master sshd[15758]: Failed password for invalid user aldis from 182.61.33.137 port 49896 ssh2 |
2019-09-15 10:09:58 |
| 60.174.92.50 | attackspam | [munged]::80 60.174.92.50 - - [14/Sep/2019:20:10:43 +0200] "POST /[munged]: HTTP/1.1" 200 4214 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 60.174.92.50 - - [14/Sep/2019:20:10:45 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 60.174.92.50 - - [14/Sep/2019:20:10:48 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 60.174.92.50 - - [14/Sep/2019:20:10:51 +0200] "POST /[munged]: HTTP/1.1" 200 4213 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 60.174.92.50 - - [14/Sep/2019:20:11:56 +0200] "POST /[munged]: HTTP/1.1" 200 4214 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::80 60.174.92.50 - - [14/Sep/2019:20:11:58 +0200] "POST |
2019-09-15 10:09:22 |
| 182.61.21.197 | attackbotsspam | Sep 14 11:41:05 home sshd[17278]: Invalid user amir from 182.61.21.197 port 47096 Sep 14 11:41:05 home sshd[17278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.21.197 Sep 14 11:41:05 home sshd[17278]: Invalid user amir from 182.61.21.197 port 47096 Sep 14 11:41:07 home sshd[17278]: Failed password for invalid user amir from 182.61.21.197 port 47096 ssh2 Sep 14 11:57:28 home sshd[17319]: Invalid user loch from 182.61.21.197 port 49770 Sep 14 11:57:28 home sshd[17319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.21.197 Sep 14 11:57:28 home sshd[17319]: Invalid user loch from 182.61.21.197 port 49770 Sep 14 11:57:30 home sshd[17319]: Failed password for invalid user loch from 182.61.21.197 port 49770 ssh2 Sep 14 12:02:10 home sshd[17361]: Invalid user manager from 182.61.21.197 port 33376 Sep 14 12:02:10 home sshd[17361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182 |
2019-09-15 10:45:57 |
| 200.86.235.57 | attackbotsspam | Spam Timestamp : 14-Sep-19 18:53 BlockList Provider combined abuse (759) |
2019-09-15 10:36:10 |
| 89.248.160.193 | attackspam | Sep 15 03:11:53 lenivpn01 kernel: \[742705.911153\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=89.248.160.193 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=49824 PROTO=TCP SPT=49107 DPT=3814 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 15 04:14:00 lenivpn01 kernel: \[746432.384203\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=89.248.160.193 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=11434 PROTO=TCP SPT=49107 DPT=3838 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 15 04:15:55 lenivpn01 kernel: \[746547.530269\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=89.248.160.193 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=47982 PROTO=TCP SPT=49107 DPT=3832 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-09-15 10:29:38 |