城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.180.216.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;220.180.216.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:12:30 CST 2025
;; MSG SIZE rcvd: 108
Host 242.216.180.220.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 242.216.180.220.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.199.32.57 | attack | Mar 27 07:05:20 IngegnereFirenze sshd[12492]: Failed password for invalid user lzv from 139.199.32.57 port 46216 ssh2 ... |
2020-03-27 19:46:44 |
| 89.248.169.94 | attackspam | 03/27/2020-00:09:01.961917 89.248.169.94 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-27 19:37:39 |
| 129.205.7.67 | attackbots | DATE:2020-03-27 11:48:32,IP:129.205.7.67,MATCHES:11,PORT:ssh |
2020-03-27 19:40:12 |
| 167.71.128.144 | attackbotsspam | Mar 27 12:22:58 srv-ubuntu-dev3 sshd[54882]: Invalid user lhy from 167.71.128.144 Mar 27 12:22:58 srv-ubuntu-dev3 sshd[54882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.128.144 Mar 27 12:22:58 srv-ubuntu-dev3 sshd[54882]: Invalid user lhy from 167.71.128.144 Mar 27 12:23:00 srv-ubuntu-dev3 sshd[54882]: Failed password for invalid user lhy from 167.71.128.144 port 51102 ssh2 Mar 27 12:26:28 srv-ubuntu-dev3 sshd[55418]: Invalid user vyo from 167.71.128.144 Mar 27 12:26:28 srv-ubuntu-dev3 sshd[55418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.128.144 Mar 27 12:26:28 srv-ubuntu-dev3 sshd[55418]: Invalid user vyo from 167.71.128.144 Mar 27 12:26:30 srv-ubuntu-dev3 sshd[55418]: Failed password for invalid user vyo from 167.71.128.144 port 36532 ssh2 Mar 27 12:29:57 srv-ubuntu-dev3 sshd[55974]: Invalid user vvt from 167.71.128.144 ... |
2020-03-27 19:35:28 |
| 195.231.0.34 | attack | Mar 27 10:22:42 icinga sshd[330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.0.34 Mar 27 10:22:45 icinga sshd[330]: Failed password for invalid user kgd from 195.231.0.34 port 40316 ssh2 Mar 27 10:31:03 icinga sshd[13514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.231.0.34 ... |
2020-03-27 19:26:03 |
| 80.82.78.100 | attackbotsspam | scans 3 times in preceeding hours on the ports (in chronological order) 6884 40831 41022 resulting in total of 133 scans from 80.82.64.0/20 block. |
2020-03-27 19:04:37 |
| 61.84.196.50 | attackspam | Mar 27 12:18:30 markkoudstaal sshd[19952]: Failed password for root from 61.84.196.50 port 37166 ssh2 Mar 27 12:20:26 markkoudstaal sshd[20224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50 Mar 27 12:20:29 markkoudstaal sshd[20224]: Failed password for invalid user admin from 61.84.196.50 port 55866 ssh2 |
2020-03-27 19:29:04 |
| 114.119.166.181 | attack | [Fri Mar 27 18:37:43.686660 2020] [:error] [pid 10138:tid 140229637863168] [client 114.119.166.181:56556] [client 114.119.166.181] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/profil/meteorologi/list-all-categories/347-profil-kantor/pengaduan"] [unique_id "Xn3lhzmade8y4or@zXtEXgAAAfE"] ... |
2020-03-27 19:43:54 |
| 83.97.20.49 | attack | firewall-block, port(s): 82/tcp, 5555/tcp, 9080/tcp, 9999/tcp, 10000/tcp |
2020-03-27 19:04:20 |
| 189.126.72.41 | attackspambots | Mar 27 12:01:51 ewelt sshd[17995]: Invalid user cxd from 189.126.72.41 port 33807 Mar 27 12:01:51 ewelt sshd[17995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.126.72.41 Mar 27 12:01:51 ewelt sshd[17995]: Invalid user cxd from 189.126.72.41 port 33807 Mar 27 12:01:53 ewelt sshd[17995]: Failed password for invalid user cxd from 189.126.72.41 port 33807 ssh2 ... |
2020-03-27 19:30:59 |
| 112.17.173.49 | attack | 3389BruteforceStormFW23 |
2020-03-27 19:50:59 |
| 222.186.31.83 | attackspam | SSH Authentication Attempts Exceeded |
2020-03-27 19:36:03 |
| 169.55.166.76 | attackspam | Invalid user alex from 169.55.166.76 port 51534 |
2020-03-27 19:22:09 |
| 83.209.20.188 | attack | Mar 27 11:02:12 pi sshd[20586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.209.20.188 Mar 27 11:02:13 pi sshd[20586]: Failed password for invalid user anil from 83.209.20.188 port 21699 ssh2 |
2020-03-27 19:22:36 |
| 206.189.26.171 | attack | Invalid user www from 206.189.26.171 port 47050 |
2020-03-27 19:41:00 |