城市(city): Palermo
省份(region): Regione Siciliana
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.201.85.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;23.201.85.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 10:32:49 CST 2025
;; MSG SIZE rcvd: 105
42.85.201.23.in-addr.arpa domain name pointer a23-201-85-42.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.85.201.23.in-addr.arpa name = a23-201-85-42.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.27.11.126 | attack | 2020-09-20T11:31:59.751848abusebot-7.cloudsearch.cf sshd[25234]: Invalid user test from 118.27.11.126 port 41638 2020-09-20T11:31:59.755954abusebot-7.cloudsearch.cf sshd[25234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-11-126.mtmf.static.cnode.io 2020-09-20T11:31:59.751848abusebot-7.cloudsearch.cf sshd[25234]: Invalid user test from 118.27.11.126 port 41638 2020-09-20T11:32:01.500250abusebot-7.cloudsearch.cf sshd[25234]: Failed password for invalid user test from 118.27.11.126 port 41638 ssh2 2020-09-20T11:35:53.668419abusebot-7.cloudsearch.cf sshd[25390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-11-126.mtmf.static.cnode.io user=root 2020-09-20T11:35:55.869316abusebot-7.cloudsearch.cf sshd[25390]: Failed password for root from 118.27.11.126 port 50592 ssh2 2020-09-20T11:39:40.106371abusebot-7.cloudsearch.cf sshd[25494]: Invalid user postgres from 118.27.11.126 port 59552 ... |
2020-09-21 02:41:48 |
| 185.220.102.6 | attackbots | Sep 20 12:09:16 ws26vmsma01 sshd[205835]: Failed password for root from 185.220.102.6 port 33301 ssh2 Sep 20 12:09:30 ws26vmsma01 sshd[205835]: error: maximum authentication attempts exceeded for root from 185.220.102.6 port 33301 ssh2 [preauth] ... |
2020-09-21 02:50:33 |
| 216.218.206.88 | attackbots | Found on CINS badguys / proto=6 . srcport=45265 . dstport=443 . (541) |
2020-09-21 03:02:55 |
| 159.253.46.18 | attackbots | 159.253.46.18 - - [20/Sep/2020:20:22:40 +0200] "POST /xmlrpc.php HTTP/1.1" 403 16731 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.253.46.18 - - [20/Sep/2020:20:29:23 +0200] "POST /xmlrpc.php HTTP/1.1" 403 21241 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-21 02:56:14 |
| 201.1.173.138 | attack | Listed on zen-spamhaus also barracudaCentral and dnsbl-sorbs / proto=6 . srcport=20052 . dstport=8080 . (2280) |
2020-09-21 02:42:05 |
| 46.182.21.248 | attack | (sshd) Failed SSH login from 46.182.21.248 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 20 02:59:34 server5 sshd[17237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.182.21.248 user=root Sep 20 02:59:37 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2 Sep 20 02:59:39 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2 Sep 20 02:59:42 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2 Sep 20 02:59:43 server5 sshd[17237]: Failed password for root from 46.182.21.248 port 42279 ssh2 |
2020-09-21 03:13:34 |
| 218.92.0.211 | attackbots | Sep 21 00:16:12 mx sshd[825030]: Failed password for root from 218.92.0.211 port 33612 ssh2 Sep 21 00:16:15 mx sshd[825030]: Failed password for root from 218.92.0.211 port 33612 ssh2 Sep 21 00:16:19 mx sshd[825030]: Failed password for root from 218.92.0.211 port 33612 ssh2 Sep 21 00:17:37 mx sshd[825049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211 user=root Sep 21 00:17:39 mx sshd[825049]: Failed password for root from 218.92.0.211 port 29227 ssh2 ... |
2020-09-21 02:55:23 |
| 91.121.81.12 | attackbots | Sep 20 23:53:00 mx sshd[824580]: Invalid user guest from 91.121.81.12 port 45610 Sep 20 23:53:00 mx sshd[824580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.81.12 Sep 20 23:53:00 mx sshd[824580]: Invalid user guest from 91.121.81.12 port 45610 Sep 20 23:53:02 mx sshd[824580]: Failed password for invalid user guest from 91.121.81.12 port 45610 ssh2 Sep 20 23:53:19 mx sshd[824582]: Invalid user guest from 91.121.81.12 port 33044 ... |
2020-09-21 02:38:11 |
| 189.159.110.252 | attack | 1600534729 - 09/19/2020 18:58:49 Host: 189.159.110.252/189.159.110.252 Port: 445 TCP Blocked |
2020-09-21 02:42:31 |
| 112.85.42.200 | attackbotsspam | Sep 20 21:03:29 vps sshd[2525]: Failed password for root from 112.85.42.200 port 6571 ssh2 Sep 20 21:03:33 vps sshd[2525]: Failed password for root from 112.85.42.200 port 6571 ssh2 Sep 20 21:03:37 vps sshd[2525]: Failed password for root from 112.85.42.200 port 6571 ssh2 Sep 20 21:03:41 vps sshd[2525]: Failed password for root from 112.85.42.200 port 6571 ssh2 ... |
2020-09-21 03:05:01 |
| 34.244.98.129 | attack | Port Scan: TCP/80 |
2020-09-21 03:01:11 |
| 46.121.94.85 | attackspambots | Found on Alienvault / proto=6 . srcport=7021 . dstport=5555 . (2276) |
2020-09-21 03:03:30 |
| 122.51.193.108 | attackbotsspam | Sep 20 17:22:24 mellenthin sshd[8141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.193.108 Sep 20 17:22:26 mellenthin sshd[8141]: Failed password for invalid user www from 122.51.193.108 port 28604 ssh2 |
2020-09-21 02:40:03 |
| 117.254.63.154 | attackbotsspam | 1600534725 - 09/19/2020 18:58:45 Host: 117.254.63.154/117.254.63.154 Port: 445 TCP Blocked ... |
2020-09-21 02:46:42 |
| 120.133.136.191 | attackbotsspam | Sep 20 20:11:16 server sshd[52423]: Failed password for invalid user ftptest from 120.133.136.191 port 57429 ssh2 Sep 20 20:12:27 server sshd[52739]: Failed password for root from 120.133.136.191 port 49178 ssh2 Sep 20 20:13:40 server sshd[52908]: Failed password for root from 120.133.136.191 port 39359 ssh2 |
2020-09-21 02:39:16 |