城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.107.140.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.107.140.44. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:30:12 CST 2025
;; MSG SIZE rcvd: 107
Host 44.140.107.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 44.140.107.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 151.217.208.236 | attack | Aug 22 20:35:18 mercury wordpress(109.74.200.221)[17731]: Pingback error 0 generated from 151.217.208.236 ... |
2019-08-23 04:14:31 |
| 166.62.92.37 | attack | ECShop Remote Code Execution Vulnerability, PTR: ip-166-62-92-37.ip.secureserver.net. |
2019-08-23 04:20:06 |
| 165.227.165.98 | attack | Aug 22 10:17:08 kapalua sshd\[15194\]: Invalid user diradmin from 165.227.165.98 Aug 22 10:17:08 kapalua sshd\[15194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.165.98 Aug 22 10:17:11 kapalua sshd\[15194\]: Failed password for invalid user diradmin from 165.227.165.98 port 52980 ssh2 Aug 22 10:20:57 kapalua sshd\[15506\]: Invalid user ubuntu from 165.227.165.98 Aug 22 10:20:57 kapalua sshd\[15506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.165.98 |
2019-08-23 04:27:21 |
| 202.53.88.165 | attack | Unauthorized connection attempt from IP address 202.53.88.165 on Port 445(SMB) |
2019-08-23 04:12:11 |
| 157.230.43.135 | attackbotsspam | Aug 23 01:32:40 areeb-Workstation sshd\[13495\]: Invalid user graphics from 157.230.43.135 Aug 23 01:32:40 areeb-Workstation sshd\[13495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.43.135 Aug 23 01:32:42 areeb-Workstation sshd\[13495\]: Failed password for invalid user graphics from 157.230.43.135 port 56608 ssh2 ... |
2019-08-23 04:03:50 |
| 117.44.171.251 | attackbotsspam | Unauthorized connection attempt from IP address 117.44.171.251 on Port 445(SMB) |
2019-08-23 04:22:34 |
| 125.5.184.86 | attack | Aug 22 11:36:33 *** sshd[19198]: Failed password for invalid user odoo from 125.5.184.86 port 43796 ssh2 Aug 22 12:07:32 *** sshd[20023]: Failed password for invalid user suporte from 125.5.184.86 port 57500 ssh2 Aug 22 12:16:10 *** sshd[20238]: Failed password for invalid user ftpuser from 125.5.184.86 port 47518 ssh2 Aug 22 12:24:13 *** sshd[20460]: Failed password for invalid user weblogic from 125.5.184.86 port 37424 ssh2 Aug 22 12:32:41 *** sshd[20617]: Failed password for invalid user test2 from 125.5.184.86 port 55688 ssh2 Aug 22 12:49:18 *** sshd[21518]: Failed password for invalid user user1 from 125.5.184.86 port 35660 ssh2 Aug 22 12:57:39 *** sshd[21678]: Failed password for invalid user denied from 125.5.184.86 port 53910 ssh2 Aug 22 13:06:07 *** sshd[21919]: Failed password for invalid user centos from 125.5.184.86 port 43906 ssh2 Aug 22 13:14:13 *** sshd[22141]: Failed password for invalid user webadmin from 125.5.184.86 port 33754 ssh2 Aug 22 13:22:35 *** sshd[22365]: Failed password for invali |
2019-08-23 04:12:51 |
| 211.195.12.33 | attackbotsspam | Aug 22 09:50:00 friendsofhawaii sshd\[11572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33 user=root Aug 22 09:50:02 friendsofhawaii sshd\[11572\]: Failed password for root from 211.195.12.33 port 41247 ssh2 Aug 22 09:54:57 friendsofhawaii sshd\[12003\]: Invalid user rony from 211.195.12.33 Aug 22 09:54:57 friendsofhawaii sshd\[12003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33 Aug 22 09:54:58 friendsofhawaii sshd\[12003\]: Failed password for invalid user rony from 211.195.12.33 port 35876 ssh2 |
2019-08-23 04:03:22 |
| 31.13.63.70 | attack | 2019-08-22T21:41:29.079778 sshd[31768]: Invalid user cvs from 31.13.63.70 port 60739 2019-08-22T21:41:29.089822 sshd[31768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.13.63.70 2019-08-22T21:41:29.079778 sshd[31768]: Invalid user cvs from 31.13.63.70 port 60739 2019-08-22T21:41:31.152337 sshd[31768]: Failed password for invalid user cvs from 31.13.63.70 port 60739 ssh2 2019-08-22T21:50:39.045621 sshd[31929]: Invalid user ec2-user from 31.13.63.70 port 48758 ... |
2019-08-23 04:02:57 |
| 51.75.52.195 | attackspam | Aug 22 21:59:27 dedicated sshd[6355]: Invalid user knus from 51.75.52.195 port 43686 |
2019-08-23 04:09:42 |
| 186.10.17.84 | attackbotsspam | Aug 22 22:16:07 vps691689 sshd[32531]: Failed password for root from 186.10.17.84 port 42306 ssh2 Aug 22 22:21:17 vps691689 sshd[32628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.17.84 ... |
2019-08-23 04:22:56 |
| 106.12.211.247 | attackspam | Aug 22 21:48:56 OPSO sshd\[8036\]: Invalid user fan from 106.12.211.247 port 49112 Aug 22 21:48:56 OPSO sshd\[8036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.211.247 Aug 22 21:48:57 OPSO sshd\[8036\]: Failed password for invalid user fan from 106.12.211.247 port 49112 ssh2 Aug 22 21:53:26 OPSO sshd\[8956\]: Invalid user dis from 106.12.211.247 port 36216 Aug 22 21:53:26 OPSO sshd\[8956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.211.247 |
2019-08-23 04:01:09 |
| 111.52.246.6 | attackspam | RDP Brute-Force (Grieskirchen RZ1) |
2019-08-23 04:13:08 |
| 94.176.77.55 | attackbots | (Aug 22) LEN=40 TTL=244 ID=12494 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=20591 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=51435 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=63695 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=29772 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=25636 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=44623 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=12422 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=27772 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=43715 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=52409 DF TCP DPT=23 WINDOW=14600 SYN (Aug 22) LEN=40 TTL=244 ID=11023 DF TCP DPT=23 WINDOW=14600 SYN (Aug 21) LEN=40 TTL=244 ID=17452 DF TCP DPT=23 WINDOW=14600 SYN (Aug 21) LEN=40 TTL=244 ID=60922 DF TCP DPT=23 WINDOW=14600 SYN (Aug 21) LEN=40 TTL=244 ID=40027 DF TCP DPT=23 WINDOW=14600 ... |
2019-08-23 04:36:38 |
| 129.204.40.44 | attackbotsspam | Aug 22 21:35:21 [munged] sshd[7157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.44 user=mail Aug 22 21:35:23 [munged] sshd[7157]: Failed password for mail from 129.204.40.44 port 59524 ssh2 |
2019-08-23 04:12:31 |