城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.144.50.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2015
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.144.50.48. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:43:14 CST 2025
;; MSG SIZE rcvd: 106
Host 48.50.144.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 48.50.144.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 107.170.172.23 | attackspambots | Jul 4 09:58:29 MK-Soft-VM4 sshd\[21105\]: Invalid user pvm from 107.170.172.23 port 57031 Jul 4 09:58:29 MK-Soft-VM4 sshd\[21105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.172.23 Jul 4 09:58:31 MK-Soft-VM4 sshd\[21105\]: Failed password for invalid user pvm from 107.170.172.23 port 57031 ssh2 ... |
2019-07-04 19:25:40 |
| 118.24.92.216 | attackspam | Jul 4 01:01:01 gcems sshd\[11823\]: Invalid user wo from 118.24.92.216 port 37998 Jul 4 01:01:02 gcems sshd\[11823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.92.216 Jul 4 01:01:03 gcems sshd\[11823\]: Failed password for invalid user wo from 118.24.92.216 port 37998 ssh2 Jul 4 01:07:36 gcems sshd\[20120\]: Invalid user teamspeak3 from 118.24.92.216 port 34918 Jul 4 01:07:38 gcems sshd\[20120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.92.216 ... |
2019-07-04 20:00:43 |
| 181.41.248.201 | attackspambots | Jul 4 07:46:45 tamoto postfix/smtpd[11283]: connect from unknown[181.41.248.201] Jul 4 07:46:49 tamoto postfix/smtpd[11283]: warning: unknown[181.41.248.201]: SASL CRAM-MD5 authentication failed: authentication failure Jul 4 07:46:49 tamoto postfix/smtpd[11283]: warning: unknown[181.41.248.201]: SASL PLAIN authentication failed: authentication failure Jul 4 07:46:51 tamoto postfix/smtpd[11283]: warning: unknown[181.41.248.201]: SASL LOGIN authentication failed: authentication failure Jul 4 07:46:52 tamoto postfix/smtpd[11283]: disconnect from unknown[181.41.248.201] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=181.41.248.201 |
2019-07-04 19:54:13 |
| 77.28.17.14 | attack | 2019-07-04 07:41:26 unexpected disconnection while reading SMTP command from ([77.28.17.14]) [77.28.17.14]:12321 I=[10.100.18.25]:25 (error: Connection reset by peer) 2019-07-04 07:41:49 unexpected disconnection while reading SMTP command from ([77.28.17.14]) [77.28.17.14]:29339 I=[10.100.18.25]:25 (error: Connection reset by peer) 2019-07-04 07:42:31 unexpected disconnection while reading SMTP command from ([77.28.17.14]) [77.28.17.14]:41087 I=[10.100.18.25]:25 (error: Connection reset by peer) ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=77.28.17.14 |
2019-07-04 19:28:36 |
| 65.132.59.34 | attack | Scanning unused Default website or suspicious access to valid sites from IP marked as abusive |
2019-07-04 19:26:48 |
| 171.244.49.72 | attackbots | Detected by ModSecurity. Request URI: /wp-login.php |
2019-07-04 19:28:03 |
| 112.85.42.237 | attackbots | Jul 4 12:12:10 MainVPS sshd[5901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237 user=root Jul 4 12:12:13 MainVPS sshd[5901]: Failed password for root from 112.85.42.237 port 58236 ssh2 Jul 4 12:13:33 MainVPS sshd[5986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237 user=root Jul 4 12:13:34 MainVPS sshd[5986]: Failed password for root from 112.85.42.237 port 26664 ssh2 Jul 4 12:14:32 MainVPS sshd[6055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237 user=root Jul 4 12:14:34 MainVPS sshd[6055]: Failed password for root from 112.85.42.237 port 52443 ssh2 ... |
2019-07-04 19:27:09 |
| 213.32.254.124 | attackbotsspam | Absender hat Spam-Falle ausgel?st |
2019-07-04 20:14:15 |
| 171.237.166.197 | attackbotsspam | Honeypot attack, port: 23, PTR: dynamic-ip-adsl.viettel.vn. |
2019-07-04 20:10:03 |
| 39.36.27.219 | attackbots | 2019-07-04 07:08:48 H=([39.36.27.219]) [39.36.27.219]:4575 I=[10.100.18.20]:25 F= |
2019-07-04 20:05:19 |
| 223.230.153.242 | attack | 2019-07-04 06:53:34 H=([223.230.153.242]) [223.230.153.242]:20595 I=[10.100.18.25]:25 F= |
2019-07-04 19:41:01 |
| 122.193.115.238 | attackspambots | Jul 4 07:49:15 h1946882 sshd[1220]: pam_unix(sshd:auth): authenticatio= n failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D122.1= 93.115.238=20 Jul 4 07:49:17 h1946882 sshd[1220]: Failed password for invalid user a= dmin from 122.193.115.238 port 48815 ssh2 Jul 4 07:49:20 h1946882 sshd[1220]: Failed password for invalid user a= dmin from 122.193.115.238 port 48815 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=122.193.115.238 |
2019-07-04 20:10:32 |
| 203.195.149.192 | attackspam | Invalid user test from 203.195.149.192 port 45160 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.149.192 Failed password for invalid user test from 203.195.149.192 port 45160 ssh2 Invalid user bbb from 203.195.149.192 port 38860 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.149.192 |
2019-07-04 19:27:41 |
| 138.197.72.48 | attackbotsspam | Jul 4 12:50:13 62-210-73-4 sshd\[15369\]: Invalid user ameen from 138.197.72.48 port 59222 Jul 4 12:50:13 62-210-73-4 sshd\[15369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.72.48 ... |
2019-07-04 19:38:41 |
| 130.211.83.74 | attackspam | 130.211.83.74 - - [04/Jul/2019:02:08:16 -0400] "GET /?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0 HTTP/1.1" 200 17259 "https://californiafaucetsupply.com/?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-07-04 19:36:01 |