城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.145.250.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.145.250.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:07:43 CST 2025
;; MSG SIZE rcvd: 108
Host 150.250.145.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 150.250.145.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 83.17.17.198 | attackspam | scan z |
2019-07-20 08:57:43 |
| 94.101.95.145 | attack | WP_xmlrpc_attack |
2019-07-20 09:23:01 |
| 144.76.99.215 | attack | 20 attempts against mh-misbehave-ban on milky.magehost.pro |
2019-07-20 09:20:27 |
| 69.30.213.202 | attack | Automatic report - Banned IP Access |
2019-07-20 09:03:54 |
| 2.185.215.6 | attackbotsspam | 2019-07-19 11:33:23 H=(luxuryclass.it) [2.185.215.6]:53928 I=[192.147.25.65]:25 F= |
2019-07-20 08:55:08 |
| 159.89.225.82 | attackbotsspam | 2019-07-20T00:28:45.683311abusebot-6.cloudsearch.cf sshd\[16601\]: Invalid user gemma from 159.89.225.82 port 54958 |
2019-07-20 08:48:46 |
| 120.52.152.17 | attackspam | Automatic report - Port Scan Attack |
2019-07-20 09:12:16 |
| 122.193.106.54 | attackspam | Attempts against Pop3/IMAP |
2019-07-20 09:10:57 |
| 176.31.253.55 | attack | 2019-07-20T00:19:20.717115abusebot.cloudsearch.cf sshd\[26758\]: Invalid user nikola from 176.31.253.55 port 47668 |
2019-07-20 08:42:47 |
| 145.239.83.119 | attackspambots | Jul 19 20:34:08 lnxded63 sshd[15386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.83.119 |
2019-07-20 09:19:26 |
| 123.7.178.136 | attackspam | Jul 19 10:03:27 home sshd[27612]: Invalid user user from 123.7.178.136 port 54584 Jul 19 10:03:27 home sshd[27612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.7.178.136 Jul 19 10:03:27 home sshd[27612]: Invalid user user from 123.7.178.136 port 54584 Jul 19 10:03:29 home sshd[27612]: Failed password for invalid user user from 123.7.178.136 port 54584 ssh2 Jul 19 10:16:25 home sshd[27644]: Invalid user michael from 123.7.178.136 port 51357 Jul 19 10:16:26 home sshd[27644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.7.178.136 Jul 19 10:16:25 home sshd[27644]: Invalid user michael from 123.7.178.136 port 51357 Jul 19 10:16:27 home sshd[27644]: Failed password for invalid user michael from 123.7.178.136 port 51357 ssh2 Jul 19 10:22:12 home sshd[27667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.7.178.136 user=root Jul 19 10:22:14 home sshd[27667]: Failed password for |
2019-07-20 08:56:40 |
| 206.189.131.213 | attackspam | Invalid user bakerm from 206.189.131.213 port 37960 |
2019-07-20 08:58:33 |
| 78.20.5.37 | attackspam | Jul 20 02:19:48 tux-35-217 sshd\[1546\]: Invalid user sandeep from 78.20.5.37 port 53021 Jul 20 02:19:48 tux-35-217 sshd\[1546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.20.5.37 Jul 20 02:19:49 tux-35-217 sshd\[1546\]: Failed password for invalid user sandeep from 78.20.5.37 port 53021 ssh2 Jul 20 02:25:29 tux-35-217 sshd\[1595\]: Invalid user nagios from 78.20.5.37 port 52073 Jul 20 02:25:29 tux-35-217 sshd\[1595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.20.5.37 ... |
2019-07-20 09:09:43 |
| 136.144.156.43 | attackbots | Jul 18 15:57:54 newdogma sshd[25797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.144.156.43 user=r.r Jul 18 15:57:56 newdogma sshd[25797]: Failed password for r.r from 136.144.156.43 port 54224 ssh2 Jul 18 15:57:56 newdogma sshd[25797]: Received disconnect from 136.144.156.43 port 54224:11: Bye Bye [preauth] Jul 18 15:57:56 newdogma sshd[25797]: Disconnected from 136.144.156.43 port 54224 [preauth] Jul 18 16:05:47 newdogma sshd[25829]: Invalid user csgosrv from 136.144.156.43 port 36790 Jul 18 16:05:47 newdogma sshd[25829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.144.156.43 Jul 18 16:05:49 newdogma sshd[25829]: Failed password for invalid user csgosrv from 136.144.156.43 port 36790 ssh2 Jul 18 16:05:49 newdogma sshd[25829]: Received disconnect from 136.144.156.43 port 36790:11: Bye Bye [preauth] Jul 18 16:05:49 newdogma sshd[25829]: Disconnected from 136.144.156.43 port........ ------------------------------- |
2019-07-20 09:14:58 |
| 210.212.240.234 | attackspam | Jul 20 02:59:49 mail sshd\[13888\]: Invalid user www from 210.212.240.234 port 49088 Jul 20 02:59:49 mail sshd\[13888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.240.234 Jul 20 02:59:51 mail sshd\[13888\]: Failed password for invalid user www from 210.212.240.234 port 49088 ssh2 Jul 20 03:05:46 mail sshd\[15233\]: Invalid user ftptest from 210.212.240.234 port 45778 Jul 20 03:05:46 mail sshd\[15233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.240.234 |
2019-07-20 09:23:29 |