城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.196.174.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.196.174.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:40:58 CST 2025
;; MSG SIZE rcvd: 107
Host 42.174.196.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.174.196.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 170.78.98.12 | attackspambots | Unauthorised access (Oct 9) SRC=170.78.98.12 LEN=52 PREC=0x20 TTL=116 ID=20782 DF TCP DPT=445 WINDOW=8192 SYN |
2020-10-10 19:36:11 |
| 195.154.243.19 | attack | Oct 10 10:05:52 XXX sshd[56849]: Invalid user info from 195.154.243.19 port 40950 |
2020-10-10 19:08:53 |
| 50.251.216.228 | attackbots | Lines containing failures of 50.251.216.228 Oct 9 13:18:01 node83 sshd[30822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.251.216.228 user=r.r Oct 9 13:18:03 node83 sshd[30822]: Failed password for r.r from 50.251.216.228 port 63903 ssh2 Oct 9 13:18:03 node83 sshd[30822]: Received disconnect from 50.251.216.228 port 63903:11: Bye Bye [preauth] Oct 9 13:18:03 node83 sshd[30822]: Disconnected from authenticating user r.r 50.251.216.228 port 63903 [preauth] Oct 9 13:25:10 node83 sshd[1515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.251.216.228 user=r.r Oct 9 13:25:12 node83 sshd[1515]: Failed password for r.r from 50.251.216.228 port 24617 ssh2 Oct 9 13:25:12 node83 sshd[1515]: Received disconnect from 50.251.216.228 port 24617:11: Bye Bye [preauth] Oct 9 13:25:12 node83 sshd[1515]: Disconnected from authenticating user r.r 50.251.216.228 port 24617 [preauth] Oct 9 13........ ------------------------------ |
2020-10-10 19:39:11 |
| 5.189.143.170 | attackbots |
|
2020-10-10 19:24:21 |
| 45.173.196.82 | attackbots | Unauthorized connection attempt from IP address 45.173.196.82 on Port 445(SMB) |
2020-10-10 19:02:34 |
| 192.241.239.143 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 88 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-10 19:25:00 |
| 106.12.193.6 | attackbotsspam | repeated SSH login attempts |
2020-10-10 19:28:46 |
| 193.112.196.101 | attackbots | Oct 10 14:10:51 dignus sshd[18626]: Failed password for root from 193.112.196.101 port 41582 ssh2 Oct 10 14:12:45 dignus sshd[18649]: Invalid user cyrus from 193.112.196.101 port 39018 Oct 10 14:12:45 dignus sshd[18649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.196.101 Oct 10 14:12:47 dignus sshd[18649]: Failed password for invalid user cyrus from 193.112.196.101 port 39018 ssh2 Oct 10 14:14:47 dignus sshd[18670]: Invalid user wwwrun from 193.112.196.101 port 36466 ... |
2020-10-10 19:16:33 |
| 191.235.105.16 | attackspam | 2020-10-10 10:11:54 dovecot_login authenticator failed for \(ADMIN\) \[191.235.105.16\]: 535 Incorrect authentication data \(set_id=support@opso.it\) 2020-10-10 10:13:39 dovecot_login authenticator failed for \(ADMIN\) \[191.235.105.16\]: 535 Incorrect authentication data \(set_id=support@opso.it\) 2020-10-10 10:15:23 dovecot_login authenticator failed for \(ADMIN\) \[191.235.105.16\]: 535 Incorrect authentication data \(set_id=support@opso.it\) 2020-10-10 10:17:08 dovecot_login authenticator failed for \(ADMIN\) \[191.235.105.16\]: 535 Incorrect authentication data \(set_id=support@opso.it\) 2020-10-10 10:18:51 dovecot_login authenticator failed for \(ADMIN\) \[191.235.105.16\]: 535 Incorrect authentication data \(set_id=support@opso.it\) |
2020-10-10 19:15:30 |
| 189.180.24.97 | attackspambots | Oct 8 17:13:45 server770 sshd[16250]: Invalid user Parviz_ from 189.180.24.97 port 44754 Oct 8 17:13:45 server770 sshd[16250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.180.24.97 Oct 8 17:13:48 server770 sshd[16250]: Failed password for invalid user Parviz_ from 189.180.24.97 port 44754 ssh2 Oct 8 17:13:48 server770 sshd[16250]: Received disconnect from 189.180.24.97 port 44754:11: Bye Bye [preauth] Oct 8 17:13:48 server770 sshd[16250]: Disconnected from 189.180.24.97 port 44754 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=189.180.24.97 |
2020-10-10 19:33:53 |
| 88.132.66.26 | attackspam | Oct 10 13:00:50 lnxded64 sshd[27222]: Failed password for root from 88.132.66.26 port 48006 ssh2 Oct 10 13:00:50 lnxded64 sshd[27222]: Failed password for root from 88.132.66.26 port 48006 ssh2 |
2020-10-10 19:01:17 |
| 193.112.54.190 | attackspam | Oct 10 07:58:07 shivevps sshd[11333]: Failed password for invalid user deployer from 193.112.54.190 port 43044 ssh2 Oct 10 07:59:28 shivevps sshd[11384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.54.190 user=root Oct 10 07:59:30 shivevps sshd[11384]: Failed password for root from 193.112.54.190 port 54968 ssh2 ... |
2020-10-10 19:14:20 |
| 27.128.244.13 | attackbotsspam | Oct 10 15:50:46 gw1 sshd[15713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.244.13 Oct 10 15:50:48 gw1 sshd[15713]: Failed password for invalid user wwwuser from 27.128.244.13 port 56102 ssh2 ... |
2020-10-10 19:02:08 |
| 147.161.28.183 | attack | Oct 10 07:06:02 mail sshd[30188]: Failed password for root from 147.161.28.183 port 40156 ssh2 ... |
2020-10-10 19:31:49 |
| 78.196.38.46 | attackspambots | Invalid user es from 78.196.38.46 port 41632 |
2020-10-10 19:12:52 |