城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.198.85.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59283
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.198.85.212. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 01:59:04 CST 2025
;; MSG SIZE rcvd: 107
Host 212.85.198.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 212.85.198.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 89.248.168.107 | attackbotsspam | Aug 12 16:42:30 h2177944 kernel: \[3944713.840610\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=61234 PROTO=TCP SPT=53590 DPT=5380 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 12 16:47:29 h2177944 kernel: \[3945013.024619\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=43769 PROTO=TCP SPT=53636 DPT=5762 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 12 16:52:23 h2177944 kernel: \[3945306.971301\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=24593 PROTO=TCP SPT=53622 DPT=5671 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 12 16:53:40 h2177944 kernel: \[3945383.372488\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=20 PROTO=TCP SPT=53590 DPT=5343 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 12 16:54:34 h2177944 kernel: \[3945438.293112\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.168.107 DST=85.214.117 |
2019-08-12 23:01:05 |
| 119.132.87.24 | attackspambots | Aug 12 14:23:58 localhost postfix/smtpd\[26582\]: warning: unknown\[119.132.87.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 12 14:24:06 localhost postfix/smtpd\[26582\]: warning: unknown\[119.132.87.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 12 14:24:19 localhost postfix/smtpd\[26582\]: warning: unknown\[119.132.87.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 12 14:24:35 localhost postfix/smtpd\[26582\]: warning: unknown\[119.132.87.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 12 14:24:43 localhost postfix/smtpd\[26584\]: warning: unknown\[119.132.87.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-08-12 21:49:55 |
| 94.177.214.200 | attack | Aug 12 14:16:42 debian sshd\[6449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.214.200 user=root Aug 12 14:16:44 debian sshd\[6449\]: Failed password for root from 94.177.214.200 port 58814 ssh2 ... |
2019-08-12 22:54:33 |
| 201.24.185.199 | attack | Aug 12 14:23:40 vmd17057 sshd\[31586\]: Invalid user habib from 201.24.185.199 port 53763 Aug 12 14:23:40 vmd17057 sshd\[31586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.24.185.199 Aug 12 14:23:42 vmd17057 sshd\[31586\]: Failed password for invalid user habib from 201.24.185.199 port 53763 ssh2 ... |
2019-08-12 22:24:52 |
| 105.185.10.15 | attack | Aug 12 15:23:47 srv-4 sshd\[28739\]: Invalid user admin from 105.185.10.15 Aug 12 15:23:47 srv-4 sshd\[28739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.185.10.15 Aug 12 15:23:49 srv-4 sshd\[28739\]: Failed password for invalid user admin from 105.185.10.15 port 59381 ssh2 ... |
2019-08-12 22:20:19 |
| 134.209.24.143 | attackspambots | Aug 12 16:01:55 vps691689 sshd[29197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.24.143 Aug 12 16:01:56 vps691689 sshd[29197]: Failed password for invalid user rezvie from 134.209.24.143 port 56016 ssh2 Aug 12 16:06:15 vps691689 sshd[29241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.24.143 ... |
2019-08-12 22:22:32 |
| 170.0.126.185 | attackspam | proto=tcp . spt=51017 . dpt=25 . (listed on Blocklist de Aug 11) (524) |
2019-08-12 22:36:54 |
| 112.220.24.131 | attackspambots | blacklist username nagios Invalid user nagios from 112.220.24.131 port 38264 |
2019-08-12 22:14:28 |
| 45.227.253.216 | attackspambots | Aug 12 15:52:55 mailserver dovecot: auth-worker(5477): sql([hidden],45.227.253.216): unknown user Aug 12 15:52:57 mailserver postfix/smtps/smtpd[5461]: warning: unknown[45.227.253.216]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 12 15:52:57 mailserver postfix/smtps/smtpd[5461]: lost connection after AUTH from unknown[45.227.253.216] Aug 12 15:52:57 mailserver postfix/smtps/smtpd[5461]: disconnect from unknown[45.227.253.216] Aug 12 15:52:57 mailserver postfix/smtps/smtpd[5461]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.216: hostname nor servname provided, or not known Aug 12 15:52:57 mailserver postfix/smtps/smtpd[5461]: connect from unknown[45.227.253.216] Aug 12 15:53:03 mailserver dovecot: auth-worker(5477): sql([hidden],45.227.253.216): unknown user Aug 12 15:53:05 mailserver postfix/smtps/smtpd[5461]: warning: unknown[45.227.253.216]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 12 15:53:05 mailserver postfix/smtps/smtpd[5461]: lost connection aft |
2019-08-12 22:09:06 |
| 95.48.54.106 | attack | Aug 12 15:22:33 microserver sshd[15050]: Invalid user nagios from 95.48.54.106 port 47294 Aug 12 15:22:33 microserver sshd[15050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Aug 12 15:22:35 microserver sshd[15050]: Failed password for invalid user nagios from 95.48.54.106 port 47294 ssh2 Aug 12 15:27:03 microserver sshd[15717]: Invalid user Giani from 95.48.54.106 port 41174 Aug 12 15:27:03 microserver sshd[15717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 Aug 12 15:40:57 microserver sshd[17589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.48.54.106 user=root Aug 12 15:40:59 microserver sshd[17589]: Failed password for root from 95.48.54.106 port 50460 ssh2 Aug 12 15:46:17 microserver sshd[18227]: Invalid user prueba01 from 95.48.54.106 port 44636 Aug 12 15:46:17 microserver sshd[18227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 |
2019-08-12 22:23:01 |
| 54.36.189.113 | attackspam | Aug 12 16:23:23 SilenceServices sshd[13152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.189.113 Aug 12 16:23:23 SilenceServices sshd[13151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.189.113 Aug 12 16:23:23 SilenceServices sshd[13153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.189.113 Aug 12 16:23:23 SilenceServices sshd[13158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.189.113 Aug 12 16:23:23 SilenceServices sshd[13156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.189.113 Aug 12 16:23:23 SilenceServices sshd[13161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.189.113 |
2019-08-12 22:28:05 |
| 95.210.114.42 | attackbots | Port scan on 1 port(s): 23 |
2019-08-12 22:26:41 |
| 171.244.49.17 | attackspam | Aug 12 16:14:58 ns3367391 sshd\[24799\]: Invalid user ubuntu from 171.244.49.17 port 35182 Aug 12 16:14:58 ns3367391 sshd\[24799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.49.17 ... |
2019-08-12 22:15:16 |
| 61.152.171.44 | attack | Aug 12 09:45:29 online-web-vs-1 sshd[13301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.152.171.44 user=r.r Aug 12 09:45:31 online-web-vs-1 sshd[13301]: Failed password for r.r from 61.152.171.44 port 48070 ssh2 Aug 12 09:45:33 online-web-vs-1 sshd[13301]: Failed password for r.r from 61.152.171.44 port 48070 ssh2 Aug 12 09:45:37 online-web-vs-1 sshd[13301]: Failed password for r.r from 61.152.171.44 port 48070 ssh2 Aug 12 09:45:41 online-web-vs-1 sshd[13301]: Failed password for r.r from 61.152.171.44 port 48070 ssh2 Aug 12 09:45:44 online-web-vs-1 sshd[13301]: Failed password for r.r from 61.152.171.44 port 48070 ssh2 Aug 12 09:45:47 online-web-vs-1 sshd[13301]: Failed password for r.r from 61.152.171.44 port 48070 ssh2 Aug 12 09:45:47 online-web-vs-1 sshd[13301]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.152.171.44 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.htm |
2019-08-12 22:05:58 |
| 190.7.141.90 | attack | proto=tcp . spt=45333 . dpt=25 . (listed on Github Combined on 3 lists ) (513) |
2019-08-12 23:02:37 |