城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.254.92.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.254.92.234. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 03:17:15 CST 2025
;; MSG SIZE rcvd: 107
Host 234.92.254.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 234.92.254.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 202.138.242.6 | attack | Unauthorized connection attempt from IP address 202.138.242.6 on Port 25(SMTP) |
2019-08-12 10:43:30 |
| 94.233.48.234 | attackbots | Brute force attempt |
2019-08-12 10:15:11 |
| 23.129.64.153 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.153 user=root Failed password for root from 23.129.64.153 port 12989 ssh2 Failed password for root from 23.129.64.153 port 12989 ssh2 Failed password for root from 23.129.64.153 port 12989 ssh2 Failed password for root from 23.129.64.153 port 12989 ssh2 |
2019-08-12 10:17:11 |
| 142.44.160.173 | attackbots | Aug 11 22:12:02 MK-Soft-VM5 sshd\[27783\]: Invalid user lovemba from 142.44.160.173 port 39546 Aug 11 22:12:02 MK-Soft-VM5 sshd\[27783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173 Aug 11 22:12:04 MK-Soft-VM5 sshd\[27783\]: Failed password for invalid user lovemba from 142.44.160.173 port 39546 ssh2 ... |
2019-08-12 10:38:11 |
| 103.106.32.230 | attackbotsspam | Unauthorized connection attempt from IP address 103.106.32.230 on Port 25(SMTP) |
2019-08-12 10:35:15 |
| 186.64.232.51 | attack | 8080/tcp [2019-08-11]1pkt |
2019-08-12 10:16:02 |
| 165.22.248.215 | attack | Lines containing failures of 165.22.248.215 Aug 12 00:26:21 shared12 sshd[9940]: Invalid user ops from 165.22.248.215 port 43836 Aug 12 00:26:21 shared12 sshd[9940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.248.215 Aug 12 00:26:24 shared12 sshd[9940]: Failed password for invalid user ops from 165.22.248.215 port 43836 ssh2 Aug 12 00:26:24 shared12 sshd[9940]: Received disconnect from 165.22.248.215 port 43836:11: Bye Bye [preauth] Aug 12 00:26:24 shared12 sshd[9940]: Disconnected from invalid user ops 165.22.248.215 port 43836 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=165.22.248.215 |
2019-08-12 10:33:31 |
| 219.146.62.244 | attackbots | 445/tcp [2019-08-11]1pkt |
2019-08-12 10:24:09 |
| 148.70.211.244 | attack | ECShop Remote Code Execution Vulnerability, PTR: PTR record not found |
2019-08-12 10:18:18 |
| 162.252.58.148 | attackbotsspam | Aug 10 01:25:46 localhost kernel: [16658939.669520] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=162.252.58.148 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=51512 PROTO=TCP SPT=43132 DPT=445 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 10 01:25:46 localhost kernel: [16658939.669551] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=162.252.58.148 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=51512 PROTO=TCP SPT=43132 DPT=445 SEQ=3945834747 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 11 14:00:38 localhost kernel: [16790631.574114] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=162.252.58.148 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=15737 PROTO=TCP SPT=42449 DPT=445 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 11 14:00:38 localhost kernel: [16790631.574148] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=162.252.58.148 DST=[mungedIP2] LEN=40 TOS=0x08 |
2019-08-12 10:27:03 |
| 54.198.47.32 | attackbotsspam | Aug 12 04:03:49 www sshd\[170180\]: Invalid user ali from 54.198.47.32 Aug 12 04:03:49 www sshd\[170180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.198.47.32 Aug 12 04:03:50 www sshd\[170180\]: Failed password for invalid user ali from 54.198.47.32 port 37484 ssh2 ... |
2019-08-12 10:46:29 |
| 111.6.78.158 | attackbots | 2019-08-06T22:44:14.676989wiz-ks3 sshd[27396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.6.78.158 user=root 2019-08-06T22:44:17.164245wiz-ks3 sshd[27396]: Failed password for root from 111.6.78.158 port 12275 ssh2 2019-08-06T22:44:19.732306wiz-ks3 sshd[27396]: Failed password for root from 111.6.78.158 port 12275 ssh2 2019-08-06T22:44:14.676989wiz-ks3 sshd[27396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.6.78.158 user=root 2019-08-06T22:44:17.164245wiz-ks3 sshd[27396]: Failed password for root from 111.6.78.158 port 12275 ssh2 2019-08-06T22:44:19.732306wiz-ks3 sshd[27396]: Failed password for root from 111.6.78.158 port 12275 ssh2 2019-08-06T22:44:14.676989wiz-ks3 sshd[27396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.6.78.158 user=root 2019-08-06T22:44:17.164245wiz-ks3 sshd[27396]: Failed password for root from 111.6.78.158 port 12275 ssh2 2019-08-06T22:44: |
2019-08-12 10:04:34 |
| 36.89.247.26 | attackspam | Invalid user applmgr from 36.89.247.26 port 59839 |
2019-08-12 10:25:07 |
| 182.74.57.61 | attackbots | SMB Server BruteForce Attack |
2019-08-12 10:21:12 |
| 102.170.249.82 | attackbots | Unauthorized connection attempt from IP address 102.170.249.82 on Port 445(SMB) |
2019-08-12 10:45:56 |