城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.72.94.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2549
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.72.94.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:34:24 CST 2025
;; MSG SIZE rcvd: 105
Host 99.94.72.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 99.94.72.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 198.245.50.142 | attackspambots | CF RAY ID: 5e0f57cadcaa1fa7 IP Class: noRecord URI: /wp2/wp-includes/wlwmanifest.xml |
2020-10-12 16:58:09 |
| 213.184.254.128 | attackspam | 1602449191 - 10/11/2020 22:46:31 Host: 213.184.254.128/213.184.254.128 Port: 445 TCP Blocked |
2020-10-12 16:29:59 |
| 45.232.73.83 | attackbotsspam | Oct 12 08:55:11 mail sshd[6373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83 Oct 12 08:55:14 mail sshd[6373]: Failed password for invalid user semenov from 45.232.73.83 port 50520 ssh2 ... |
2020-10-12 16:33:31 |
| 49.233.54.212 | attack | (sshd) Failed SSH login from 49.233.54.212 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 12 04:19:21 optimus sshd[6978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.54.212 user=root Oct 12 04:19:23 optimus sshd[6978]: Failed password for root from 49.233.54.212 port 55236 ssh2 Oct 12 04:26:58 optimus sshd[10871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.54.212 user=root Oct 12 04:27:00 optimus sshd[10871]: Failed password for root from 49.233.54.212 port 43060 ssh2 Oct 12 04:31:11 optimus sshd[12988]: Invalid user webster from 49.233.54.212 |
2020-10-12 16:56:27 |
| 125.132.73.28 | attackbotsspam | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-10-12 16:43:45 |
| 49.234.124.225 | attackbots | (sshd) Failed SSH login from 49.234.124.225 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 12 02:33:03 optimus sshd[7294]: Invalid user carolin from 49.234.124.225 Oct 12 02:33:03 optimus sshd[7294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.124.225 Oct 12 02:33:05 optimus sshd[7294]: Failed password for invalid user carolin from 49.234.124.225 port 44140 ssh2 Oct 12 02:35:02 optimus sshd[8610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.124.225 user=root Oct 12 02:35:04 optimus sshd[8610]: Failed password for root from 49.234.124.225 port 36012 ssh2 |
2020-10-12 17:00:32 |
| 106.13.177.53 | attackspambots | Oct 12 08:17:53 ip-172-31-16-56 sshd\[5107\]: Failed password for root from 106.13.177.53 port 36202 ssh2\ Oct 12 08:20:58 ip-172-31-16-56 sshd\[5125\]: Invalid user chris from 106.13.177.53\ Oct 12 08:21:00 ip-172-31-16-56 sshd\[5125\]: Failed password for invalid user chris from 106.13.177.53 port 50666 ssh2\ Oct 12 08:24:04 ip-172-31-16-56 sshd\[5156\]: Invalid user sanchez from 106.13.177.53\ Oct 12 08:24:06 ip-172-31-16-56 sshd\[5156\]: Failed password for invalid user sanchez from 106.13.177.53 port 36910 ssh2\ |
2020-10-12 16:55:29 |
| 81.68.217.130 | attackspam | 2020-10-12T08:19:05.388056shield sshd\[20666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.217.130 user=root 2020-10-12T08:19:07.290522shield sshd\[20666\]: Failed password for root from 81.68.217.130 port 53552 ssh2 2020-10-12T08:20:03.124203shield sshd\[20767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.217.130 user=root 2020-10-12T08:20:04.986783shield sshd\[20767\]: Failed password for root from 81.68.217.130 port 37666 ssh2 2020-10-12T08:21:04.841278shield sshd\[20877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.217.130 user=root |
2020-10-12 16:27:57 |
| 49.233.111.193 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 34 |
2020-10-12 16:57:05 |
| 174.244.48.55 | attack | port scan and connect, tcp 443 (https) |
2020-10-12 17:01:20 |
| 49.234.96.210 | attackbots | Oct 12 08:57:31 s2 sshd[24428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210 Oct 12 08:57:33 s2 sshd[24428]: Failed password for invalid user francis from 49.234.96.210 port 44850 ssh2 Oct 12 09:02:29 s2 sshd[24639]: Failed password for root from 49.234.96.210 port 42268 ssh2 |
2020-10-12 16:21:57 |
| 49.235.73.19 | attackbotsspam | 2020-10-12T02:00:22.009921linuxbox-skyline sshd[41866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.73.19 user=root 2020-10-12T02:00:23.271345linuxbox-skyline sshd[41866]: Failed password for root from 49.235.73.19 port 56642 ssh2 ... |
2020-10-12 16:23:42 |
| 138.197.66.124 | attack | Oct 12 18:26:52 web1 sshd[20108]: Invalid user hall from 138.197.66.124 port 34488 Oct 12 18:26:52 web1 sshd[20108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.124 Oct 12 18:26:52 web1 sshd[20108]: Invalid user hall from 138.197.66.124 port 34488 Oct 12 18:26:54 web1 sshd[20108]: Failed password for invalid user hall from 138.197.66.124 port 34488 ssh2 Oct 12 18:31:26 web1 sshd[21619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.124 user=root Oct 12 18:31:28 web1 sshd[21619]: Failed password for root from 138.197.66.124 port 52078 ssh2 Oct 12 18:34:41 web1 sshd[22607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.124 user=root Oct 12 18:34:43 web1 sshd[22607]: Failed password for root from 138.197.66.124 port 55486 ssh2 Oct 12 18:37:54 web1 sshd[23706]: Invalid user lilli from 138.197.66.124 port 58900 ... |
2020-10-12 16:42:28 |
| 50.66.130.11 | attackbotsspam | 20 attempts against mh-ssh on fire |
2020-10-12 16:40:13 |
| 154.74.130.69 | attackspam | 2020-10-12T09:05:05.368484ks3355764 sshd[17765]: Invalid user apache from 154.74.130.69 port 42772 2020-10-12T09:05:07.414676ks3355764 sshd[17765]: Failed password for invalid user apache from 154.74.130.69 port 42772 ssh2 ... |
2020-10-12 16:41:00 |