城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.80.208.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5090
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.80.208.116. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:48:33 CST 2025
;; MSG SIZE rcvd: 107
Host 116.208.80.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 116.208.80.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 180.153.46.170 | attack | Jun 19 14:53:54 josie sshd[21474]: Bad protocol version identification '' from 180.153.46.170 Jun 19 14:53:56 josie sshd[21479]: Invalid user support from 180.153.46.170 Jun 19 14:53:56 josie sshd[21479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.153.46.170 Jun 19 14:53:58 josie sshd[21479]: Failed password for invalid user support from 180.153.46.170 port 34135 ssh2 Jun 19 14:53:58 josie sshd[21481]: Connection closed by 180.153.46.170 Jun 19 14:54:00 josie sshd[21533]: Invalid user ubnt from 180.153.46.170 Jun 19 14:54:00 josie sshd[21533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.153.46.170 Jun 19 14:54:02 josie sshd[21533]: Failed password for invalid user ubnt from 180.153.46.170 port 34442 ssh2 Jun 19 14:54:02 josie sshd[21534]: Connection closed by 180.153.46.170 Jun 19 14:54:04 josie sshd[21631]: Invalid user cisco from 180.153.46.170 Jun 19 14:54:04 josie sshd........ ------------------------------- |
2019-06-24 06:32:41 |
| 162.243.144.193 | attack | ¯\_(ツ)_/¯ |
2019-06-24 06:55:16 |
| 185.153.196.134 | attackspambots | Unauthorized connection attempt from IP address 185.153.196.134 on Port 3389(RDP) |
2019-06-24 07:04:09 |
| 181.36.41.165 | attackspam | Unauthorized connection attempt from IP address 181.36.41.165 on Port 445(SMB) |
2019-06-24 06:50:43 |
| 191.53.59.34 | attack | Brute force attempt |
2019-06-24 07:08:38 |
| 51.254.220.20 | attackbotsspam | Invalid user test from 51.254.220.20 port 48971 |
2019-06-24 06:58:59 |
| 217.11.163.234 | attack | Jun 23 16:05:32 debian sshd\[30030\]: Invalid user newuser from 217.11.163.234 port 19478 Jun 23 16:05:32 debian sshd\[30030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.11.163.234 Jun 23 16:05:34 debian sshd\[30030\]: Failed password for invalid user newuser from 217.11.163.234 port 19478 ssh2 ... |
2019-06-24 06:56:26 |
| 151.40.81.246 | attackspam | NAME : ADSL-NORTH-FIRENZE-40 CIDR : 151.40.81.246/17 DDoS attack Italy - block certain countries :) IP: 151.40.81.246 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-24 06:41:33 |
| 92.119.160.80 | attackspambots | Jun 23 16:03:31 cac1d2 sshd\[9539\]: Invalid user admin from 92.119.160.80 port 25290 Jun 23 16:03:31 cac1d2 sshd\[9539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.119.160.80 Jun 23 16:03:34 cac1d2 sshd\[9539\]: Failed password for invalid user admin from 92.119.160.80 port 25290 ssh2 ... |
2019-06-24 07:13:47 |
| 119.18.14.50 | attack | TCP port 23 (Telnet) attempt blocked by firewall. [2019-06-23 22:05:21] |
2019-06-24 06:47:32 |
| 87.106.219.57 | attack | Unauthorized connection attempt from IP address 87.106.219.57 on Port 445(SMB) |
2019-06-24 06:38:31 |
| 66.23.233.59 | attackbotsspam | WP Authentication failure |
2019-06-24 07:02:41 |
| 88.165.49.147 | attackbotsspam | Jun 23 22:05:08 core01 sshd\[29116\]: Invalid user constructor from 88.165.49.147 port 36980 Jun 23 22:05:08 core01 sshd\[29116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.165.49.147 ... |
2019-06-24 07:03:32 |
| 186.249.94.135 | attackbotsspam | failed_logins |
2019-06-24 07:10:53 |
| 94.191.102.171 | attackbots | Jun 23 10:54:57 *** sshd[20090]: Failed password for invalid user bjhlvtna from 94.191.102.171 port 52632 ssh2 Jun 23 11:02:02 *** sshd[20155]: Failed password for invalid user python from 94.191.102.171 port 46306 ssh2 Jun 23 11:03:39 *** sshd[20188]: Failed password for invalid user cvsroot from 94.191.102.171 port 59174 ssh2 Jun 23 11:05:07 *** sshd[20213]: Failed password for invalid user vnc from 94.191.102.171 port 43806 ssh2 Jun 23 11:06:39 *** sshd[20219]: Failed password for invalid user none from 94.191.102.171 port 56652 ssh2 Jun 23 11:08:04 *** sshd[20222]: Failed password for invalid user git2 from 94.191.102.171 port 41244 ssh2 Jun 23 11:09:34 *** sshd[20285]: Failed password for invalid user student from 94.191.102.171 port 54092 ssh2 Jun 23 11:11:07 *** sshd[20288]: Failed password for invalid user nithya from 94.191.102.171 port 38720 ssh2 Jun 23 11:12:41 *** sshd[20301]: Failed password for invalid user massimo from 94.191.102.171 port 51586 ssh2 Jun 23 11:14:12 *** sshd[20304]: Failed passw |
2019-06-24 07:13:20 |