城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.94.111.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.94.111.249. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 08:08:09 CST 2025
;; MSG SIZE rcvd: 107
Host 249.111.94.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 249.111.94.242.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 182.61.55.154 | attack | May 27 14:49:25 h1745522 sshd[31845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.55.154 user=root May 27 14:49:27 h1745522 sshd[31845]: Failed password for root from 182.61.55.154 port 57974 ssh2 May 27 14:52:48 h1745522 sshd[32002]: Invalid user web from 182.61.55.154 port 45260 May 27 14:52:48 h1745522 sshd[32002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.55.154 May 27 14:52:48 h1745522 sshd[32002]: Invalid user web from 182.61.55.154 port 45260 May 27 14:52:50 h1745522 sshd[32002]: Failed password for invalid user web from 182.61.55.154 port 45260 ssh2 May 27 14:56:14 h1745522 sshd[32178]: Invalid user leon from 182.61.55.154 port 60792 May 27 14:56:14 h1745522 sshd[32178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.55.154 May 27 14:56:14 h1745522 sshd[32178]: Invalid user leon from 182.61.55.154 port 60792 May 27 14:56:16 h17 ... |
2020-05-28 00:36:52 |
| 139.199.89.157 | attackbots | May 27 14:39:19 OPSO sshd\[17079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.89.157 user=root May 27 14:39:21 OPSO sshd\[17079\]: Failed password for root from 139.199.89.157 port 37880 ssh2 May 27 14:43:50 OPSO sshd\[17909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.89.157 user=root May 27 14:43:52 OPSO sshd\[17909\]: Failed password for root from 139.199.89.157 port 56470 ssh2 May 27 14:48:14 OPSO sshd\[18926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.89.157 user=root |
2020-05-28 00:31:43 |
| 201.162.126.92 | attack | May 27 08:44:46 ws12vmsma01 sshd[29400]: Invalid user ailani from 201.162.126.92 May 27 08:44:48 ws12vmsma01 sshd[29400]: Failed password for invalid user ailani from 201.162.126.92 port 39820 ssh2 May 27 08:51:45 ws12vmsma01 sshd[30448]: Invalid user aileen from 201.162.126.92 ... |
2020-05-28 00:47:52 |
| 177.106.165.235 | attack | 1590580338 - 05/27/2020 13:52:18 Host: 177.106.165.235/177.106.165.235 Port: 445 TCP Blocked |
2020-05-28 00:26:28 |
| 102.141.74.17 | attackbots | 23/tcp [2020-05-27]1pkt |
2020-05-28 00:35:40 |
| 82.64.153.14 | attackspambots | 2020-05-27T19:03:43.943247billing sshd[16385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-64-153-14.subs.proxad.net user=root 2020-05-27T19:03:45.787912billing sshd[16385]: Failed password for root from 82.64.153.14 port 34562 ssh2 2020-05-27T19:06:33.694462billing sshd[22861]: Invalid user pickard from 82.64.153.14 port 56046 ... |
2020-05-28 00:51:43 |
| 116.196.101.168 | attackbots | May 27 21:04:41 itv-usvr-02 sshd[21050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168 user=root May 27 21:04:43 itv-usvr-02 sshd[21050]: Failed password for root from 116.196.101.168 port 51468 ssh2 May 27 21:06:40 itv-usvr-02 sshd[21144]: Invalid user radio from 116.196.101.168 port 44292 May 27 21:06:40 itv-usvr-02 sshd[21144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168 May 27 21:06:40 itv-usvr-02 sshd[21144]: Invalid user radio from 116.196.101.168 port 44292 May 27 21:06:41 itv-usvr-02 sshd[21144]: Failed password for invalid user radio from 116.196.101.168 port 44292 ssh2 |
2020-05-28 00:17:39 |
| 42.200.206.225 | attack | prod6 ... |
2020-05-28 00:49:17 |
| 61.219.171.213 | attackbots | May 27 15:27:18 vps647732 sshd[26088]: Failed password for root from 61.219.171.213 port 36964 ssh2 ... |
2020-05-28 00:52:16 |
| 119.202.91.236 | attackbots | May 27 17:00:44 ns382633 sshd\[8373\]: Invalid user pi from 119.202.91.236 port 53156 May 27 17:00:44 ns382633 sshd\[8374\]: Invalid user pi from 119.202.91.236 port 53158 May 27 17:00:45 ns382633 sshd\[8373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.202.91.236 May 27 17:00:45 ns382633 sshd\[8374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.202.91.236 May 27 17:00:46 ns382633 sshd\[8373\]: Failed password for invalid user pi from 119.202.91.236 port 53156 ssh2 May 27 17:00:46 ns382633 sshd\[8374\]: Failed password for invalid user pi from 119.202.91.236 port 53158 ssh2 |
2020-05-28 00:12:40 |
| 162.243.137.42 | attackbotsspam | Port Scan detected! ... |
2020-05-28 00:21:43 |
| 80.82.77.212 | attackspam | 05/27/2020-10:34:18.419741 80.82.77.212 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-05-28 00:27:47 |
| 45.55.92.115 | attackspam | trying to access non-authorized port |
2020-05-28 00:46:50 |
| 64.213.148.44 | attack | May 27 06:19:06 server1 sshd\[28675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.213.148.44 user=gnats May 27 06:19:08 server1 sshd\[28675\]: Failed password for gnats from 64.213.148.44 port 47160 ssh2 May 27 06:23:32 server1 sshd\[29899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.213.148.44 user=root May 27 06:23:33 server1 sshd\[29899\]: Failed password for root from 64.213.148.44 port 52462 ssh2 May 27 06:28:04 server1 sshd\[31515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.213.148.44 user=root ... |
2020-05-28 00:19:39 |
| 172.104.152.167 | attackbotsspam | May 27 15:05:25 PorscheCustomer sshd[5277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.104.152.167 May 27 15:05:27 PorscheCustomer sshd[5277]: Failed password for invalid user steam from 172.104.152.167 port 51298 ssh2 May 27 15:06:47 PorscheCustomer sshd[5318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.104.152.167 ... |
2020-05-28 00:39:28 |