城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.145.112.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3664
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;244.145.112.245. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030702 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 10:42:36 CST 2025
;; MSG SIZE rcvd: 108
Host 245.112.145.244.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 245.112.145.244.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.176.27.178 | attackspambots | Dec 8 00:44:59 mail kernel: [7142404.067075] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.178 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=14142 PROTO=TCP SPT=58444 DPT=6736 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 8 00:45:21 mail kernel: [7142426.303433] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.178 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=42978 PROTO=TCP SPT=58444 DPT=3449 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 8 00:45:50 mail kernel: [7142454.674663] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.178 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=46059 PROTO=TCP SPT=58444 DPT=18091 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 8 00:45:51 mail kernel: [7142455.604844] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.178 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=37753 PROTO=TCP SPT=58444 DPT=49986 WINDOW=1024 RES=0x0 |
2019-12-08 09:03:07 |
| 182.61.41.203 | attack | Dec 8 04:42:11 gw1 sshd[21971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.41.203 Dec 8 04:42:14 gw1 sshd[21971]: Failed password for invalid user lisa from 182.61.41.203 port 59570 ssh2 ... |
2019-12-08 09:18:54 |
| 91.190.85.97 | attackspambots | Sending SPAM email |
2019-12-08 08:59:52 |
| 123.20.89.1 | attackspambots | Dec 6 23:05:58 mail postfix/smtpd[895]: warning: unknown[123.20.89.1]: SASL PLAIN authentication failed: Dec 6 23:05:59 mail postfix/smtpd[1887]: warning: unknown[123.20.89.1]: SASL PLAIN authentication failed: Dec 6 23:14:08 mail postfix/smtpd[3727]: warning: unknown[123.20.89.1]: SASL PLAIN authentication failed: |
2019-12-08 09:22:18 |
| 94.153.212.90 | attackbotsspam | Dec 7 14:43:15 php1 sshd\[28679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.90 user=root Dec 7 14:43:17 php1 sshd\[28679\]: Failed password for root from 94.153.212.90 port 41874 ssh2 Dec 7 14:49:47 php1 sshd\[29511\]: Invalid user viki from 94.153.212.90 Dec 7 14:49:47 php1 sshd\[29511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.153.212.90 Dec 7 14:49:49 php1 sshd\[29511\]: Failed password for invalid user viki from 94.153.212.90 port 54320 ssh2 |
2019-12-08 09:06:56 |
| 34.230.156.67 | attackspam | WordPress wp-login brute force :: 34.230.156.67 0.144 - [07/Dec/2019:23:30:04 0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1803 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36" "HTTP/1.1" |
2019-12-08 09:02:14 |
| 119.29.152.172 | attackspambots | $f2bV_matches |
2019-12-08 09:29:34 |
| 201.20.88.10 | attack | Dec 8 02:30:04 hosting sshd[1487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.20.88.10 user=dovecot Dec 8 02:30:06 hosting sshd[1487]: Failed password for dovecot from 201.20.88.10 port 33729 ssh2 ... |
2019-12-08 08:56:33 |
| 115.233.218.204 | spamattackproxy | Attack,portscan |
2019-12-08 08:52:29 |
| 69.55.49.194 | attackbots | 2019-12-08T00:31:33.186823shield sshd\[13942\]: Invalid user eddie from 69.55.49.194 port 53096 2019-12-08T00:31:33.191874shield sshd\[13942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.49.194 2019-12-08T00:31:34.545656shield sshd\[13942\]: Failed password for invalid user eddie from 69.55.49.194 port 53096 ssh2 2019-12-08T00:37:12.254496shield sshd\[15522\]: Invalid user test from 69.55.49.194 port 35716 2019-12-08T00:37:12.260212shield sshd\[15522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.49.194 |
2019-12-08 08:52:22 |
| 96.242.247.102 | attackspambots | Dec 7 14:48:46 php1 sshd\[29380\]: Invalid user \$changeme\$ from 96.242.247.102 Dec 7 14:48:46 php1 sshd\[29380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-96-242-247-102.nwrknj.fios.verizon.net Dec 7 14:48:48 php1 sshd\[29380\]: Failed password for invalid user \$changeme\$ from 96.242.247.102 port 44774 ssh2 Dec 7 14:54:24 php1 sshd\[30099\]: Invalid user bounce from 96.242.247.102 Dec 7 14:54:24 php1 sshd\[30099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-96-242-247-102.nwrknj.fios.verizon.net |
2019-12-08 09:25:12 |
| 109.197.192.18 | attack | Dec 8 01:36:39 markkoudstaal sshd[2521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.197.192.18 Dec 8 01:36:41 markkoudstaal sshd[2521]: Failed password for invalid user test2 from 109.197.192.18 port 35184 ssh2 Dec 8 01:43:55 markkoudstaal sshd[3461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.197.192.18 |
2019-12-08 09:08:57 |
| 185.176.27.246 | attackbotsspam | Multiport scan : 30 ports scanned 1201 1206 1208 1209 1210 1215 1216 1217 1227 1235 1236 1239 1241 1242 1243 1245 1247 1248 1250 1453 1458 1460 1461 1470 1476 1483 1484 1489 1490 1491 |
2019-12-08 08:59:04 |
| 58.57.4.238 | attack | detected by Fail2Ban |
2019-12-08 09:10:32 |
| 112.85.42.186 | attackbotsspam | Dec 8 06:46:22 areeb-Workstation sshd[19768]: Failed password for root from 112.85.42.186 port 20452 ssh2 ... |
2019-12-08 09:29:54 |