城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 246.104.125.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22756
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;246.104.125.172. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:20:59 CST 2025
;; MSG SIZE rcvd: 108
Host 172.125.104.246.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 172.125.104.246.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.194.229.59 | attackspambots | Oct 4 23:50:48 sshgateway sshd\[11791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.229.59 user=root Oct 4 23:50:50 sshgateway sshd\[11791\]: Failed password for root from 122.194.229.59 port 25898 ssh2 Oct 4 23:51:02 sshgateway sshd\[11791\]: Failed password for root from 122.194.229.59 port 25898 ssh2 |
2020-10-05 05:51:22 |
| 140.143.22.116 | attackspam | Oct 4 20:15:51 ip106 sshd[8516]: Failed password for root from 140.143.22.116 port 55794 ssh2 ... |
2020-10-05 06:06:45 |
| 139.180.175.134 | attackbotsspam | 139.180.175.134 - - [04/Oct/2020:21:18:18 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "http://b-kits.com/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.180.175.134 - - [04/Oct/2020:23:25:30 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.180.175.134 - - [04/Oct/2020:23:25:32 +0200] "POST /wp-login.php HTTP/1.1" 200 8875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-10-05 06:02:28 |
| 192.241.134.101 | attackspam | Invalid user postgresql1 from 192.241.134.101 port 40134 |
2020-10-05 05:58:58 |
| 134.175.129.204 | attackbots | SSH Brute-force |
2020-10-05 05:54:56 |
| 45.142.120.38 | attackspambots | Oct 4 23:24:20 srv01 postfix/smtpd\[23936\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 23:24:20 srv01 postfix/smtpd\[27975\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 23:24:27 srv01 postfix/smtpd\[29093\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 23:24:30 srv01 postfix/smtpd\[27975\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 23:24:33 srv01 postfix/smtpd\[23936\]: warning: unknown\[45.142.120.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-05 05:40:25 |
| 92.204.164.42 | attackspam | 1601805098 - 10/04/2020 11:51:38 Host: 92.204.164.42/92.204.164.42 Port: 22 TCP Blocked |
2020-10-05 05:46:31 |
| 154.222.30.134 | attack | Oct 4 12:12:44 *hidden* sshd[23225]: error: Received disconnect from 154.222.30.134 port 58132:3: com.jcraft.jsch.JSchException: Auth fail [preauth] Oct 4 12:12:45 *hidden* sshd[23230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.222.30.134 user=root Oct 4 12:12:48 *hidden* sshd[23230]: Failed password for *hidden* from 154.222.30.134 port 58508 ssh2 |
2020-10-05 05:56:59 |
| 162.142.125.18 | attackbotsspam | Multiport scan 48 ports : 2 21 23 53 81(x2) 83(x2) 88(x3) 110(x2) 123 143(x2) 161 222(x3) 445 465(x2) 591(x2) 623(x2) 631 990(x3) 993(x2) 995 1194(x2) 1311 1883 2082 2222 2323 3306(x2) 5432 5632(x2) 5672(x2) 5683(x3) 5684 5900(x2) 5901 5902(x2) 5903(x2) 6443 8080 8081 8088(x2) 8089(x2) 8443 8888 9090(x2) 9200 16992 16993 20000(x3) |
2020-10-05 05:44:48 |
| 45.142.120.53 | attackbots | Oct 4 22:25:11 nlmail01.srvfarm.net postfix/smtpd[519323]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 22:25:16 nlmail01.srvfarm.net postfix/smtpd[519344]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 22:25:18 nlmail01.srvfarm.net postfix/smtpd[519339]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 22:25:26 nlmail01.srvfarm.net postfix/smtpd[519323]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 22:25:30 nlmail01.srvfarm.net postfix/smtpd[519363]: warning: unknown[45.142.120.53]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-10-05 05:39:59 |
| 13.78.235.113 | attack | Oct 4 14:59:23 |
2020-10-05 05:58:13 |
| 111.72.193.182 | attack | Oct 4 00:53:58 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 00:54:10 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 00:54:26 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 00:54:45 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 00:54:57 srv01 postfix/smtpd\[30998\]: warning: unknown\[111.72.193.182\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-05 05:49:10 |
| 118.97.38.170 | attackspam | Port probing on unauthorized port 8080 |
2020-10-05 05:47:57 |
| 115.97.230.150 | attack | Oct 3 20:39:55 netserv300 sshd[9382]: Connection from 115.97.230.150 port 57119 on 178.63.236.17 port 22 Oct 3 20:39:55 netserv300 sshd[9383]: Connection from 115.97.230.150 port 57134 on 178.63.236.21 port 22 Oct 3 20:39:55 netserv300 sshd[9384]: Connection from 115.97.230.150 port 57153 on 178.63.236.22 port 22 Oct 3 20:39:55 netserv300 sshd[9385]: Connection from 115.97.230.150 port 57152 on 178.63.236.18 port 22 Oct 3 20:39:55 netserv300 sshd[9386]: Connection from 115.97.230.150 port 57168 on 178.63.236.20 port 22 Oct 3 20:39:55 netserv300 sshd[9387]: Connection from 115.97.230.150 port 57175 on 178.63.236.16 port 22 Oct 3 20:39:55 netserv300 sshd[9388]: Connection from 115.97.230.150 port 57189 on 178.63.236.19 port 22 Oct 3 20:39:57 netserv300 sshd[9390]: Connection from 115.97.230.150 port 57233 on 178.63.236.21 port 22 Oct 3 20:39:57 netserv300 sshd[9392]: Connection from 115.97.230.150 port 57239 on 178.63.236.17 port 22 Oct 3 20:39:57 netserv300 sshd........ ------------------------------ |
2020-10-05 05:49:59 |
| 102.165.30.45 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-10-05 06:07:02 |