城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 247.104.172.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32489
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;247.104.172.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400
;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 15:29:32 CST 2025
;; MSG SIZE rcvd: 108
Host 164.172.104.247.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 164.172.104.247.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.92.0.171 | attack | Jul 5 06:42:47 bacztwo sshd[11777]: error: PAM: Authentication failure for root from 218.92.0.171 Jul 5 06:42:50 bacztwo sshd[11777]: error: PAM: Authentication failure for root from 218.92.0.171 Jul 5 06:42:53 bacztwo sshd[11777]: error: PAM: Authentication failure for root from 218.92.0.171 Jul 5 06:42:44 bacztwo sshd[11777]: error: PAM: Authentication failure for root from 218.92.0.171 Jul 5 06:42:47 bacztwo sshd[11777]: error: PAM: Authentication failure for root from 218.92.0.171 Jul 5 06:42:50 bacztwo sshd[11777]: error: PAM: Authentication failure for root from 218.92.0.171 Jul 5 06:42:53 bacztwo sshd[11777]: error: PAM: Authentication failure for root from 218.92.0.171 Jul 5 06:42:53 bacztwo sshd[11777]: Failed keyboard-interactive/pam for root from 218.92.0.171 port 50576 ssh2 Jul 5 06:42:44 bacztwo sshd[11777]: error: PAM: Authentication failure for root from 218.92.0.171 Jul 5 06:42:47 bacztwo sshd[11777]: error: PAM: Authentication failure for root from 218.92.0.1 ... |
2020-07-05 06:51:26 |
| 179.184.0.112 | attackbotsspam | Jul 5 05:43:12 webhost01 sshd[7438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.0.112 Jul 5 05:43:15 webhost01 sshd[7438]: Failed password for invalid user antonio from 179.184.0.112 port 37390 ssh2 ... |
2020-07-05 07:07:46 |
| 222.186.31.166 | attackbotsspam | Jul 4 22:47:04 game-panel sshd[27267]: Failed password for root from 222.186.31.166 port 59864 ssh2 Jul 4 22:47:06 game-panel sshd[27267]: Failed password for root from 222.186.31.166 port 59864 ssh2 Jul 4 22:47:09 game-panel sshd[27267]: Failed password for root from 222.186.31.166 port 59864 ssh2 |
2020-07-05 06:49:02 |
| 103.104.117.81 | attackspam | 3x Failed Password |
2020-07-05 06:45:03 |
| 92.154.95.236 | attack | Multiport scan : 88 ports scanned 4 43 81 99 143 254 443 543 687 691 722 749 987 1045 1058 1082 1098 1113 1121 1126 1141 1185 1192 1216 1300 1310 1556 1594 1755 1999 2007 2366 2399 2604 2761 3300 3301 3325 3551 3659 3737 3971 4129 4321 4848 4900 5009 5060 5226 5280 5405 5550 5566 5850 5911 5915 5959 5963 5989 6547 6669 8002 8010 8085 8093 8180 8300 8800 9100 9290 9618 9900 9929 11110 14000 16016 24800 31337 32783 35500 49155 49157 ..... |
2020-07-05 07:00:34 |
| 185.175.93.14 | attackbots | Jul 5 00:48:23 debian-2gb-nbg1-2 kernel: \[16161519.978345\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=9671 PROTO=TCP SPT=59291 DPT=53395 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-05 07:04:15 |
| 71.6.231.86 | attackspam | Jul 4 23:41:40 debian-2gb-nbg1-2 kernel: \[16157516.567049\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=71.6.231.86 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=54321 PROTO=TCP SPT=57239 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-07-05 06:54:59 |
| 179.210.134.44 | attackspam | $f2bV_matches |
2020-07-05 07:09:50 |
| 139.198.122.76 | attack | invalid login attempt (stacy) |
2020-07-05 06:45:52 |
| 106.12.70.112 | attackbotsspam | 2020-07-04T22:39:21.432407shield sshd\[18164\]: Invalid user toto from 106.12.70.112 port 54388 2020-07-04T22:39:21.435727shield sshd\[18164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.70.112 2020-07-04T22:39:23.793522shield sshd\[18164\]: Failed password for invalid user toto from 106.12.70.112 port 54388 ssh2 2020-07-04T22:41:37.662503shield sshd\[19395\]: Invalid user adam from 106.12.70.112 port 39884 2020-07-04T22:41:37.667197shield sshd\[19395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.70.112 |
2020-07-05 06:56:58 |
| 78.128.113.114 | attack | (smtpauth) Failed SMTP AUTH login from 78.128.113.114 (BG/Bulgaria/ip-113-114.4vendeta.com): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-05 03:29:14 login authenticator failed for (ip-113-114.4vendeta.com.) [78.128.113.114]: 535 Incorrect authentication data (set_id=info@sh-sedehlenjan.ir) |
2020-07-05 07:00:52 |
| 190.121.5.210 | attackspam | 5x Failed Password |
2020-07-05 07:09:22 |
| 14.169.255.42 | attack | Jul 4 23:30:34 offspring postfix/smtpd[11628]: warning: hostname static.vnpt.vn does not resolve to address 14.169.255.42 Jul 4 23:30:34 offspring postfix/smtpd[11628]: connect from unknown[14.169.255.42] Jul 4 23:30:37 offspring postfix/smtpd[11628]: warning: unknown[14.169.255.42]: SASL PLAIN authentication failed: authentication failure Jul 4 23:30:38 offspring postfix/smtpd[11628]: warning: unknown[14.169.255.42]: SASL LOGIN authentication failed: authentication failure Jul 4 23:30:38 offspring postfix/smtpd[11628]: warning: unknown[14.169.255.42]: SASL CRAM-MD5 authentication failed: authentication failure Jul 4 23:30:39 offspring postfix/smtpd[11628]: disconnect from unknown[14.169.255.42] Jul 4 23:30:39 offspring postfix/smtpd[11628]: warning: hostname static.vnpt.vn does not resolve to address 14.169.255.42 Jul 4 23:30:39 offspring postfix/smtpd[11628]: connect from unknown[14.169.255.42] Jul 4 23:30:42 offspring postfix/smtpd[11628]: warning: unknown[1........ ------------------------------- |
2020-07-05 07:19:00 |
| 124.156.120.214 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-04T21:42:05Z and 2020-07-04T21:53:54Z |
2020-07-05 07:15:10 |
| 66.249.231.161 | attackbots | Lines containing failures of 66.249.231.161 (max 1000) Jul 4 22:10:36 localhost sshd[2197]: Connection closed by 66.249.231.161 port 41806 [preauth] Jul 4 22:22:04 localhost sshd[4132]: User r.r from 66.249.231.161 not allowed because listed in DenyUsers Jul 4 22:22:04 localhost sshd[4132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.231.161 user=r.r Jul 4 22:22:05 localhost sshd[4132]: Failed password for invalid user r.r from 66.249.231.161 port 42304 ssh2 Jul 4 22:22:06 localhost sshd[4132]: Received disconnect from 66.249.231.161 port 42304:11: Bye Bye [preauth] Jul 4 22:22:06 localhost sshd[4132]: Disconnected from invalid user r.r 66.249.231.161 port 42304 [preauth] Jul 4 22:30:43 localhost sshd[5564]: Invalid user ubnt from 66.249.231.161 port 42808 Jul 4 22:30:43 localhost sshd[5564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.231.161 ........ --------------------------------------------- |
2020-07-05 07:15:59 |