城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.106.75.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17079
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;249.106.75.31. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:34:29 CST 2025
;; MSG SIZE rcvd: 106
Host 31.75.106.249.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 31.75.106.249.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 5.182.210.228 | attackbots | Unauthorized SSH login attempts |
2020-07-02 01:03:32 |
| 144.21.71.72 | attack | Unauthorized connection attempt detected from IP address 144.21.71.72 to port 8080 [T] |
2020-07-02 01:02:36 |
| 181.48.120.220 | attackspambots | Jun 30 22:27:17 myhostname sshd[29271]: Invalid user gny from 181.48.120.220 Jun 30 22:27:17 myhostname sshd[29271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.120.220 Jun 30 22:27:19 myhostname sshd[29271]: Failed password for invalid user gny from 181.48.120.220 port 17588 ssh2 Jun 30 22:27:19 myhostname sshd[29271]: Received disconnect from 181.48.120.220 port 17588:11: Bye Bye [preauth] Jun 30 22:27:19 myhostname sshd[29271]: Disconnected from 181.48.120.220 port 17588 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=181.48.120.220 |
2020-07-02 01:37:06 |
| 159.65.219.250 | attackbots | Auto reported by IDS |
2020-07-02 01:25:15 |
| 159.89.91.67 | attack | (sshd) Failed SSH login from 159.89.91.67 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 30 22:48:35 s1 sshd[18355]: Invalid user oracle from 159.89.91.67 port 57492 Jun 30 22:48:37 s1 sshd[18355]: Failed password for invalid user oracle from 159.89.91.67 port 57492 ssh2 Jun 30 22:54:04 s1 sshd[18816]: Invalid user nano from 159.89.91.67 port 46374 Jun 30 22:54:06 s1 sshd[18816]: Failed password for invalid user nano from 159.89.91.67 port 46374 ssh2 Jun 30 22:57:39 s1 sshd[19113]: Invalid user fangzhe from 159.89.91.67 port 44728 |
2020-07-02 01:15:00 |
| 46.38.148.2 | attackbots | 2020-06-30T20:56:33.849160beta postfix/smtpd[6840]: warning: unknown[46.38.148.2]: SASL LOGIN authentication failed: authentication failure 2020-06-30T20:56:56.636539beta postfix/smtpd[6843]: warning: unknown[46.38.148.2]: SASL LOGIN authentication failed: authentication failure 2020-06-30T20:57:17.750100beta postfix/smtpd[6848]: warning: unknown[46.38.148.2]: SASL LOGIN authentication failed: authentication failure ... |
2020-07-02 01:29:03 |
| 62.210.206.110 | attack | Jun 30 19:44:14 ns382633 sshd\[10855\]: Invalid user doom from 62.210.206.110 port 49556 Jun 30 19:44:14 ns382633 sshd\[10855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.206.110 Jun 30 19:44:16 ns382633 sshd\[10855\]: Failed password for invalid user doom from 62.210.206.110 port 49556 ssh2 Jun 30 19:47:56 ns382633 sshd\[11620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.206.110 user=root Jun 30 19:47:58 ns382633 sshd\[11620\]: Failed password for root from 62.210.206.110 port 49284 ssh2 |
2020-07-02 01:14:27 |
| 138.197.5.191 | attackspambots | Jul 1 02:58:54 itv-usvr-01 sshd[14987]: Invalid user lyg from 138.197.5.191 Jul 1 02:58:54 itv-usvr-01 sshd[14987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191 Jul 1 02:58:54 itv-usvr-01 sshd[14987]: Invalid user lyg from 138.197.5.191 Jul 1 02:58:57 itv-usvr-01 sshd[14987]: Failed password for invalid user lyg from 138.197.5.191 port 57596 ssh2 Jul 1 03:05:58 itv-usvr-01 sshd[15316]: Invalid user test1 from 138.197.5.191 |
2020-07-02 01:22:39 |
| 185.220.101.145 | attackbots | Unauthorized connection attempt detected from IP address 185.220.101.145 to port 7001 |
2020-07-02 01:45:13 |
| 211.238.147.200 | attack | Fail2Ban Ban Triggered |
2020-07-02 01:59:16 |
| 159.89.114.40 | attack | Jun 30 19:48:07 l02a sshd[21588]: Invalid user greg from 159.89.114.40 Jun 30 19:48:07 l02a sshd[21588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.114.40 Jun 30 19:48:07 l02a sshd[21588]: Invalid user greg from 159.89.114.40 Jun 30 19:48:09 l02a sshd[21588]: Failed password for invalid user greg from 159.89.114.40 port 35752 ssh2 |
2020-07-02 01:16:15 |
| 192.241.228.237 | attack | ZGrab Application Layer Scanner Detection |
2020-07-02 01:27:27 |
| 193.228.108.122 | attackbots | Bruteforce detected by fail2ban |
2020-07-02 01:23:23 |
| 137.74.206.80 | attack | Automatic report - XMLRPC Attack |
2020-07-02 01:58:44 |
| 171.224.180.84 | attack | Port probing on unauthorized port 445 |
2020-07-02 01:21:36 |