城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 249.138.148.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38063
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;249.138.148.107. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 12:12:41 CST 2025
;; MSG SIZE rcvd: 108
Host 107.148.138.249.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 107.148.138.249.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.222.181.159 | attackspambots | Nov 30 00:03:12 icinga sshd[3471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.181.159 Nov 30 00:03:14 icinga sshd[3471]: Failed password for invalid user packston from 92.222.181.159 port 39549 ssh2 Nov 30 00:20:14 icinga sshd[19742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.181.159 ... |
2019-11-30 08:04:50 |
| 125.213.224.250 | attack | firewall-block, port(s): 1433/tcp |
2019-11-30 07:54:22 |
| 112.85.42.182 | attackbots | Nov 30 00:22:55 root sshd[4860]: Failed password for root from 112.85.42.182 port 17872 ssh2 Nov 30 00:22:59 root sshd[4860]: Failed password for root from 112.85.42.182 port 17872 ssh2 Nov 30 00:23:03 root sshd[4860]: Failed password for root from 112.85.42.182 port 17872 ssh2 Nov 30 00:23:07 root sshd[4860]: Failed password for root from 112.85.42.182 port 17872 ssh2 ... |
2019-11-30 07:30:08 |
| 185.176.27.18 | attackbotsspam | 11/30/2019-00:32:16.805861 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-30 07:37:17 |
| 80.82.65.60 | attack | 11/29/2019-18:20:46.404359 80.82.65.60 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-30 07:37:35 |
| 106.52.18.180 | attackbots | Nov 29 23:27:58 124388 sshd[850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.18.180 Nov 29 23:27:58 124388 sshd[850]: Invalid user marybeth from 106.52.18.180 port 57234 Nov 29 23:28:01 124388 sshd[850]: Failed password for invalid user marybeth from 106.52.18.180 port 57234 ssh2 Nov 29 23:31:05 124388 sshd[864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.18.180 user=root Nov 29 23:31:07 124388 sshd[864]: Failed password for root from 106.52.18.180 port 33836 ssh2 |
2019-11-30 07:32:59 |
| 185.176.27.170 | attackbotsspam | Nov 29 23:07:28 mail kernel: [6445356.576441] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=62041 PROTO=TCP SPT=45121 DPT=25492 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 29 23:08:02 mail kernel: [6445390.384792] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=932 PROTO=TCP SPT=45121 DPT=54094 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 29 23:08:17 mail kernel: [6445405.223221] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=19212 PROTO=TCP SPT=45121 DPT=54474 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 29 23:08:21 mail kernel: [6445409.520606] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.170 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=32441 PROTO=TCP SPT=45121 DPT=15328 WINDOW=1024 RES=0x0 |
2019-11-30 07:31:58 |
| 159.203.143.58 | attack | Nov 29 12:16:50 server sshd\[6626\]: Failed password for invalid user domain from 159.203.143.58 port 43842 ssh2 Nov 30 02:14:13 server sshd\[29295\]: Invalid user oleg from 159.203.143.58 Nov 30 02:14:13 server sshd\[29295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bangazon.com Nov 30 02:14:15 server sshd\[29295\]: Failed password for invalid user oleg from 159.203.143.58 port 57870 ssh2 Nov 30 02:27:10 server sshd\[330\]: Invalid user guest from 159.203.143.58 Nov 30 02:27:10 server sshd\[330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bangazon.com ... |
2019-11-30 08:04:02 |
| 45.141.84.25 | attackbots | Nov 30 00:20:28 herz-der-gamer sshd[7514]: Invalid user admin from 45.141.84.25 port 8071 ... |
2019-11-30 07:52:51 |
| 188.165.219.27 | attackspambots | Nov 30 00:20:09 lnxmail61 postfix/smtpd[8673]: warning: [munged]:[188.165.219.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 00:20:09 lnxmail61 postfix/smtpd[8673]: lost connection after AUTH from [munged]:[188.165.219.27] Nov 30 00:20:15 lnxmail61 postfix/smtpd[7321]: warning: [munged]:[188.165.219.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 00:20:15 lnxmail61 postfix/smtpd[7321]: lost connection after AUTH from [munged]:[188.165.219.27] Nov 30 00:20:25 lnxmail61 postfix/smtpd[16700]: warning: [munged]:[188.165.219.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 00:20:25 lnxmail61 postfix/smtpd[16700]: lost connection after AUTH from [munged]:[188.165.219.27] |
2019-11-30 07:56:54 |
| 218.92.0.138 | attackspambots | 2019-11-30T00:01:46.056563abusebot-2.cloudsearch.cf sshd\[10210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root |
2019-11-30 08:03:46 |
| 106.54.245.86 | attack | Nov 30 00:15:05 serwer sshd\[6639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.245.86 user=root Nov 30 00:15:07 serwer sshd\[6639\]: Failed password for root from 106.54.245.86 port 44501 ssh2 Nov 30 00:20:51 serwer sshd\[7214\]: Invalid user nj2sc from 106.54.245.86 port 37600 Nov 30 00:20:51 serwer sshd\[7214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.245.86 ... |
2019-11-30 07:31:37 |
| 50.70.229.239 | attackbotsspam | Automatic report - SSH Brute-Force Attack |
2019-11-30 07:38:40 |
| 159.203.13.141 | attackbotsspam | Nov 30 00:20:36 mail sshd\[6670\]: Invalid user jane from 159.203.13.141 Nov 30 00:20:36 mail sshd\[6670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.13.141 Nov 30 00:20:38 mail sshd\[6670\]: Failed password for invalid user jane from 159.203.13.141 port 51662 ssh2 ... |
2019-11-30 07:40:20 |
| 222.186.173.215 | attack | Nov 30 05:03:48 vibhu-HP-Z238-Microtower-Workstation sshd\[28745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Nov 30 05:03:50 vibhu-HP-Z238-Microtower-Workstation sshd\[28745\]: Failed password for root from 222.186.173.215 port 39124 ssh2 Nov 30 05:04:09 vibhu-HP-Z238-Microtower-Workstation sshd\[28819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Nov 30 05:04:11 vibhu-HP-Z238-Microtower-Workstation sshd\[28819\]: Failed password for root from 222.186.173.215 port 28726 ssh2 Nov 30 05:04:34 vibhu-HP-Z238-Microtower-Workstation sshd\[28911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root ... |
2019-11-30 07:36:15 |