城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 250.105.142.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;250.105.142.232. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:21:10 CST 2025
;; MSG SIZE rcvd: 108
Host 232.142.105.250.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 232.142.105.250.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 110.153.69.125 | attackspambots | "SERVER-WEBAPP GPON Router authentication bypass and command injection attempt" |
2020-02-03 08:35:54 |
| 185.143.223.171 | attack | Brute force attack stopped by firewall |
2020-02-03 08:24:21 |
| 218.92.0.173 | attack | 2020-02-02T19:21:04.343667xentho-1 sshd[6080]: Failed password for root from 218.92.0.173 port 59512 ssh2 2020-02-02T19:20:57.912186xentho-1 sshd[6080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root 2020-02-02T19:21:00.224142xentho-1 sshd[6080]: Failed password for root from 218.92.0.173 port 59512 ssh2 2020-02-02T19:21:04.343667xentho-1 sshd[6080]: Failed password for root from 218.92.0.173 port 59512 ssh2 2020-02-02T19:21:09.324052xentho-1 sshd[6080]: Failed password for root from 218.92.0.173 port 59512 ssh2 2020-02-02T19:20:57.912186xentho-1 sshd[6080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root 2020-02-02T19:21:00.224142xentho-1 sshd[6080]: Failed password for root from 218.92.0.173 port 59512 ssh2 2020-02-02T19:21:04.343667xentho-1 sshd[6080]: Failed password for root from 218.92.0.173 port 59512 ssh2 2020-02-02T19:21:09.324052xentho-1 sshd[6080]: ... |
2020-02-03 08:23:50 |
| 5.101.0.209 | attackbots | Unauthorized connection attempt detected from IP address 5.101.0.209 to port 80 [J] |
2020-02-03 08:18:05 |
| 106.54.114.208 | attackbotsspam | Unauthorized connection attempt detected from IP address 106.54.114.208 to port 2220 [J] |
2020-02-03 08:47:02 |
| 222.252.16.140 | attack | Feb 2 20:26:45 firewall sshd[5197]: Invalid user gast2 from 222.252.16.140 Feb 2 20:26:46 firewall sshd[5197]: Failed password for invalid user gast2 from 222.252.16.140 port 57580 ssh2 Feb 2 20:30:04 firewall sshd[5347]: Invalid user SYSTEM from 222.252.16.140 ... |
2020-02-03 08:23:29 |
| 145.239.210.220 | attack | Unauthorized connection attempt detected from IP address 145.239.210.220 to port 2220 [J] |
2020-02-03 08:33:43 |
| 104.248.71.7 | attackspam | Unauthorized connection attempt detected from IP address 104.248.71.7 to port 2220 [J] |
2020-02-03 08:48:07 |
| 101.251.72.205 | attack | SSH-BruteForce |
2020-02-03 08:38:03 |
| 190.153.249.99 | attack | Invalid user dhruv from 190.153.249.99 port 51810 |
2020-02-03 08:19:24 |
| 39.98.124.123 | attackspambots | IP: 39.98.124.123
Ports affected
World Wide Web HTTP (80)
Abuse Confidence rating 83%
Found in DNSBL('s)
ASN Details
AS37963 Hangzhou Alibaba Advertising Co. Ltd.
China (CN)
CIDR 39.96.0.0/13
Log Date: 2/02/2020 10:48:32 PM UTC |
2020-02-03 08:22:00 |
| 106.12.52.98 | attack | Feb 3 01:22:06 legacy sshd[24975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.52.98 Feb 3 01:22:08 legacy sshd[24975]: Failed password for invalid user kelvin123 from 106.12.52.98 port 43138 ssh2 Feb 3 01:25:29 legacy sshd[25224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.52.98 ... |
2020-02-03 08:47:36 |
| 49.88.112.62 | attackbots | Failed password for root from 49.88.112.62 port 26678 ssh2 Failed password for root from 49.88.112.62 port 26678 ssh2 Failed password for root from 49.88.112.62 port 26678 ssh2 Failed password for root from 49.88.112.62 port 26678 ssh2 |
2020-02-03 08:20:59 |
| 200.193.166.148 | attackbots | 1580686159 - 02/03/2020 00:29:19 Host: 200.193.166.148/200.193.166.148 Port: 445 TCP Blocked |
2020-02-03 09:05:13 |
| 106.12.24.5 | attackspambots | Feb 3 sshd[12693]: Invalid user elastic from 106.12.24.5 port 42750 |
2020-02-03 08:36:35 |