城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.93.42.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;252.93.42.216. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 15:06:14 CST 2025
;; MSG SIZE rcvd: 106
Host 216.42.93.252.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 216.42.93.252.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 213.32.23.58 | attackbots | Repeated brute force against a port |
2020-08-15 23:20:21 |
| 93.64.5.34 | attackbots | Aug 15 14:46:17 onepixel sshd[1641887]: Invalid user P@$$vv0rd!@# from 93.64.5.34 port 64383 Aug 15 14:46:17 onepixel sshd[1641887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.64.5.34 Aug 15 14:46:17 onepixel sshd[1641887]: Invalid user P@$$vv0rd!@# from 93.64.5.34 port 64383 Aug 15 14:46:18 onepixel sshd[1641887]: Failed password for invalid user P@$$vv0rd!@# from 93.64.5.34 port 64383 ssh2 Aug 15 14:50:07 onepixel sshd[1644105]: Invalid user wsmyaoai!@ from 93.64.5.34 port 12134 |
2020-08-15 23:09:07 |
| 106.52.57.120 | attackbotsspam | Aug 15 15:47:49 h2646465 sshd[2923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.57.120 user=root Aug 15 15:47:50 h2646465 sshd[2923]: Failed password for root from 106.52.57.120 port 55614 ssh2 Aug 15 16:06:08 h2646465 sshd[5673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.57.120 user=root Aug 15 16:06:10 h2646465 sshd[5673]: Failed password for root from 106.52.57.120 port 36962 ssh2 Aug 15 16:11:59 h2646465 sshd[6321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.57.120 user=root Aug 15 16:12:01 h2646465 sshd[6321]: Failed password for root from 106.52.57.120 port 44844 ssh2 Aug 15 16:17:51 h2646465 sshd[6994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.57.120 user=root Aug 15 16:17:54 h2646465 sshd[6994]: Failed password for root from 106.52.57.120 port 52728 ssh2 Aug 15 16:23:44 h2646465 sshd[7631]: |
2020-08-15 23:23:40 |
| 193.56.28.102 | attackspam | Aug 15 15:48:07 blackbee postfix/smtpd[26477]: warning: unknown[193.56.28.102]: SASL LOGIN authentication failed: authentication failure Aug 15 15:49:59 blackbee postfix/smtpd[26481]: warning: unknown[193.56.28.102]: SASL LOGIN authentication failed: authentication failure Aug 15 15:51:50 blackbee postfix/smtpd[26483]: warning: unknown[193.56.28.102]: SASL LOGIN authentication failed: authentication failure Aug 15 15:53:47 blackbee postfix/smtpd[26485]: warning: unknown[193.56.28.102]: SASL LOGIN authentication failed: authentication failure Aug 15 15:55:43 blackbee postfix/smtpd[26488]: warning: unknown[193.56.28.102]: SASL LOGIN authentication failed: authentication failure ... |
2020-08-15 23:32:46 |
| 218.92.0.249 | attackspambots | Aug 15 17:28:04 piServer sshd[7232]: Failed password for root from 218.92.0.249 port 33055 ssh2 Aug 15 17:28:08 piServer sshd[7232]: Failed password for root from 218.92.0.249 port 33055 ssh2 Aug 15 17:28:12 piServer sshd[7232]: Failed password for root from 218.92.0.249 port 33055 ssh2 Aug 15 17:28:16 piServer sshd[7232]: Failed password for root from 218.92.0.249 port 33055 ssh2 ... |
2020-08-15 23:35:45 |
| 41.225.16.156 | attack | failed root login |
2020-08-15 23:26:00 |
| 103.131.71.109 | attackspambots | (mod_security) mod_security (id:210730) triggered by 103.131.71.109 (VN/Vietnam/bot-103-131-71-109.coccoc.com): 5 in the last 3600 secs |
2020-08-15 23:37:52 |
| 51.91.111.73 | attack | Aug 15 14:14:15 server sshd[8273]: Failed password for root from 51.91.111.73 port 32856 ssh2 Aug 15 14:18:21 server sshd[13569]: Failed password for root from 51.91.111.73 port 43088 ssh2 Aug 15 14:22:28 server sshd[19149]: Failed password for root from 51.91.111.73 port 53320 ssh2 |
2020-08-15 23:08:42 |
| 85.209.0.103 | attackspam |
|
2020-08-15 23:40:55 |
| 86.188.246.2 | attackspambots | prod6 ... |
2020-08-15 23:18:14 |
| 49.88.112.114 | attackspam | 2020-08-15T16:22:41.117874ks3355764 sshd[13574]: Failed password for root from 49.88.112.114 port 12896 ssh2 2020-08-15T16:22:45.184692ks3355764 sshd[13574]: Failed password for root from 49.88.112.114 port 12896 ssh2 ... |
2020-08-15 23:44:51 |
| 148.72.31.117 | attackspambots | 148.72.31.117 - - [15/Aug/2020:15:16:20 +0100] "POST /wp-login.php HTTP/1.1" 200 1967 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 148.72.31.117 - - [15/Aug/2020:15:16:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 148.72.31.117 - - [15/Aug/2020:15:16:21 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-15 23:39:46 |
| 79.137.33.20 | attack | 2020-08-15T13:58:40.271095ionos.janbro.de sshd[22807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20 user=root 2020-08-15T13:58:42.157620ionos.janbro.de sshd[22807]: Failed password for root from 79.137.33.20 port 38234 ssh2 2020-08-15T14:02:37.674382ionos.janbro.de sshd[22841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20 user=root 2020-08-15T14:02:40.096400ionos.janbro.de sshd[22841]: Failed password for root from 79.137.33.20 port 43270 ssh2 2020-08-15T14:06:39.608804ionos.janbro.de sshd[22852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20 user=root 2020-08-15T14:06:41.921672ionos.janbro.de sshd[22852]: Failed password for root from 79.137.33.20 port 48306 ssh2 2020-08-15T14:10:43.538166ionos.janbro.de sshd[22863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20 ... |
2020-08-15 23:16:52 |
| 46.101.19.133 | attackspambots | Aug 15 16:17:31 pve1 sshd[13616]: Failed password for root from 46.101.19.133 port 59939 ssh2 ... |
2020-08-15 23:26:58 |
| 165.227.26.69 | attack | Aug 15 05:25:02 web1 sshd\[5901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.26.69 user=root Aug 15 05:25:04 web1 sshd\[5901\]: Failed password for root from 165.227.26.69 port 43550 ssh2 Aug 15 05:28:52 web1 sshd\[6257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.26.69 user=root Aug 15 05:28:54 web1 sshd\[6257\]: Failed password for root from 165.227.26.69 port 49314 ssh2 Aug 15 05:32:36 web1 sshd\[6577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.26.69 user=root |
2020-08-15 23:37:22 |