城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.179.19.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;253.179.19.49. IN A
;; AUTHORITY SECTION:
. 323 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010800 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 02:45:28 CST 2022
;; MSG SIZE rcvd: 106
Host 49.19.179.253.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 49.19.179.253.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.35.168.203 | attackspam | Automatic report - Banned IP Access |
2020-09-14 13:54:45 |
| 117.69.188.17 | attackspam | Sep 13 20:36:33 srv01 postfix/smtpd\[8700\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:39:59 srv01 postfix/smtpd\[23344\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:43:25 srv01 postfix/smtpd\[15615\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:46:51 srv01 postfix/smtpd\[15615\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:50:17 srv01 postfix/smtpd\[14316\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-14 13:46:55 |
| 222.186.30.76 | attackbots | 2020-09-14T07:21:44.709090vps773228.ovh.net sshd[24019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76 user=root 2020-09-14T07:21:46.427610vps773228.ovh.net sshd[24019]: Failed password for root from 222.186.30.76 port 30094 ssh2 2020-09-14T07:21:44.709090vps773228.ovh.net sshd[24019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76 user=root 2020-09-14T07:21:46.427610vps773228.ovh.net sshd[24019]: Failed password for root from 222.186.30.76 port 30094 ssh2 2020-09-14T07:21:48.304341vps773228.ovh.net sshd[24019]: Failed password for root from 222.186.30.76 port 30094 ssh2 ... |
2020-09-14 13:36:04 |
| 117.176.104.102 | attack | Invalid user local from 117.176.104.102 port 43478 |
2020-09-14 13:37:31 |
| 181.114.208.114 | attackbots | (smtpauth) Failed SMTP AUTH login from 181.114.208.114 (AR/Argentina/host-208-114.adc.net.ar): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-13 21:27:38 plain authenticator failed for ([181.114.208.114]) [181.114.208.114]: 535 Incorrect authentication data (set_id=int) |
2020-09-14 13:48:41 |
| 14.241.250.254 | attackspambots | Sep 12 02:09:13 dax sshd[23818]: warning: /etc/hosts.deny, line 15136: host name/address mismatch: 14.241.250.254 != static.vnpt.vn Sep 12 02:09:14 dax sshd[23818]: Address 14.241.250.254 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 12 02:09:14 dax sshd[23818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.241.250.254 user=r.r Sep 12 02:09:16 dax sshd[23818]: Failed password for r.r from 14.241.250.254 port 53982 ssh2 Sep 12 02:09:16 dax sshd[23818]: Received disconnect from 14.241.250.254: 11: Bye Bye [preauth] Sep 12 02:16:48 dax sshd[24974]: warning: /etc/hosts.deny, line 15136: host name/address mismatch: 14.241.250.254 != static.vnpt.vn Sep 12 02:16:54 dax sshd[24974]: Address 14.241.250.254 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 12 02:16:54 dax sshd[24974]: pam_unix(sshd:auth): authentication failure; logna........ ------------------------------- |
2020-09-14 13:43:27 |
| 54.37.235.183 | attackspam | Sep 14 04:52:41 django-0 sshd[27509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.ip-54-37-235.eu user=root Sep 14 04:52:43 django-0 sshd[27509]: Failed password for root from 54.37.235.183 port 50236 ssh2 ... |
2020-09-14 13:45:21 |
| 41.193.122.77 | attack | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-14 13:30:22 |
| 45.129.33.16 | attack |
|
2020-09-14 13:40:34 |
| 49.233.84.59 | attackbotsspam | Sep 14 06:25:44 mout sshd[19110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.84.59 user=root Sep 14 06:25:47 mout sshd[19110]: Failed password for root from 49.233.84.59 port 34880 ssh2 |
2020-09-14 13:43:10 |
| 94.102.49.106 | attackbotsspam |
|
2020-09-14 13:53:03 |
| 66.249.75.170 | attackbots | Sep 13 18:57:52 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=66.249.75.170 DST=217.198.117.163 LEN=60 TOS=0x00 PREC=0x00 TTL=105 ID=27605 PROTO=TCP SPT=50535 DPT=8080 WINDOW=65535 RES=0x00 SYN URGP=0 Sep 13 18:57:53 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=66.249.75.170 DST=217.198.117.163 LEN=60 TOS=0x00 PREC=0x00 TTL=105 ID=28028 PROTO=TCP SPT=50535 DPT=8080 WINDOW=65535 RES=0x00 SYN URGP=0 Sep 13 18:57:55 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=66.249.75.170 DST=217.198.117.163 LEN=60 TOS=0x00 PREC=0x00 TTL=105 ID=28878 PROTO=TCP SPT=50535 DPT=8080 WINDOW=65535 RES=0x00 SYN URGP=0 Sep 13 18:57:59 *hidden* kernel: [UFW BLOCK] IN=ens192 OUT= MAC=00:50:56:bc:13:b8:00:07:7d:bd:41:7f:08:00 SRC=66.249.75.170 DST=217.198.117.163 LEN=60 TOS=0x00 PREC=0x00 TTL=105 ID=29903 PROTO=TCP SPT=50535 DPT=8080 WINDOW=65535 RES=0x00 SYN URGP=0 Sep ... |
2020-09-14 13:32:29 |
| 51.77.34.244 | attackbots | 2020-09-14T08:07:52.304916snf-827550 sshd[25218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip244.ip-51-77-34.eu user=root 2020-09-14T08:07:54.143579snf-827550 sshd[25218]: Failed password for root from 51.77.34.244 port 50104 ssh2 2020-09-14T08:11:55.368877snf-827550 sshd[25264]: Invalid user constantina from 51.77.34.244 port 34382 ... |
2020-09-14 13:29:14 |
| 115.97.193.152 | attack | srvr3: (mod_security) mod_security (id:920350) triggered by 115.97.193.152 (IN/-/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/09/13 18:57:22 [error] 479773#0: *2523 [client 115.97.193.152] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host' [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/GponForm/diag_Form"] [unique_id "160001624233.989233"] [ref "o0,12v48,12"], client: 115.97.193.152, [redacted] request: "POST /GponForm/diag_Form?images/ HTTP/1.1" [redacted] |
2020-09-14 14:05:21 |
| 185.220.101.17 | attackspam | 1,55-01/01 [bc01/m66] PostRequest-Spammer scoring: brussels |
2020-09-14 13:59:08 |