城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.42.107.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9842
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;253.42.107.203. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:21:48 CST 2025
;; MSG SIZE rcvd: 107
Host 203.107.42.253.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 203.107.42.253.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 34.75.80.41 | attackspam | May 31 13:20:55 cumulus sshd[26366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.75.80.41 user=r.r May 31 13:20:57 cumulus sshd[26366]: Failed password for r.r from 34.75.80.41 port 38066 ssh2 May 31 13:20:57 cumulus sshd[26366]: Received disconnect from 34.75.80.41 port 38066:11: Bye Bye [preauth] May 31 13:20:57 cumulus sshd[26366]: Disconnected from 34.75.80.41 port 38066 [preauth] May 31 13:24:52 cumulus sshd[26724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.75.80.41 user=r.r May 31 13:24:55 cumulus sshd[26724]: Failed password for r.r from 34.75.80.41 port 32804 ssh2 May 31 13:24:55 cumulus sshd[26724]: Received disconnect from 34.75.80.41 port 32804:11: Bye Bye [preauth] May 31 13:24:55 cumulus sshd[26724]: Disconnected from 34.75.80.41 port 32804 [preauth] May 31 13:26:27 cumulus sshd[26891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ........ ------------------------------- |
2020-06-01 07:53:26 |
| 51.38.98.191 | attackbots | " " |
2020-06-01 07:40:21 |
| 111.242.204.165 | attackspam | May 31 22:22:55 debian-2gb-nbg1-2 kernel: \[13215350.027681\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=111.242.204.165 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=31884 PROTO=TCP SPT=46630 DPT=2323 WINDOW=55358 RES=0x00 SYN URGP=0 |
2020-06-01 07:52:37 |
| 190.210.225.120 | attackbots | May 31 16:08:27 r.ca auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=support rhost=190.210.225.120 |
2020-06-01 07:20:27 |
| 43.226.69.71 | attack | May 31 18:50:09 vps34202 sshd[10532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.71 user=r.r May 31 18:50:10 vps34202 sshd[10532]: Failed password for r.r from 43.226.69.71 port 38398 ssh2 May 31 18:50:11 vps34202 sshd[10532]: Received disconnect from 43.226.69.71: 11: Bye Bye [preauth] May 31 18:59:04 vps34202 sshd[10607]: Connection closed by 43.226.69.71 [preauth] May 31 19:00:37 vps34202 sshd[10653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.71 user=r.r May 31 19:00:39 vps34202 sshd[10653]: Failed password for r.r from 43.226.69.71 port 49778 ssh2 May 31 19:00:40 vps34202 sshd[10653]: Received disconnect from 43.226.69.71: 11: Bye Bye [preauth] May 31 19:03:00 vps34202 sshd[10672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.71 user=r.r May 31 19:03:02 vps34202 sshd[10672]: Failed password for r.r fro........ ------------------------------- |
2020-06-01 07:48:08 |
| 89.248.167.131 | attackspambots | 01.06.2020 01:08:07 - SMTP Spam without Auth on hMailserver Detected by ELinOX-hMail-A2F |
2020-06-01 07:38:23 |
| 105.0.1.68 | attack | blogonese.net 105.0.1.68 [31/May/2020:22:23:34 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4263 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" blogonese.net 105.0.1.68 [31/May/2020:22:23:39 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4263 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" |
2020-06-01 07:22:48 |
| 31.167.150.226 | attackbotsspam | May 31 21:23:07 IngegnereFirenze sshd[3659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.167.150.226 user=root ... |
2020-06-01 07:21:37 |
| 129.226.67.136 | attackbotsspam | SSH brute-force attempt |
2020-06-01 07:54:08 |
| 120.53.20.111 | attack | May 31 23:56:04 ncomp sshd[1802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.20.111 user=root May 31 23:56:06 ncomp sshd[1802]: Failed password for root from 120.53.20.111 port 42302 ssh2 Jun 1 00:04:29 ncomp sshd[2186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.20.111 user=root Jun 1 00:04:31 ncomp sshd[2186]: Failed password for root from 120.53.20.111 port 44682 ssh2 |
2020-06-01 07:23:47 |
| 222.186.180.142 | attackbots | Jun 1 09:40:59 localhost sshd[1916639]: Disconnected from 222.186.180.142 port 51500 [preauth] ... |
2020-06-01 07:44:03 |
| 189.203.240.84 | attack | Jun 1 01:10:42 localhost sshd\[23934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.203.240.84 user=root Jun 1 01:10:44 localhost sshd\[23934\]: Failed password for root from 189.203.240.84 port 60404 ssh2 Jun 1 01:13:35 localhost sshd\[23974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.203.240.84 user=root Jun 1 01:13:37 localhost sshd\[23974\]: Failed password for root from 189.203.240.84 port 53012 ssh2 Jun 1 01:16:32 localhost sshd\[24172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.203.240.84 user=root ... |
2020-06-01 07:20:49 |
| 163.43.116.204 | attack | May 31 17:10:48 dax sshd[2012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.43.116.204 user=r.r May 31 17:10:50 dax sshd[2012]: Failed password for r.r from 163.43.116.204 port 60340 ssh2 May 31 17:10:51 dax sshd[2012]: Received disconnect from 163.43.116.204: 11: Bye Bye [preauth] May 31 17:21:12 dax sshd[3454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.43.116.204 user=r.r May 31 17:21:14 dax sshd[3454]: Failed password for r.r from 163.43.116.204 port 56728 ssh2 May 31 17:21:14 dax sshd[3454]: Received disconnect from 163.43.116.204: 11: Bye Bye [preauth] May 31 17:25:04 dax sshd[3894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.43.116.204 user=r.r May 31 17:25:07 dax sshd[3894]: Failed password for r.r from 163.43.116.204 port 36032 ssh2 May 31 17:25:07 dax sshd[3894]: Received disconnect from 163.43.116.204: 11: Bye By........ ------------------------------- |
2020-06-01 07:35:28 |
| 61.91.164.142 | attackspambots | (imapd) Failed IMAP login from 61.91.164.142 (TH/Thailand/61-91-164-142.static.asianet.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 1 00:52:53 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 53 secs): user= |
2020-06-01 07:52:59 |
| 101.89.151.127 | attackspambots | Jun 1 00:14:15 localhost sshd\[20548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.151.127 user=root Jun 1 00:14:17 localhost sshd\[20548\]: Failed password for root from 101.89.151.127 port 49230 ssh2 Jun 1 00:17:57 localhost sshd\[20797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.151.127 user=root Jun 1 00:18:00 localhost sshd\[20797\]: Failed password for root from 101.89.151.127 port 48106 ssh2 Jun 1 00:21:33 localhost sshd\[21112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.151.127 user=root ... |
2020-06-01 07:42:41 |