城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.106.5.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;254.106.5.237. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024122700 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 27 17:46:10 CST 2024
;; MSG SIZE rcvd: 106
Host 237.5.106.254.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 237.5.106.254.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.0.102.40 | attackbots | [Fri Aug 14 22:43:48.388291 2020] [authz_core:error] [pid 16570] [client 192.0.102.40:43077] AH01630: client denied by server configuration: /var/www/buchtic.net/blog/index.php [Fri Aug 14 22:43:48.388611 2020] [authz_core:error] [pid 16570] [client 192.0.102.40:43077] AH01630: client denied by server configuration: /var/www/buchtic.net/blog/index.php ... |
2020-08-15 05:50:49 |
| 115.77.31.113 | attack | Automatic report - Port Scan Attack |
2020-08-15 05:17:47 |
| 125.19.153.156 | attackspambots | Aug 14 20:43:56 *** sshd[9899]: User root from 125.19.153.156 not allowed because not listed in AllowUsers |
2020-08-15 05:42:57 |
| 42.159.155.8 | attack | Aug 14 22:28:55 ns382633 sshd\[14203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.155.8 user=root Aug 14 22:28:57 ns382633 sshd\[14203\]: Failed password for root from 42.159.155.8 port 1600 ssh2 Aug 14 22:40:17 ns382633 sshd\[16702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.155.8 user=root Aug 14 22:40:19 ns382633 sshd\[16702\]: Failed password for root from 42.159.155.8 port 1600 ssh2 Aug 14 22:43:59 ns382633 sshd\[17005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.155.8 user=root |
2020-08-15 05:41:57 |
| 176.92.164.177 | attackspam | Telnet Server BruteForce Attack |
2020-08-15 05:34:42 |
| 20.49.2.187 | attack | Aug 14 22:57:02 piServer sshd[28314]: Failed password for root from 20.49.2.187 port 45492 ssh2 Aug 14 23:01:26 piServer sshd[28795]: Failed password for root from 20.49.2.187 port 57512 ssh2 ... |
2020-08-15 05:49:25 |
| 193.200.160.20 | attackspam | 1597437836 - 08/14/2020 22:43:56 Host: 193.200.160.20/193.200.160.20 Port: 23 TCP Blocked ... |
2020-08-15 05:44:03 |
| 176.114.238.33 | attackbotsspam | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-15 05:17:10 |
| 45.232.73.83 | attackspambots | 2020-08-15T04:01:59.067048hostname sshd[19991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83 user=root 2020-08-15T04:02:00.439582hostname sshd[19991]: Failed password for root from 45.232.73.83 port 52348 ssh2 ... |
2020-08-15 05:34:13 |
| 61.164.213.198 | attackbots | $f2bV_matches |
2020-08-15 05:30:55 |
| 5.34.176.29 | attackspambots | E-Mail Spam (RBL) [REJECTED] |
2020-08-15 05:41:35 |
| 106.51.153.99 | attackbotsspam | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-15 05:47:35 |
| 61.144.173.147 | attackspambots | Aug 13 22:24:49 mail1 sshd[24190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.144.173.147 user=r.r Aug 13 22:24:51 mail1 sshd[24190]: Failed password for r.r from 61.144.173.147 port 4168 ssh2 Aug 13 22:24:51 mail1 sshd[24190]: Received disconnect from 61.144.173.147 port 4168:11: Bye Bye [preauth] Aug 13 22:24:51 mail1 sshd[24190]: Disconnected from 61.144.173.147 port 4168 [preauth] Aug 13 22:33:59 mail1 sshd[24566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.144.173.147 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=61.144.173.147 |
2020-08-15 05:31:27 |
| 147.135.225.193 | attackspam | Unauthorized access detected from black listed ip! |
2020-08-15 05:40:10 |
| 185.216.140.31 | attackspam | Port scan: Attack repeated for 24 hours |
2020-08-15 05:37:41 |