城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.157.216.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;254.157.216.98. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400
;; Query time: 157 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:00:22 CST 2025
;; MSG SIZE rcvd: 107
Host 98.216.157.254.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 98.216.157.254.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.176.27.98 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 41032 proto: TCP cat: Misc Attack |
2019-12-30 08:25:03 |
| 91.106.193.72 | attackspambots | Dec 29 14:17:38 web9 sshd\[23134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.106.193.72 user=mysql Dec 29 14:17:40 web9 sshd\[23134\]: Failed password for mysql from 91.106.193.72 port 41950 ssh2 Dec 29 14:20:40 web9 sshd\[23547\]: Invalid user carin from 91.106.193.72 Dec 29 14:20:40 web9 sshd\[23547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.106.193.72 Dec 29 14:20:42 web9 sshd\[23547\]: Failed password for invalid user carin from 91.106.193.72 port 44816 ssh2 |
2019-12-30 08:34:02 |
| 79.84.88.56 | attackspambots | $f2bV_matches |
2019-12-30 08:33:10 |
| 163.172.49.106 | attack | 2019-12-30T00:43:19.066558shield sshd\[12982\]: Invalid user ccccc from 163.172.49.106 port 50376 2019-12-30T00:43:19.072996shield sshd\[12982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.49.106 2019-12-30T00:43:21.752607shield sshd\[12982\]: Failed password for invalid user ccccc from 163.172.49.106 port 50376 ssh2 2019-12-30T00:46:23.989947shield sshd\[13869\]: Invalid user half-life from 163.172.49.106 port 53472 2019-12-30T00:46:23.995546shield sshd\[13869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.49.106 |
2019-12-30 08:47:57 |
| 46.21.111.93 | attack | Dec 29 09:14:37 server sshd\[18608\]: Invalid user web from 46.21.111.93 Dec 29 09:14:37 server sshd\[18608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.21.111.93 Dec 29 09:14:39 server sshd\[18608\]: Failed password for invalid user web from 46.21.111.93 port 41770 ssh2 Dec 30 02:03:14 server sshd\[12240\]: Invalid user abdulkaf from 46.21.111.93 Dec 30 02:03:14 server sshd\[12240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.21.111.93 ... |
2019-12-30 08:15:48 |
| 192.254.129.171 | attackspambots | HTTP Directory Traversal Vulnerability, PTR: viv.vivenproducciones.com. |
2019-12-30 08:34:20 |
| 185.186.191.14 | attackspambots | Automatic report - Port Scan Attack |
2019-12-30 08:50:44 |
| 189.209.254.176 | attackspambots | Automatic report - Port Scan Attack |
2019-12-30 08:22:16 |
| 98.207.101.228 | attackspam | Dec 30 01:13:51 sd-53420 sshd\[18601\]: Invalid user florus from 98.207.101.228 Dec 30 01:13:51 sd-53420 sshd\[18601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.207.101.228 Dec 30 01:13:52 sd-53420 sshd\[18601\]: Failed password for invalid user florus from 98.207.101.228 port 51552 ssh2 Dec 30 01:20:18 sd-53420 sshd\[20748\]: Invalid user info from 98.207.101.228 Dec 30 01:20:18 sd-53420 sshd\[20748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.207.101.228 ... |
2019-12-30 08:45:11 |
| 139.199.127.60 | attackspam | Dec 30 01:01:27 MK-Soft-Root1 sshd[19077]: Failed password for root from 139.199.127.60 port 43310 ssh2 ... |
2019-12-30 08:52:34 |
| 49.88.112.75 | attack | Dec 30 00:01:53 ovpn sshd\[18933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75 user=root Dec 30 00:01:54 ovpn sshd\[18933\]: Failed password for root from 49.88.112.75 port 15723 ssh2 Dec 30 00:02:45 ovpn sshd\[19148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75 user=root Dec 30 00:02:47 ovpn sshd\[19148\]: Failed password for root from 49.88.112.75 port 57406 ssh2 Dec 30 00:02:49 ovpn sshd\[19148\]: Failed password for root from 49.88.112.75 port 57406 ssh2 |
2019-12-30 08:29:21 |
| 182.61.149.96 | attackspam | Dec 29 08:30:46 server sshd\[10355\]: Invalid user shit from 182.61.149.96 Dec 29 08:30:46 server sshd\[10355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.96 Dec 29 08:30:48 server sshd\[10355\]: Failed password for invalid user shit from 182.61.149.96 port 34704 ssh2 Dec 30 02:02:33 server sshd\[12123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.96 user=root Dec 30 02:02:35 server sshd\[12123\]: Failed password for root from 182.61.149.96 port 38430 ssh2 ... |
2019-12-30 08:38:29 |
| 182.61.18.254 | attackspam | Automatic report - Banned IP Access |
2019-12-30 08:30:09 |
| 136.232.236.6 | attackspam | Dec 30 00:02:36 sxvn sshd[2043222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.232.236.6 |
2019-12-30 08:37:58 |
| 190.149.59.82 | attackbots | 12/29/2019-18:02:53.968962 190.149.59.82 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-12-30 08:27:58 |