城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.41.146.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;254.41.146.50. IN A
;; AUTHORITY SECTION:
. 463 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022121600 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 16 23:19:33 CST 2022
;; MSG SIZE rcvd: 106
Host 50.146.41.254.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 50.146.41.254.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 180.117.100.58 | attack | 2019-06-23T21:49:31.032353mail01 postfix/smtpd[2267]: warning: unknown[180.117.100.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-23T21:49:39.479095mail01 postfix/smtpd[31706]: warning: unknown[180.117.100.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-23T21:49:51.035131mail01 postfix/smtpd[30957]: warning: unknown[180.117.100.58]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-06-24 11:36:51 |
| 148.66.132.169 | attack | 148.66.132.169 - - [23/Jun/2019:21:50:03 +0200] "POST [munged]wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000 |
2019-06-24 11:30:00 |
| 185.234.219.98 | attack | Jun 24 03:45:24 mail postfix/smtpd\[12725\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 24 03:55:30 mail postfix/smtpd\[12873\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 24 04:26:04 mail postfix/smtpd\[13547\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 24 04:36:14 mail postfix/smtpd\[13606\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-06-24 11:47:05 |
| 197.50.199.23 | attackspam | Unauthorised access (Jun 23) SRC=197.50.199.23 LEN=52 TTL=116 ID=29441 DF TCP DPT=445 WINDOW=8192 SYN |
2019-06-24 12:08:33 |
| 88.35.102.54 | attackbots | Jun 24 00:13:06 lnxweb61 sshd[23137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.35.102.54 Jun 24 00:13:06 lnxweb61 sshd[23137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.35.102.54 |
2019-06-24 12:18:43 |
| 213.42.70.42 | attackspambots | Many RDP login attempts detected by IDS script |
2019-06-24 11:51:50 |
| 13.232.11.224 | attackbots | 20 attempts against mh-ssh on pluto.magehost.pro |
2019-06-24 11:27:22 |
| 144.64.83.224 | attack | Lines containing failures of 144.64.83.224 auth.log:Jun 22 12:58:44 omfg sshd[956]: Connection from 144.64.83.224 port 35524 on 78.46.60.40 port 22 auth.log:Jun 22 12:58:52 omfg sshd[956]: Bad protocol version identification '' from 144.64.83.224 port 35524 auth.log:Jun 22 12:58:53 omfg sshd[957]: Connection from 144.64.83.224 port 37318 on 78.46.60.40 port 22 auth.log:Jun 22 12:59:36 omfg sshd[957]: Invalid user support from 144.64.83.224 auth.log:Jun 22 12:59:43 omfg sshd[957]: Connection closed by 144.64.83.224 port 37318 [preauth] auth.log:Jun 22 12:59:49 omfg sshd[959]: Connection from 144.64.83.224 port 47677 on 78.46.60.40 port 22 auth.log:Jun 22 13:01:38 omfg sshd[959]: Invalid user ubnt from 144.64.83.224 auth.log:Jun 22 13:01:47 omfg sshd[959]: Connection closed by 144.64.83.224 port 47677 [preauth] auth.log:Jun 22 13:01:50 omfg sshd[2297]: Connection from 144.64.83.224 port 41580 on 78.46.60.40 port 22 auth.log:Jun 22 13:03:08 omfg sshd[2297]: Invalid user cis........ ------------------------------ |
2019-06-24 12:05:10 |
| 200.66.116.24 | attackspambots | SMTP-sasl brute force ... |
2019-06-24 11:38:43 |
| 62.183.42.13 | attackspam | firewall-block, port(s): 445/tcp |
2019-06-24 11:31:50 |
| 106.75.225.42 | attack | SPF Fail sender not permitted to send mail for @loveless.it / Mail sent to address hacked/leaked from atari.st |
2019-06-24 12:19:50 |
| 168.196.148.181 | attackspambots | SMTP-sasl brute force ... |
2019-06-24 11:35:57 |
| 175.45.18.22 | attack | 445/tcp 445/tcp 445/tcp... [2019-04-23/06-23]15pkt,1pt.(tcp) |
2019-06-24 12:11:03 |
| 191.53.199.224 | attackspam | $f2bV_matches |
2019-06-24 12:21:02 |
| 89.210.124.102 | attack | Telnet Server BruteForce Attack |
2019-06-24 12:22:39 |