城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.55.234.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;27.55.234.43. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 08:05:00 CST 2025
;; MSG SIZE rcvd: 105
43.234.55.27.in-addr.arpa domain name pointer ppp-27-55-234-43.revip3.asianet.co.th.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
43.234.55.27.in-addr.arpa name = ppp-27-55-234-43.revip3.asianet.co.th.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.231.29.46 | attack | Sep 30 08:17:17 our-server-hostname postfix/smtpd[28333]: connect from unknown[45.231.29.46] Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=45.231.29.46 |
2019-10-04 16:42:40 |
| 139.59.59.194 | attackbots | Oct 4 10:04:37 dedicated sshd[8477]: Invalid user Reality@123 from 139.59.59.194 port 53526 |
2019-10-04 16:12:42 |
| 106.12.85.12 | attackbotsspam | Oct 4 04:13:01 www_kotimaassa_fi sshd[18443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.85.12 Oct 4 04:13:03 www_kotimaassa_fi sshd[18443]: Failed password for invalid user Bugatti-123 from 106.12.85.12 port 43037 ssh2 ... |
2019-10-04 16:20:23 |
| 104.139.5.180 | attackbotsspam | Oct 4 10:11:12 MK-Soft-Root2 sshd[7828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.139.5.180 Oct 4 10:11:14 MK-Soft-Root2 sshd[7828]: Failed password for invalid user 1QaZ2WsX3EdC4RfV from 104.139.5.180 port 37978 ssh2 ... |
2019-10-04 16:27:09 |
| 178.140.96.145 | attack | Oct 1 21:51:36 xb3 sshd[28018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-178-140-96-145.ip.moscow.rt.ru user=r.r Oct 1 21:51:37 xb3 sshd[28018]: Failed password for r.r from 178.140.96.145 port 42896 ssh2 Oct 1 21:51:40 xb3 sshd[28018]: Failed password for r.r from 178.140.96.145 port 42896 ssh2 Oct 1 21:51:42 xb3 sshd[28018]: Failed password for r.r from 178.140.96.145 port 42896 ssh2 Oct 1 21:51:42 xb3 sshd[28018]: Disconnecting: Too many authentication failures for r.r from 178.140.96.145 port 42896 ssh2 [preauth] Oct 1 21:51:42 xb3 sshd[28018]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-178-140-96-145.ip.moscow.rt.ru user=r.r Oct 1 21:51:48 xb3 sshd[28229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-178-140-96-145.ip.moscow.rt.ru user=r.r Oct 1 21:51:50 xb3 sshd[28229]: Failed password for r.r from 1........ ------------------------------- |
2019-10-04 16:35:19 |
| 18.140.165.118 | attack | Oct 4 06:57:43 h2177944 sshd\[15865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.140.165.118 user=root Oct 4 06:57:45 h2177944 sshd\[15865\]: Failed password for root from 18.140.165.118 port 48117 ssh2 Oct 4 07:03:49 h2177944 sshd\[16784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.140.165.118 user=root Oct 4 07:03:50 h2177944 sshd\[16784\]: Failed password for root from 18.140.165.118 port 54233 ssh2 ... |
2019-10-04 16:43:13 |
| 189.175.247.67 | attack | 189.175.247.67 - - [04/Oct/2019:05:52:04 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 189.175.247.67 - - [04/Oct/2019:05:52:31 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 189.175.247.67 - - [04/Oct/2019:05:53:39 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 189.175.247.67 - - [04/Oct/2019:05:53:39 +0200] "POST /wp-login.php HTTP/1.1" 200 1613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 189.175.247.67 - - [04/Oct/2019:05:53:40 +0200] "POST /wp-login.php HTTP/1.1" 200 1622 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 189.175.247.67 - - [04/Oct/2019:05:53:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-10-04 16:25:59 |
| 93.87.28.158 | attackspam | xmlrpc attack |
2019-10-04 16:48:43 |
| 51.158.117.17 | attack | Oct 4 09:43:10 meumeu sshd[5054]: Failed password for root from 51.158.117.17 port 33382 ssh2 Oct 4 09:47:56 meumeu sshd[5737]: Failed password for root from 51.158.117.17 port 51408 ssh2 ... |
2019-10-04 16:08:09 |
| 197.48.130.136 | attackspam | Chat Spam |
2019-10-04 16:07:06 |
| 104.236.124.45 | attack | Oct 4 06:06:09 reporting7 sshd[12657]: User r.r from 104.236.124.45 not allowed because not listed in AllowUsers Oct 4 06:06:09 reporting7 sshd[12657]: Failed password for invalid user r.r from 104.236.124.45 port 50765 ssh2 Oct 4 06:20:18 reporting7 sshd[13845]: User r.r from 104.236.124.45 not allowed because not listed in AllowUsers Oct 4 06:20:18 reporting7 sshd[13845]: Failed password for invalid user r.r from 104.236.124.45 port 40457 ssh2 Oct 4 06:28:13 reporting7 sshd[14556]: User r.r from 104.236.124.45 not allowed because not listed in AllowUsers Oct 4 06:28:13 reporting7 sshd[14556]: Failed password for invalid user r.r from 104.236.124.45 port 47834 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=104.236.124.45 |
2019-10-04 16:15:44 |
| 124.131.197.169 | attackspam | Unauthorised access (Oct 4) SRC=124.131.197.169 LEN=40 TTL=49 ID=27364 TCP DPT=8080 WINDOW=38782 SYN Unauthorised access (Oct 2) SRC=124.131.197.169 LEN=40 TTL=49 ID=45730 TCP DPT=8080 WINDOW=38782 SYN Unauthorised access (Oct 1) SRC=124.131.197.169 LEN=40 TTL=49 ID=40584 TCP DPT=8080 WINDOW=57229 SYN Unauthorised access (Sep 30) SRC=124.131.197.169 LEN=40 TTL=49 ID=63329 TCP DPT=8080 WINDOW=40397 SYN |
2019-10-04 16:31:09 |
| 163.172.72.190 | attackbotsspam | Oct 4 10:16:15 rotator sshd\[5882\]: Invalid user Pa$$wort from 163.172.72.190Oct 4 10:16:17 rotator sshd\[5882\]: Failed password for invalid user Pa$$wort from 163.172.72.190 port 37934 ssh2Oct 4 10:20:20 rotator sshd\[6674\]: Invalid user Italy2017 from 163.172.72.190Oct 4 10:20:22 rotator sshd\[6674\]: Failed password for invalid user Italy2017 from 163.172.72.190 port 50688 ssh2Oct 4 10:24:09 rotator sshd\[6718\]: Invalid user !@\#QAZ from 163.172.72.190Oct 4 10:24:11 rotator sshd\[6718\]: Failed password for invalid user !@\#QAZ from 163.172.72.190 port 35116 ssh2 ... |
2019-10-04 16:52:04 |
| 222.186.52.86 | attack | Oct 4 10:28:44 v22018076622670303 sshd\[30447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.86 user=root Oct 4 10:28:46 v22018076622670303 sshd\[30447\]: Failed password for root from 222.186.52.86 port 47125 ssh2 Oct 4 10:28:48 v22018076622670303 sshd\[30447\]: Failed password for root from 222.186.52.86 port 47125 ssh2 ... |
2019-10-04 16:34:48 |
| 177.103.189.231 | attackspam | Oct 4 09:46:01 MK-Soft-VM5 sshd[30055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.189.231 Oct 4 09:46:03 MK-Soft-VM5 sshd[30055]: Failed password for invalid user Pizza@2017 from 177.103.189.231 port 32651 ssh2 ... |
2019-10-04 16:24:14 |