城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 29.42.231.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;29.42.231.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:13:43 CST 2025
;; MSG SIZE rcvd: 106
Host 164.231.42.29.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 164.231.42.29.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 179.60.215.157 | attackspam | Chat Spam |
2019-10-02 13:01:12 |
| 31.222.116.167 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/31.222.116.167/ ES - 1H : (175) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : ES NAME ASN : ASN50129 IP : 31.222.116.167 CIDR : 31.222.116.0/22 PREFIX COUNT : 98 UNIQUE IP COUNT : 50432 WYKRYTE ATAKI Z ASN50129 : 1H - 1 3H - 1 6H - 1 12H - 2 24H - 4 DateTime : 2019-10-02 05:54:01 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-02 12:54:38 |
| 111.230.15.197 | attackspambots | Automatic report - Banned IP Access |
2019-10-02 13:45:44 |
| 182.48.64.58 | attack | Oct 1 23:39:04 our-server-hostname postfix/smtpd[18284]: connect from unknown[182.48.64.58] Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct 1 23:39:14 our-server-hostname postfix/smtpd[18284]: lost connection after RCPT from unknown[182.48.64.58] Oct 1 23:39:14 our-server-hostname postfix/smtpd[18284]: disconnect from unknown[182.48.64.58] Oct 1 23:56:12 our-server-hostname postfix/smtpd[30333]: connect from unknown[182.48.64.58] Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct 1 23:56:22 our-server-hostname postfix/smtpd[30333]: lost connection after RCPT from unknown[182.48.64.58] Oct 1 23:56:22 our-server-hostname postfix/smtpd[30333]: disconnect from unknown[182.48.64.58] Oct 2 00:27:30 our-server-hostname postfix/smtpd[15310]: connect from unknown[182.48.64.58] Oct x@x Oct x@x Oct x@x Oct 2 00:27:33 our-server-hostname postfix/smtpd[15310]: lost connection after RCPT from unknown[182.48.64.58] Oct 2 00:27:33 our-server-hostna........ ------------------------------- |
2019-10-02 13:19:52 |
| 153.36.242.143 | attackspambots | Oct 2 01:24:05 debian sshd\[22254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143 user=root Oct 2 01:24:07 debian sshd\[22254\]: Failed password for root from 153.36.242.143 port 61120 ssh2 Oct 2 01:24:09 debian sshd\[22254\]: Failed password for root from 153.36.242.143 port 61120 ssh2 ... |
2019-10-02 13:25:32 |
| 51.174.116.225 | attackspam | Oct 2 04:51:04 game-panel sshd[9815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.174.116.225 Oct 2 04:51:06 game-panel sshd[9815]: Failed password for invalid user uftp from 51.174.116.225 port 43310 ssh2 Oct 2 04:54:59 game-panel sshd[9900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.174.116.225 |
2019-10-02 13:21:31 |
| 60.248.28.105 | attackspambots | Oct 1 18:38:48 hpm sshd\[10393\]: Invalid user sbrown from 60.248.28.105 Oct 1 18:38:48 hpm sshd\[10393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-248-28-105.hinet-ip.hinet.net Oct 1 18:38:50 hpm sshd\[10393\]: Failed password for invalid user sbrown from 60.248.28.105 port 57350 ssh2 Oct 1 18:42:25 hpm sshd\[10875\]: Invalid user l4d2 from 60.248.28.105 Oct 1 18:42:25 hpm sshd\[10875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-248-28-105.hinet-ip.hinet.net |
2019-10-02 12:43:02 |
| 54.201.2.170 | attackspam | Bad bot/spoofed identity |
2019-10-02 13:27:59 |
| 38.89.142.204 | attackbots | 3389BruteforceFW21 |
2019-10-02 13:46:54 |
| 222.186.42.163 | attack | SSH Brute Force, server-1 sshd[27425]: Failed password for root from 222.186.42.163 port 42670 ssh2 |
2019-10-02 12:49:25 |
| 45.113.64.182 | attack | Automatic report - Port Scan Attack |
2019-10-02 12:53:05 |
| 164.68.122.164 | attackbotsspam | Oct 1 19:16:43 web1 sshd\[4167\]: Invalid user prueba from 164.68.122.164 Oct 1 19:16:43 web1 sshd\[4167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.122.164 Oct 1 19:16:44 web1 sshd\[4167\]: Failed password for invalid user prueba from 164.68.122.164 port 48478 ssh2 Oct 1 19:20:16 web1 sshd\[4461\]: Invalid user hatton from 164.68.122.164 Oct 1 19:20:16 web1 sshd\[4461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.68.122.164 |
2019-10-02 13:21:16 |
| 101.110.45.156 | attackspambots | Oct 2 07:11:38 taivassalofi sshd[113243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.110.45.156 Oct 2 07:11:40 taivassalofi sshd[113243]: Failed password for invalid user ubuntu from 101.110.45.156 port 44777 ssh2 ... |
2019-10-02 13:22:36 |
| 191.5.130.69 | attack | Oct 2 06:52:21 bouncer sshd\[3777\]: Invalid user chris from 191.5.130.69 port 36314 Oct 2 06:52:21 bouncer sshd\[3777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.130.69 Oct 2 06:52:23 bouncer sshd\[3777\]: Failed password for invalid user chris from 191.5.130.69 port 36314 ssh2 ... |
2019-10-02 13:12:18 |
| 198.108.66.240 | attackbotsspam | port scan and connect, tcp 443 (https) |
2019-10-02 13:46:37 |