城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.104.2.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;30.104.2.52. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:39:18 CST 2025
;; MSG SIZE rcvd: 104
Host 52.2.104.30.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 52.2.104.30.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 193.112.102.95 | attackbotsspam | Mar 16 15:59:02 ns41 sshd[14275]: Failed password for root from 193.112.102.95 port 60118 ssh2 Mar 16 15:59:02 ns41 sshd[14275]: Failed password for root from 193.112.102.95 port 60118 ssh2 |
2020-03-16 23:19:55 |
| 46.209.209.74 | attackbotsspam | Unauthorized connection attempt detected from IP address 46.209.209.74 to port 1433 |
2020-03-16 23:17:08 |
| 203.115.15.210 | attack | Mar 16 15:17:08 ns382633 sshd\[20818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.115.15.210 user=root Mar 16 15:17:10 ns382633 sshd\[20818\]: Failed password for root from 203.115.15.210 port 47932 ssh2 Mar 16 15:45:32 ns382633 sshd\[23783\]: Invalid user yangzishuang from 203.115.15.210 port 1959 Mar 16 15:45:32 ns382633 sshd\[23783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.115.15.210 Mar 16 15:45:34 ns382633 sshd\[23783\]: Failed password for invalid user yangzishuang from 203.115.15.210 port 1959 ssh2 |
2020-03-16 23:13:40 |
| 222.186.190.2 | attackspam | Mar 16 05:00:57 web9 sshd\[4364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Mar 16 05:00:59 web9 sshd\[4364\]: Failed password for root from 222.186.190.2 port 63240 ssh2 Mar 16 05:01:15 web9 sshd\[4413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Mar 16 05:01:17 web9 sshd\[4413\]: Failed password for root from 222.186.190.2 port 10208 ssh2 Mar 16 05:01:38 web9 sshd\[4449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root |
2020-03-16 23:07:16 |
| 222.186.3.249 | attackspambots | 2020-03-16T16:07:30.119313scmdmz1 sshd[29750]: Failed password for root from 222.186.3.249 port 61873 ssh2 2020-03-16T16:07:32.351826scmdmz1 sshd[29750]: Failed password for root from 222.186.3.249 port 61873 ssh2 2020-03-16T16:07:35.343483scmdmz1 sshd[29750]: Failed password for root from 222.186.3.249 port 61873 ssh2 ... |
2020-03-16 23:12:49 |
| 92.63.194.108 | attackspambots | 2020-03-16T14:47:35.993537homeassistant sshd[26690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.108 user=root 2020-03-16T14:47:37.759730homeassistant sshd[26690]: Failed password for root from 92.63.194.108 port 35103 ssh2 ... |
2020-03-16 23:04:02 |
| 124.205.67.186 | attack | Mar 16 12:54:55 lnxded63 sshd[7111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.67.186 Mar 16 12:54:55 lnxded63 sshd[7111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.67.186 Mar 16 12:54:56 lnxded63 sshd[7111]: Failed password for invalid user ftpuser from 124.205.67.186 port 43916 ssh2 |
2020-03-16 22:36:28 |
| 63.82.48.182 | attack | Mar 16 15:26:48 web01 postfix/smtpd[19527]: connect from face.vidyad.com[63.82.48.182] Mar 16 15:26:48 web01 policyd-spf[20897]: None; identhostnamey=helo; client-ip=63.82.48.182; helo=face.birpack.com; envelope-from=x@x Mar 16 15:26:48 web01 policyd-spf[20897]: Pass; identhostnamey=mailfrom; client-ip=63.82.48.182; helo=face.birpack.com; envelope-from=x@x Mar x@x Mar 16 15:26:48 web01 postfix/smtpd[19527]: disconnect from face.vidyad.com[63.82.48.182] Mar 16 15:27:09 web01 postfix/smtpd[21075]: connect from face.vidyad.com[63.82.48.182] Mar 16 15:27:10 web01 policyd-spf[21078]: None; identhostnamey=helo; client-ip=63.82.48.182; helo=face.birpack.com; envelope-from=x@x Mar 16 15:27:10 web01 policyd-spf[21078]: Pass; identhostnamey=mailfrom; client-ip=63.82.48.182; helo=face.birpack.com; envelope-from=x@x Mar x@x Mar 16 15:27:10 web01 postfix/smtpd[21075]: disconnect from face.vidyad.com[63.82.48.182] Mar 16 15:33:24 web01 postfix/smtpd[22025]: connect from face.vidyad.c........ ------------------------------- |
2020-03-16 23:36:26 |
| 159.89.207.86 | attackspambots | Mar 16 06:07:35 |
2020-03-16 22:47:24 |
| 218.253.69.134 | attack | Failed password for root from 218.253.69.134 port 34080 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.69.134 user=root Failed password for root from 218.253.69.134 port 43920 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.69.134 user=root Failed password for root from 218.253.69.134 port 53780 ssh2 |
2020-03-16 22:41:59 |
| 162.243.133.35 | attack | RPC Portmapper DUMP Request Detected |
2020-03-16 23:39:05 |
| 212.12.28.141 | attackspam | Unauthorized connection attempt from IP address 212.12.28.141 on Port 445(SMB) |
2020-03-16 23:00:14 |
| 46.118.86.156 | attackspam | 1584369950 - 03/16/2020 15:45:50 Host: 46.118.86.156/46.118.86.156 Port: 445 TCP Blocked |
2020-03-16 22:51:07 |
| 45.119.212.125 | attack | [MK-VM1] Blocked by UFW |
2020-03-16 23:36:59 |
| 193.8.0.121 | attack | "Type","method","No.","Time","Source","Destination","Protocol","Length","Info" "DDOS","CHARGEN","307","35.969693","193.8.0.121","VICTIM","NTP","490","NTP Version 2, IP, Response, MON_GETLIST_1" |
2020-03-16 23:22:52 |