城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.134.131.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;30.134.131.16. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:17:33 CST 2025
;; MSG SIZE rcvd: 106
Host 16.131.134.30.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 16.131.134.30.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.38.255.116 | attackbotsspam | Bad bot/spoofed identity |
2019-09-20 11:23:02 |
| 167.99.251.192 | attackspam | xmlrpc attack |
2019-09-20 11:32:51 |
| 183.63.190.186 | attackspam | Sep 19 17:24:12 friendsofhawaii sshd\[31878\]: Invalid user postgres from 183.63.190.186 Sep 19 17:24:12 friendsofhawaii sshd\[31878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.63.190.186 Sep 19 17:24:14 friendsofhawaii sshd\[31878\]: Failed password for invalid user postgres from 183.63.190.186 port 32193 ssh2 Sep 19 17:29:14 friendsofhawaii sshd\[32299\]: Invalid user ts3server from 183.63.190.186 Sep 19 17:29:14 friendsofhawaii sshd\[32299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.63.190.186 |
2019-09-20 11:39:22 |
| 58.144.151.45 | attack | Sep 20 06:30:17 www sshd\[5954\]: Invalid user linktechs from 58.144.151.45 Sep 20 06:30:17 www sshd\[5954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.144.151.45 Sep 20 06:30:19 www sshd\[5954\]: Failed password for invalid user linktechs from 58.144.151.45 port 54756 ssh2 ... |
2019-09-20 11:42:08 |
| 162.144.60.165 | attackspam | 162.144.60.165 - - \[20/Sep/2019:03:05:08 +0200\] "POST /wp-login.php HTTP/1.1" 200 2111 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 162.144.60.165 - - \[20/Sep/2019:03:05:11 +0200\] "POST /wp-login.php HTTP/1.1" 200 2092 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2019-09-20 11:34:19 |
| 61.147.80.222 | attackbots | Sep 19 23:33:14 ny01 sshd[17724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.147.80.222 Sep 19 23:33:16 ny01 sshd[17724]: Failed password for invalid user wt from 61.147.80.222 port 48635 ssh2 Sep 19 23:39:23 ny01 sshd[18831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.147.80.222 |
2019-09-20 11:40:41 |
| 85.21.63.173 | attack | Sep 19 17:10:17 eddieflores sshd\[12904\]: Invalid user ren from 85.21.63.173 Sep 19 17:10:17 eddieflores sshd\[12904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.21.63.173 Sep 19 17:10:19 eddieflores sshd\[12904\]: Failed password for invalid user ren from 85.21.63.173 port 50076 ssh2 Sep 19 17:15:02 eddieflores sshd\[13244\]: Invalid user vinay from 85.21.63.173 Sep 19 17:15:02 eddieflores sshd\[13244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.21.63.173 |
2019-09-20 11:17:44 |
| 77.247.110.137 | attackbots | \[2019-09-19 23:19:22\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-19T23:19:22.002-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="972101148422069014",SessionID="0x7fcd8c8702f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.137/53526",ACLName="no_extension_match" \[2019-09-19 23:19:50\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-19T23:19:50.515-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1798801148862118004",SessionID="0x7fcd8c99eb48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.137/63510",ACLName="no_extension_match" \[2019-09-19 23:20:31\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-19T23:20:31.531-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="153401148653073005",SessionID="0x7fcd8cce9508",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.137/59211",AC |
2019-09-20 11:30:38 |
| 51.15.87.199 | attack | Sep 20 04:29:10 lnxded64 sshd[1098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.87.199 |
2019-09-20 11:29:28 |
| 37.59.6.106 | attackspambots | Sep 20 09:06:30 itv-usvr-01 sshd[12422]: Invalid user kb from 37.59.6.106 Sep 20 09:06:30 itv-usvr-01 sshd[12422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.6.106 Sep 20 09:06:30 itv-usvr-01 sshd[12422]: Invalid user kb from 37.59.6.106 Sep 20 09:06:33 itv-usvr-01 sshd[12422]: Failed password for invalid user kb from 37.59.6.106 port 33326 ssh2 Sep 20 09:10:06 itv-usvr-01 sshd[12702]: Invalid user finn from 37.59.6.106 |
2019-09-20 11:49:54 |
| 147.135.255.107 | attackbotsspam | Sep 20 05:08:34 SilenceServices sshd[8453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.255.107 Sep 20 05:08:36 SilenceServices sshd[8453]: Failed password for invalid user m from 147.135.255.107 port 52022 ssh2 Sep 20 05:17:06 SilenceServices sshd[11701]: Failed password for root from 147.135.255.107 port 36670 ssh2 |
2019-09-20 11:20:07 |
| 93.103.6.14 | attackspambots | Autoban 93.103.6.14 AUTH/CONNECT |
2019-09-20 11:17:01 |
| 142.93.218.11 | attack | Sep 20 05:36:54 markkoudstaal sshd[22826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.218.11 Sep 20 05:36:56 markkoudstaal sshd[22826]: Failed password for invalid user 123456 from 142.93.218.11 port 59966 ssh2 Sep 20 05:41:48 markkoudstaal sshd[23405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.218.11 |
2019-09-20 11:44:40 |
| 42.233.94.42 | attackbots | Configuration snooping (/cgi-bin/ViewLog.asp): "POST 127.0.0.1:80/cgi-bin/ViewLog.asp" |
2019-09-20 11:41:03 |
| 58.254.132.156 | attackspambots | Sep 19 16:58:09 friendsofhawaii sshd\[28959\]: Invalid user sruser from 58.254.132.156 Sep 19 16:58:09 friendsofhawaii sshd\[28959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156 Sep 19 16:58:12 friendsofhawaii sshd\[28959\]: Failed password for invalid user sruser from 58.254.132.156 port 26345 ssh2 Sep 19 17:01:29 friendsofhawaii sshd\[29243\]: Invalid user legal3 from 58.254.132.156 Sep 19 17:01:29 friendsofhawaii sshd\[29243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156 |
2019-09-20 11:22:51 |