城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.16.145.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;30.16.145.161. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:43:25 CST 2025
;; MSG SIZE rcvd: 106
Host 161.145.16.30.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 161.145.16.30.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.4.76.180 | attackspambots | Unauthorised access (Oct 21) SRC=122.4.76.180 LEN=40 TOS=0x10 PREC=0x40 TTL=234 ID=45560 TCP DPT=1433 WINDOW=1024 SYN |
2019-10-21 18:46:37 |
| 218.92.0.147 | attackbotsspam | 2019-10-21T04:54:10.279975abusebot-4.cloudsearch.cf sshd\[20539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.147 user=root |
2019-10-21 18:34:39 |
| 139.199.100.51 | attack | Oct 21 12:21:35 dev0-dcde-rnet sshd[18430]: Failed password for root from 139.199.100.51 port 25386 ssh2 Oct 21 12:26:08 dev0-dcde-rnet sshd[18448]: Failed password for root from 139.199.100.51 port 64086 ssh2 |
2019-10-21 18:43:15 |
| 222.82.237.238 | attackspam | Oct 21 00:59:35 nxxxxxxx sshd[2439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.237.238 user=backup Oct 21 00:59:37 nxxxxxxx sshd[2439]: Failed password for backup from 222.82.237.238 port 54451 ssh2 Oct 21 00:59:37 nxxxxxxx sshd[2439]: Received disconnect from 222.82.237.238: 11: Bye Bye [preauth] Oct 21 01:11:43 nxxxxxxx sshd[3479]: Invalid user windywinter from 222.82.237.238 Oct 21 01:11:43 nxxxxxxx sshd[3479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.237.238 Oct 21 01:11:44 nxxxxxxx sshd[3479]: Failed password for invalid user windywinter from 222.82.237.238 port 42943 ssh2 Oct 21 01:11:44 nxxxxxxx sshd[3479]: Received disconnect from 222.82.237.238: 11: Bye Bye [preauth] Oct 21 01:15:49 nxxxxxxx sshd[3829]: Invalid user juli from 222.82.237.238 Oct 21 01:15:49 nxxxxxxx sshd[3829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus........ ------------------------------- |
2019-10-21 18:22:47 |
| 206.81.24.126 | attack | Lines containing failures of 206.81.24.126 Oct 21 05:17:30 shared02 sshd[18952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.126 user=r.r Oct 21 05:17:32 shared02 sshd[18952]: Failed password for r.r from 206.81.24.126 port 46944 ssh2 Oct 21 05:17:32 shared02 sshd[18952]: Received disconnect from 206.81.24.126 port 46944:11: Bye Bye [preauth] Oct 21 05:17:32 shared02 sshd[18952]: Disconnected from authenticating user r.r 206.81.24.126 port 46944 [preauth] Oct 21 05:29:18 shared02 sshd[21049]: Invalid user lukas from 206.81.24.126 port 45400 Oct 21 05:29:19 shared02 sshd[21049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.24.126 Oct 21 05:29:21 shared02 sshd[21049]: Failed password for invalid user lukas from 206.81.24.126 port 45400 ssh2 Oct 21 05:29:21 shared02 sshd[21049]: Received disconnect from 206.81.24.126 port 45400:11: Bye Bye [preauth] Oct 21 05:29:21 share........ ------------------------------ |
2019-10-21 18:15:16 |
| 213.182.101.187 | attack | Oct 21 04:55:15 Tower sshd[24096]: Connection from 213.182.101.187 port 43598 on 192.168.10.220 port 22 Oct 21 04:55:20 Tower sshd[24096]: Failed password for root from 213.182.101.187 port 43598 ssh2 Oct 21 04:55:20 Tower sshd[24096]: Received disconnect from 213.182.101.187 port 43598:11: Bye Bye [preauth] Oct 21 04:55:20 Tower sshd[24096]: Disconnected from authenticating user root 213.182.101.187 port 43598 [preauth] |
2019-10-21 18:37:13 |
| 182.72.178.114 | attackbots | Oct 20 23:43:08 Tower sshd[7799]: Connection from 182.72.178.114 port 20226 on 192.168.10.220 port 22 Oct 20 23:43:10 Tower sshd[7799]: Invalid user webpop from 182.72.178.114 port 20226 Oct 20 23:43:10 Tower sshd[7799]: error: Could not get shadow information for NOUSER Oct 20 23:43:10 Tower sshd[7799]: Failed password for invalid user webpop from 182.72.178.114 port 20226 ssh2 Oct 20 23:43:10 Tower sshd[7799]: Received disconnect from 182.72.178.114 port 20226:11: Bye Bye [preauth] Oct 20 23:43:10 Tower sshd[7799]: Disconnected from invalid user webpop 182.72.178.114 port 20226 [preauth] |
2019-10-21 18:47:06 |
| 60.50.146.131 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2019-10-21 18:17:03 |
| 192.42.116.19 | attackbots | Oct 21 11:07:17 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:20 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:22 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:25 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:28 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2Oct 21 11:07:31 rotator sshd\[31927\]: Failed password for root from 192.42.116.19 port 45250 ssh2 ... |
2019-10-21 18:24:52 |
| 124.74.248.218 | attackspambots | Oct 21 11:29:10 h2177944 sshd\[20762\]: Invalid user lea from 124.74.248.218 port 46968 Oct 21 11:29:10 h2177944 sshd\[20762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218 Oct 21 11:29:12 h2177944 sshd\[20762\]: Failed password for invalid user lea from 124.74.248.218 port 46968 ssh2 Oct 21 11:33:07 h2177944 sshd\[20958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.248.218 user=root ... |
2019-10-21 18:49:47 |
| 58.213.128.106 | attack | 2019-10-21T10:04:00.430555abusebot-5.cloudsearch.cf sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.128.106 user=root |
2019-10-21 18:16:06 |
| 106.13.32.106 | attackspambots | Oct 21 07:03:52 www sshd\[72916\]: Invalid user myrhodesiaiscom from 106.13.32.106 Oct 21 07:03:52 www sshd\[72916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.32.106 Oct 21 07:03:53 www sshd\[72916\]: Failed password for invalid user myrhodesiaiscom from 106.13.32.106 port 47468 ssh2 ... |
2019-10-21 18:14:06 |
| 45.95.33.108 | attackbotsspam | Lines containing failures of 45.95.33.108 Oct 21 04:15:13 shared07 postfix/smtpd[31884]: connect from rectify.honeytreenovi.com[45.95.33.108] Oct 21 04:15:13 shared07 policyd-spf[521]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.95.33.108; helo=rectify.nexustechne.com; envelope-from=x@x Oct x@x Oct 21 04:15:14 shared07 postfix/smtpd[31884]: disconnect from rectify.honeytreenovi.com[45.95.33.108] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 Oct 21 04:16:13 shared07 postfix/smtpd[31884]: connect from rectify.honeytreenovi.com[45.95.33.108] Oct 21 04:16:13 shared07 policyd-spf[521]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=45.95.33.108; helo=rectify.nexustechne.com; envelope-from=x@x Oct x@x Oct 21 04:16:13 shared07 postfix/smtpd[31884]: disconnect from rectify.honeytreenovi.com[45.95.33.108] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 Oct 21 04:17:58 shared07 postfix/smtpd[31884]: co........ ------------------------------ |
2019-10-21 18:36:44 |
| 118.24.30.97 | attackbots | Oct 21 08:58:30 MK-Soft-VM5 sshd[22960]: Failed password for root from 118.24.30.97 port 33212 ssh2 ... |
2019-10-21 18:21:45 |
| 119.29.243.100 | attack | Oct 21 08:55:12 meumeu sshd[768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.243.100 Oct 21 08:55:15 meumeu sshd[768]: Failed password for invalid user gamefiles from 119.29.243.100 port 59208 ssh2 Oct 21 09:00:02 meumeu sshd[1573]: Failed password for root from 119.29.243.100 port 38840 ssh2 ... |
2019-10-21 18:35:31 |