城市(city): Shanghai
省份(region): Shanghai
国家(country): China
运营商(isp): China Mobile
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.144.107.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13773
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;39.144.107.94. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025041902 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 20 10:56:04 CST 2025
;; MSG SIZE rcvd: 106
Host 94.107.144.39.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 94.107.144.39.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 79.108.188.248 | attack | firewall-block, port(s): 23/tcp |
2019-09-08 16:05:14 |
| 201.22.169.45 | attack | Sep 7 16:54:22 finn sshd[21930]: Invalid user *** from 201.22.169.45 port 46496 Sep 7 16:54:22 finn sshd[21930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.169.45 Sep 7 16:54:24 finn sshd[21930]: Failed password for invalid user *** from 201.22.169.45 port 46496 ssh2 Sep 7 16:54:24 finn sshd[21930]: Received disconnect from 201.22.169.45 port 46496:11: Bye Bye [preauth] Sep 7 16:54:24 finn sshd[21930]: Disconnected from 201.22.169.45 port 46496 [preauth] Sep 7 17:10:55 finn sshd[25681]: Invalid user minecraft from 201.22.169.45 port 58110 Sep 7 17:10:55 finn sshd[25681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.169.45 Sep 7 17:10:57 finn sshd[25681]: Failed password for invalid user minecraft from 201.22.169.45 port 58110 ssh2 Sep 7 17:10:57 finn sshd[25681]: Received disconnect from 201.22.169.45 port 58110:11: Bye Bye [preauth] Sep 7 17:10:57 finn sshd[2........ ------------------------------- |
2019-09-08 15:41:18 |
| 104.254.244.205 | attackspambots | Sep 8 10:42:17 pkdns2 sshd\[26578\]: Invalid user minecraft from 104.254.244.205Sep 8 10:42:19 pkdns2 sshd\[26578\]: Failed password for invalid user minecraft from 104.254.244.205 port 38576 ssh2Sep 8 10:46:15 pkdns2 sshd\[26779\]: Invalid user admin from 104.254.244.205Sep 8 10:46:17 pkdns2 sshd\[26779\]: Failed password for invalid user admin from 104.254.244.205 port 54104 ssh2Sep 8 10:50:13 pkdns2 sshd\[26979\]: Invalid user webs from 104.254.244.205Sep 8 10:50:15 pkdns2 sshd\[26979\]: Failed password for invalid user webs from 104.254.244.205 port 41394 ssh2 ... |
2019-09-08 16:08:55 |
| 104.248.174.126 | attack | Sep 8 02:00:48 localhost sshd\[16521\]: Invalid user gmodserver from 104.248.174.126 port 48893 Sep 8 02:00:48 localhost sshd\[16521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.174.126 Sep 8 02:00:51 localhost sshd\[16521\]: Failed password for invalid user gmodserver from 104.248.174.126 port 48893 ssh2 |
2019-09-08 16:01:18 |
| 88.147.204.1 | attackspam | Lines containing failures of 88.147.204.1 Sep 7 22:28:59 shared12 sshd[29136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.147.204.1 user=r.r Sep 7 22:29:01 shared12 sshd[29136]: Failed password for r.r from 88.147.204.1 port 47170 ssh2 Sep 7 22:29:03 shared12 sshd[29136]: Failed password for r.r from 88.147.204.1 port 47170 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=88.147.204.1 |
2019-09-08 15:57:31 |
| 153.35.123.27 | attack | Sep 8 09:10:46 mail sshd\[4784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.35.123.27 Sep 8 09:10:48 mail sshd\[4784\]: Failed password for invalid user 1 from 153.35.123.27 port 50542 ssh2 Sep 8 09:14:45 mail sshd\[5220\]: Invalid user terrariaserver from 153.35.123.27 port 51552 Sep 8 09:14:45 mail sshd\[5220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.35.123.27 Sep 8 09:14:47 mail sshd\[5220\]: Failed password for invalid user terrariaserver from 153.35.123.27 port 51552 ssh2 |
2019-09-08 16:10:31 |
| 192.166.219.125 | attackspambots | Sep 8 00:59:40 mail sshd\[8135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.166.219.125 Sep 8 00:59:43 mail sshd\[8135\]: Failed password for invalid user fln75g from 192.166.219.125 port 33066 ssh2 Sep 8 01:04:05 mail sshd\[9050\]: Invalid user cloudcloud from 192.166.219.125 port 39808 Sep 8 01:04:05 mail sshd\[9050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.166.219.125 Sep 8 01:04:06 mail sshd\[9050\]: Failed password for invalid user cloudcloud from 192.166.219.125 port 39808 ssh2 |
2019-09-08 16:12:17 |
| 159.203.198.34 | attack | Sep 8 08:18:35 areeb-Workstation sshd[24113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.198.34 Sep 8 08:18:38 areeb-Workstation sshd[24113]: Failed password for invalid user deployer from 159.203.198.34 port 57551 ssh2 ... |
2019-09-08 15:18:27 |
| 5.23.54.120 | attack | Malicious phishing, ISP Timeweb Ltd; repetitive redirects; blacklists; aggregate spam volume up to 5/day Unsolicited bulk spam - dominol.club, Timeweb Ltd - 92.53.119.43 Spam link batel-dollar.ddnsking.com = 5.23.54.120 (previously 176.57.208.216) Timeweb Ltd - blacklisted – REPETITIVE BLACKLISTED IP - URLSCAN.IO REDIRECT LIST: - Effective URL: https://todayinsidernews.net = 192.241.177.202 DigitalOcean - www.circlestraight.com = 185.117.118.51, Creanova - mgsse.swiftlink.company = 107.174.17.90, 118.184.32.7 Shanghai Anchnet Network - ddnsking.com = 8.23.224.108, Vitalwerks Internet Solutions - code.jquery.com = 205.185.208.52 Highwinds Network Group, Inc. Sender domain domino.club = Timeweb Ltd 46.229.213.52, 46.229.212.250, 5.23.55.227, 162.255.119.8, 46.229.213.106, 46.229.213.65, 46.229.212.240, 46.229.213.130, 46.229.213.5, 46.229.212.228, 46.229.213.69, 46.229.213.118 |
2019-09-08 15:19:48 |
| 182.138.151.15 | attackbotsspam | Sep 7 20:25:51 wbs sshd\[25040\]: Invalid user git from 182.138.151.15 Sep 7 20:25:51 wbs sshd\[25040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.138.151.15 Sep 7 20:25:53 wbs sshd\[25040\]: Failed password for invalid user git from 182.138.151.15 port 50490 ssh2 Sep 7 20:29:32 wbs sshd\[25323\]: Invalid user administrator from 182.138.151.15 Sep 7 20:29:32 wbs sshd\[25323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.138.151.15 |
2019-09-08 15:43:48 |
| 193.112.65.233 | attackbotsspam | fail2ban |
2019-09-08 16:00:51 |
| 66.240.219.146 | attackbots | [portscan] tcp/106 [pop3pw] *(RWIN=41595)(09081006) |
2019-09-08 15:52:31 |
| 148.247.102.100 | attackspam | Sep 8 06:40:02 markkoudstaal sshd[16188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.247.102.100 Sep 8 06:40:04 markkoudstaal sshd[16188]: Failed password for invalid user support from 148.247.102.100 port 50544 ssh2 Sep 8 06:44:50 markkoudstaal sshd[16653]: Failed password for root from 148.247.102.100 port 37632 ssh2 |
2019-09-08 16:13:56 |
| 186.248.175.3 | attackbots | Sep 7 23:41:13 smtp postfix/smtpd[53807]: NOQUEUE: reject: RCPT from unknown[186.248.175.3]: 554 5.7.1 Service unavailable; Client host [186.248.175.3] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?186.248.175.3; from= |
2019-09-08 15:16:13 |
| 49.88.112.114 | attack | Sep 8 07:20:06 vmd17057 sshd\[7868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root Sep 8 07:20:08 vmd17057 sshd\[7868\]: Failed password for root from 49.88.112.114 port 32912 ssh2 Sep 8 07:20:11 vmd17057 sshd\[7868\]: Failed password for root from 49.88.112.114 port 32912 ssh2 ... |
2019-09-08 15:38:08 |