城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.142.80.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33556
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;4.142.80.206. IN A
;; AUTHORITY SECTION:
. 512 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010800 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 02:07:55 CST 2022
;; MSG SIZE rcvd: 105
Host 206.80.142.4.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 206.80.142.4.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 94.191.31.53 | attack | Oct 29 15:12:38 *** sshd[2992]: Failed password for invalid user factorio from 94.191.31.53 port 45162 ssh2 Oct 29 15:21:18 *** sshd[3155]: Failed password for invalid user eo from 94.191.31.53 port 59874 ssh2 Oct 29 15:25:35 *** sshd[3270]: Failed password for invalid user jc from 94.191.31.53 port 38992 ssh2 Oct 29 16:10:18 *** sshd[4253]: Failed password for invalid user P@ssw0rt!23 from 94.191.31.53 port 55998 ssh2 Oct 29 16:15:04 *** sshd[4317]: Failed password for invalid user trading from 94.191.31.53 port 35152 ssh2 Oct 29 16:19:47 *** sshd[4397]: Failed password for invalid user vail123 from 94.191.31.53 port 42520 ssh2 Oct 29 16:24:30 *** sshd[4535]: Failed password for invalid user wlt325 from 94.191.31.53 port 49892 ssh2 Oct 29 16:29:25 *** sshd[4624]: Failed password for invalid user choco from 94.191.31.53 port 57272 ssh2 Oct 29 16:34:07 *** sshd[4686]: Failed password for invalid user 123zxc123Asd from 94.191.31.53 port 36410 ssh2 Oct 29 16:38:49 *** sshd[4752]: Failed password for invalid user |
2019-10-30 04:26:05 |
| 47.74.56.139 | attackbots | 10/29/2019-16:39:29.823232 47.74.56.139 Protocol: 6 ET SCAN Potential SSH Scan |
2019-10-30 04:40:39 |
| 124.31.204.60 | attackbots | SMB Server BruteForce Attack |
2019-10-30 04:30:57 |
| 85.185.235.98 | attack | Oct 29 17:45:34 *** sshd[6139]: Failed password for invalid user ubnt from 85.185.235.98 port 36844 ssh2 Oct 29 18:10:08 *** sshd[6594]: Failed password for invalid user wialon from 85.185.235.98 port 48072 ssh2 Oct 29 18:18:07 *** sshd[6691]: Failed password for invalid user user2 from 85.185.235.98 port 58040 ssh2 Oct 29 18:22:07 *** sshd[6768]: Failed password for invalid user athos from 85.185.235.98 port 34800 ssh2 Oct 29 18:30:19 *** sshd[6926]: Failed password for invalid user dominick from 85.185.235.98 port 44772 ssh2 Oct 29 18:51:05 *** sshd[7272]: Failed password for invalid user yyy from 85.185.235.98 port 41476 ssh2 Oct 29 18:59:21 *** sshd[7375]: Failed password for invalid user blake from 85.185.235.98 port 51442 ssh2 Oct 29 19:07:48 *** sshd[7572]: Failed password for invalid user cn from 85.185.235.98 port 33172 ssh2 Oct 29 19:11:52 *** sshd[7711]: Failed password for invalid user tangoro from 85.185.235.98 port 38160 ssh2 Oct 29 19:16:00 *** sshd[7785]: Failed password for invalid user jbk f |
2019-10-30 04:29:21 |
| 222.186.175.216 | attackspambots | 2019-10-29T20:14:26.129009abusebot-7.cloudsearch.cf sshd\[11126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216 user=root |
2019-10-30 04:17:08 |
| 62.234.66.50 | attack | Oct 29 21:15:38 markkoudstaal sshd[14519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.66.50 Oct 29 21:15:40 markkoudstaal sshd[14519]: Failed password for invalid user password321 from 62.234.66.50 port 36713 ssh2 Oct 29 21:19:40 markkoudstaal sshd[14877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.66.50 |
2019-10-30 04:23:52 |
| 103.211.218.202 | attack | Only those who intend to destroy a site make attempts like this below, so if this ip appears on your site, block it immediately 103.211.218.0/24 is high risk: 103.211.218.202 - - [28/Oct/2019:22:48:51 -0300] "POST /xmlrpc.php HTTP/1.1" 406 249 103.211.218.202 - - [28/Oct/2019:22:48:52 -0300] "POST /xmlrpc.php HTTP/1.1" 406 249 |
2019-10-30 04:39:08 |
| 212.32.233.177 | attack | 10/29/2019-16:40:31.000559 212.32.233.177 Protocol: 6 ET SCAN Potential SSH Scan |
2019-10-30 04:41:54 |
| 222.186.190.92 | attackbots | Oct 29 21:08:11 SilenceServices sshd[18589]: Failed password for root from 222.186.190.92 port 40028 ssh2 Oct 29 21:08:28 SilenceServices sshd[18589]: error: maximum authentication attempts exceeded for root from 222.186.190.92 port 40028 ssh2 [preauth] Oct 29 21:08:39 SilenceServices sshd[18893]: Failed password for root from 222.186.190.92 port 47220 ssh2 |
2019-10-30 04:22:36 |
| 139.99.67.111 | attackbots | Oct 29 21:31:35 vps647732 sshd[27393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111 Oct 29 21:31:36 vps647732 sshd[27393]: Failed password for invalid user alana from 139.99.67.111 port 53922 ssh2 ... |
2019-10-30 04:42:22 |
| 148.66.142.161 | attack | /wp-login.php |
2019-10-30 04:53:57 |
| 49.234.120.114 | attack | Oct 29 21:15:34 legacy sshd[3921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.120.114 Oct 29 21:15:35 legacy sshd[3921]: Failed password for invalid user renato123 from 49.234.120.114 port 51858 ssh2 Oct 29 21:19:35 legacy sshd[4038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.120.114 ... |
2019-10-30 04:28:20 |
| 51.254.132.62 | attack | Oct 29 18:58:32 *** sshd[7358]: Failed password for invalid user bobo from 51.254.132.62 port 53036 ssh2 Oct 29 19:02:15 *** sshd[7428]: Failed password for invalid user ts3 from 51.254.132.62 port 44554 ssh2 Oct 29 19:05:58 *** sshd[7528]: Failed password for invalid user jdk1.8.0_45 from 51.254.132.62 port 36072 ssh2 Oct 29 19:09:43 *** sshd[7669]: Failed password for invalid user 8 from 51.254.132.62 port 55849 ssh2 Oct 29 19:17:40 *** sshd[7817]: Failed password for invalid user zhen from 51.254.132.62 port 38892 ssh2 Oct 29 19:21:38 *** sshd[7905]: Failed password for invalid user yui from 51.254.132.62 port 58655 ssh2 Oct 29 19:25:32 *** sshd[8013]: Failed password for invalid user login from 51.254.132.62 port 50177 ssh2 Oct 29 19:29:44 *** sshd[8084]: Failed password for invalid user remote from 51.254.132.62 port 41715 ssh2 Oct 29 19:37:44 *** sshd[8216]: Failed password for invalid user jt from 51.254.132.62 port 52996 ssh2 Oct 29 19:41:44 *** sshd[8350]: Failed password for invalid user oracle from |
2019-10-30 04:53:11 |
| 106.13.140.252 | attackspambots | Oct 29 21:34:51 legacy sshd[4575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.252 Oct 29 21:34:54 legacy sshd[4575]: Failed password for invalid user Irmeli from 106.13.140.252 port 41510 ssh2 Oct 29 21:38:52 legacy sshd[4744]: Failed password for root from 106.13.140.252 port 50690 ssh2 ... |
2019-10-30 04:49:46 |
| 218.92.0.202 | attack | 2019-10-29T20:33:19.857995abusebot-8.cloudsearch.cf sshd\[20546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202 user=root |
2019-10-30 04:43:15 |