城市(city): unknown
省份(region): unknown
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.106.202.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.106.202.169. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:27:53 CST 2025
;; MSG SIZE rcvd: 107
Host 169.202.106.42.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 169.202.106.42.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 37.70.141.18 | attackspambots | Automatic report - Port Scan Attack |
2019-11-23 08:14:41 |
| 106.57.22.239 | attackbotsspam | badbot |
2019-11-23 08:27:37 |
| 186.48.110.222 | attackbots | Nov 23 00:54:57 server sshd\[22219\]: Invalid user pi from 186.48.110.222 port 48556 Nov 23 00:54:58 server sshd\[22219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.48.110.222 Nov 23 00:54:58 server sshd\[22221\]: Invalid user pi from 186.48.110.222 port 48560 Nov 23 00:54:58 server sshd\[22221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.48.110.222 Nov 23 00:55:00 server sshd\[22219\]: Failed password for invalid user pi from 186.48.110.222 port 48556 ssh2 |
2019-11-23 08:13:04 |
| 51.83.128.24 | attack | 2019-11-23T00:01:53.492706shield sshd\[29773\]: Invalid user kaessmayer from 51.83.128.24 port 43828 2019-11-23T00:01:53.496992shield sshd\[29773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.ip-51-83-128.eu 2019-11-23T00:01:54.933164shield sshd\[29773\]: Failed password for invalid user kaessmayer from 51.83.128.24 port 43828 ssh2 2019-11-23T00:05:26.029265shield sshd\[30924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.ip-51-83-128.eu user=root 2019-11-23T00:05:27.908472shield sshd\[30924\]: Failed password for root from 51.83.128.24 port 51952 ssh2 |
2019-11-23 08:19:02 |
| 45.125.65.63 | attackbotsspam | \[2019-11-22 19:09:29\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-22T19:09:29.570-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="900746462607502",SessionID="0x7f26c437dd88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.63/50502",ACLName="no_extension_match" \[2019-11-22 19:10:33\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-22T19:10:33.428-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="900846462607502",SessionID="0x7f26c437dd88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.63/58956",ACLName="no_extension_match" \[2019-11-22 19:11:42\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-22T19:11:42.152-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="900946462607502",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.63/60873",ACLName="no_extens |
2019-11-23 08:24:56 |
| 221.225.83.148 | attackbots | Nov 23 02:26:23 sauna sshd[177445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.225.83.148 Nov 23 02:26:25 sauna sshd[177445]: Failed password for invalid user nt from 221.225.83.148 port 60200 ssh2 ... |
2019-11-23 08:28:16 |
| 123.207.145.66 | attackspambots | Nov 22 14:03:30 auw2 sshd\[8323\]: Invalid user pi from 123.207.145.66 Nov 22 14:03:31 auw2 sshd\[8323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.145.66 Nov 22 14:03:33 auw2 sshd\[8323\]: Failed password for invalid user pi from 123.207.145.66 port 45960 ssh2 Nov 22 14:08:17 auw2 sshd\[8738\]: Invalid user alaska from 123.207.145.66 Nov 22 14:08:17 auw2 sshd\[8738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.145.66 |
2019-11-23 08:11:44 |
| 71.6.199.23 | attackspam | 11/22/2019-18:26:49.492979 71.6.199.23 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71 |
2019-11-23 07:59:38 |
| 218.92.0.173 | attack | Nov 22 19:54:50 firewall sshd[23631]: Failed password for root from 218.92.0.173 port 45048 ssh2 Nov 22 19:55:06 firewall sshd[23631]: error: maximum authentication attempts exceeded for root from 218.92.0.173 port 45048 ssh2 [preauth] Nov 22 19:55:06 firewall sshd[23631]: Disconnecting: Too many authentication failures [preauth] ... |
2019-11-23 08:03:50 |
| 117.64.232.72 | attackbots | badbot |
2019-11-23 07:50:31 |
| 139.59.226.82 | attackspambots | 2019-11-22T17:44:09.1244281495-001 sshd\[35449\]: Failed password for invalid user buggs from 139.59.226.82 port 35826 ssh2 2019-11-22T18:47:49.8065171495-001 sshd\[37671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.226.82 user=root 2019-11-22T18:47:52.0373511495-001 sshd\[37671\]: Failed password for root from 139.59.226.82 port 58922 ssh2 2019-11-22T18:54:11.1693201495-001 sshd\[37855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.226.82 user=root 2019-11-22T18:54:13.1745551495-001 sshd\[37855\]: Failed password for root from 139.59.226.82 port 37882 ssh2 2019-11-22T19:00:43.0690221495-001 sshd\[38114\]: Invalid user wittasinghe from 139.59.226.82 port 45068 2019-11-22T19:00:43.0722871495-001 sshd\[38114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.226.82 ... |
2019-11-23 08:26:15 |
| 183.214.161.24 | attack | 11/22/2019-18:52:51.104636 183.214.161.24 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-23 08:16:48 |
| 106.248.49.62 | attackbotsspam | Nov 22 13:49:43 web1 sshd\[2629\]: Invalid user milton from 106.248.49.62 Nov 22 13:49:43 web1 sshd\[2629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.49.62 Nov 22 13:49:45 web1 sshd\[2629\]: Failed password for invalid user milton from 106.248.49.62 port 56103 ssh2 Nov 22 13:55:55 web1 sshd\[3187\]: Invalid user khaldi from 106.248.49.62 Nov 22 13:55:55 web1 sshd\[3187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.49.62 |
2019-11-23 08:09:21 |
| 92.118.37.83 | attackbotsspam | 11/22/2019-17:54:58.976549 92.118.37.83 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-23 08:14:56 |
| 106.12.114.26 | attackbotsspam | 2019-11-23T00:41:21.385887scmdmz1 sshd\[1093\]: Invalid user Havelo from 106.12.114.26 port 53200 2019-11-23T00:41:21.388514scmdmz1 sshd\[1093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.114.26 2019-11-23T00:41:23.684626scmdmz1 sshd\[1093\]: Failed password for invalid user Havelo from 106.12.114.26 port 53200 ssh2 ... |
2019-11-23 07:50:58 |