城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.128.17.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.128.17.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:34:19 CST 2025
;; MSG SIZE rcvd: 105
Host 20.17.128.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 20.17.128.42.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.13.211.195 | attack | Nov 30 17:09:32 106.13.211.195 PROTO=TCP SPT=38270 DPT=6379 Nov 30 17:09:33 106.13.211.195 PROTO=TCP SPT=38270 DPT=6379 Nov 30 17:09:33 106.13.211.195 PROTO=TCP SPT=59084 DPT=8080 Nov 30 17:09:34 106.13.211.195 PROTO=TCP SPT=59084 DPT=8080 Nov 30 17:09:34 106.13.211.195 PROTO=TCP SPT=52970 DPT=9200 |
2019-12-02 06:38:02 |
| 188.131.223.181 | attackspam | 2019-12-01T20:31:24.703355abusebot-4.cloudsearch.cf sshd\[8134\]: Invalid user user from 188.131.223.181 port 55816 |
2019-12-02 06:26:51 |
| 141.193.116.42 | proxynormal | Great IP new one for KENNETH J BLACKMON JR. AND HIS BUSINESS KLB CONTENTS. HIS CELL NUMBER IS 334 324 6168. WHAT A GREAT PERSON. FREE MINDED PERSON AND GREAT BUSINESS GOAL MINDED PERSON. CHECK OUT HTTPS://KLB-CONTENTS1.BUSINESS.SITE |
2019-12-02 07:05:02 |
| 218.94.133.182 | attackspambots | Dec 1 09:33:02 host sshd\[18358\]: Invalid user postgres from 218.94.133.182Dec 1 09:33:07 host sshd\[18397\]: Invalid user postgres from 218.94.133.182Dec 1 09:33:07 host sshd\[18425\]: Invalid user postgres from 218.94.133.182 ... |
2019-12-02 06:41:57 |
| 106.52.50.225 | attackspam | [Aegis] @ 2019-12-01 22:51:28 0000 -> Multiple authentication failures. |
2019-12-02 07:02:38 |
| 200.86.33.140 | attackbots | Dec 2 05:50:57 webhost01 sshd[22464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.86.33.140 Dec 2 05:51:00 webhost01 sshd[22464]: Failed password for invalid user test from 200.86.33.140 port 5382 ssh2 ... |
2019-12-02 07:02:51 |
| 206.189.108.59 | attackbots | Dec 1 23:44:51 vps666546 sshd\[12651\]: Invalid user root5555 from 206.189.108.59 port 42808 Dec 1 23:44:51 vps666546 sshd\[12651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.108.59 Dec 1 23:44:53 vps666546 sshd\[12651\]: Failed password for invalid user root5555 from 206.189.108.59 port 42808 ssh2 Dec 1 23:50:43 vps666546 sshd\[12899\]: Invalid user 1 from 206.189.108.59 port 55762 Dec 1 23:50:43 vps666546 sshd\[12899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.108.59 ... |
2019-12-02 06:55:07 |
| 175.139.136.170 | attackbotsspam | RDP Bruteforce |
2019-12-02 06:41:32 |
| 94.191.108.176 | attackspambots | Dec 1 17:50:41 plusreed sshd[8056]: Invalid user merz from 94.191.108.176 ... |
2019-12-02 06:57:48 |
| 24.237.99.120 | attackbotsspam | Unauthorized SSH login attempts |
2019-12-02 06:46:59 |
| 184.173.53.98 | attack | Dec 2 00:01:48 vpn01 sshd[13104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.173.53.98 Dec 2 00:01:50 vpn01 sshd[13104]: Failed password for invalid user aistar123<>!N from 184.173.53.98 port 55358 ssh2 ... |
2019-12-02 07:04:38 |
| 117.35.118.42 | attackbots | Dec 1 23:44:45 [host] sshd[10531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.35.118.42 user=root Dec 1 23:44:47 [host] sshd[10531]: Failed password for root from 117.35.118.42 port 41380 ssh2 Dec 1 23:50:40 [host] sshd[10773]: Invalid user truhe from 117.35.118.42 |
2019-12-02 06:55:56 |
| 46.38.144.146 | attackbots | Dec 1 23:54:36 vmanager6029 postfix/smtpd\[1871\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 1 23:55:24 vmanager6029 postfix/smtpd\[1871\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-12-02 06:58:22 |
| 113.125.179.213 | attack | Dec 1 23:52:23 ns3042688 sshd\[28835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.179.213 user=root Dec 1 23:52:25 ns3042688 sshd\[28835\]: Failed password for root from 113.125.179.213 port 56458 ssh2 Dec 1 23:59:25 ns3042688 sshd\[31280\]: Invalid user anonymus from 113.125.179.213 Dec 1 23:59:25 ns3042688 sshd\[31280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.179.213 Dec 1 23:59:27 ns3042688 sshd\[31280\]: Failed password for invalid user anonymus from 113.125.179.213 port 36922 ssh2 ... |
2019-12-02 07:03:36 |
| 222.186.169.194 | attackspambots | Dec 2 00:04:12 MK-Soft-VM4 sshd[30165]: Failed password for root from 222.186.169.194 port 27638 ssh2 Dec 2 00:04:17 MK-Soft-VM4 sshd[30165]: Failed password for root from 222.186.169.194 port 27638 ssh2 ... |
2019-12-02 07:06:13 |