城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.130.199.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.130.199.53. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 14:36:55 CST 2025
;; MSG SIZE rcvd: 106
Host 53.199.130.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 53.199.130.42.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
193.112.54.36 | attack | Dec 12 07:33:16 h2177944 sshd\[27696\]: Invalid user zhouh from 193.112.54.36 port 33370 Dec 12 07:33:16 h2177944 sshd\[27696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.54.36 Dec 12 07:33:19 h2177944 sshd\[27696\]: Failed password for invalid user zhouh from 193.112.54.36 port 33370 ssh2 Dec 12 07:42:32 h2177944 sshd\[28126\]: Invalid user fleurs from 193.112.54.36 port 57946 ... |
2019-12-12 15:23:52 |
220.135.184.83 | attackbotsspam | Unauthorized connection attempt from IP address 220.135.184.83 on Port 445(SMB) |
2019-12-12 15:53:23 |
217.182.77.186 | attackbots | 2019-12-12T08:35:17.059251scmdmz1 sshd\[310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.ip-217-182-77.eu user=admin 2019-12-12T08:35:19.580287scmdmz1 sshd\[310\]: Failed password for admin from 217.182.77.186 port 50528 ssh2 2019-12-12T08:40:51.266307scmdmz1 sshd\[911\]: Invalid user lorentzen from 217.182.77.186 port 59240 ... |
2019-12-12 15:41:10 |
103.7.8.203 | attackspambots | xmlrpc attack |
2019-12-12 15:51:12 |
129.204.90.220 | attackspam | Sep 4 03:30:11 vtv3 sshd[28541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.90.220 Sep 4 03:45:26 vtv3 sshd[4183]: Invalid user pumch from 129.204.90.220 port 45198 Sep 4 03:45:26 vtv3 sshd[4183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.90.220 Sep 4 03:45:28 vtv3 sshd[4183]: Failed password for invalid user pumch from 129.204.90.220 port 45198 ssh2 Sep 4 03:50:33 vtv3 sshd[6806]: Invalid user caitlin from 129.204.90.220 port 33384 Sep 4 03:50:33 vtv3 sshd[6806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.90.220 Sep 4 04:00:46 vtv3 sshd[12015]: Invalid user jack from 129.204.90.220 port 37990 Sep 4 04:00:46 vtv3 sshd[12015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.90.220 Sep 4 04:00:48 vtv3 sshd[12015]: Failed password for invalid user jack from 129.204.90.220 port 37990 ssh2 Sep 4 04:0 |
2019-12-12 15:44:30 |
140.143.90.154 | attackspambots | Dec 12 08:29:53 MK-Soft-VM4 sshd[3855]: Failed password for sync from 140.143.90.154 port 32830 ssh2 ... |
2019-12-12 15:59:01 |
83.17.109.6 | attackbots | Dec 12 01:57:28 mail sshd\[6005\]: Invalid user qhsupport from 83.17.109.6 Dec 12 01:57:28 mail sshd\[6005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.17.109.6 ... |
2019-12-12 15:36:33 |
175.150.20.30 | attack | Automatic report - Port Scan Attack |
2019-12-12 15:31:18 |
45.93.20.189 | attack | firewall-block, port(s): 14848/tcp |
2019-12-12 15:59:44 |
124.43.16.244 | attackspam | Dec 12 08:31:37 ns381471 sshd[20933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.43.16.244 Dec 12 08:31:39 ns381471 sshd[20933]: Failed password for invalid user jhon from 124.43.16.244 port 39906 ssh2 |
2019-12-12 15:46:41 |
60.216.75.24 | attackspambots | Unauthorised access (Dec 12) SRC=60.216.75.24 LEN=40 TTL=241 ID=59489 TCP DPT=1433 WINDOW=1024 SYN |
2019-12-12 15:37:25 |
123.207.5.190 | attackbotsspam | Dec 12 02:08:20 plusreed sshd[21466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.5.190 user=root Dec 12 02:08:23 plusreed sshd[21466]: Failed password for root from 123.207.5.190 port 57772 ssh2 ... |
2019-12-12 15:24:14 |
112.85.42.180 | attack | SSH login attempts |
2019-12-12 15:48:00 |
201.182.223.59 | attackspam | Dec 12 07:22:49 v22018086721571380 sshd[13787]: Failed password for invalid user bing from 201.182.223.59 port 60557 ssh2 |
2019-12-12 15:35:27 |
218.92.0.135 | attackbotsspam | Dec 12 08:57:33 tuxlinux sshd[52764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135 user=root ... |
2019-12-12 15:58:28 |