城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.146.95.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.146.95.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 01:43:53 CST 2025
;; MSG SIZE rcvd: 106
124.95.146.42.in-addr.arpa domain name pointer 42-146-95-124.rev.home.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
124.95.146.42.in-addr.arpa name = 42-146-95-124.rev.home.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 78.39.152.11 | attackspam | Sep 21 15:08:59 marvibiene postfix/smtpd[24486]: warning: unknown[78.39.152.11]: SASL PLAIN authentication failed: Sep 21 15:09:07 marvibiene postfix/smtpd[24486]: warning: unknown[78.39.152.11]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-09-21 23:13:01 |
| 222.186.31.145 | attackspam | Sep 21 17:10:13 MK-Soft-VM5 sshd[6801]: Failed password for root from 222.186.31.145 port 61664 ssh2 Sep 21 17:10:16 MK-Soft-VM5 sshd[6801]: Failed password for root from 222.186.31.145 port 61664 ssh2 ... |
2019-09-21 23:18:36 |
| 142.93.195.102 | attackspambots | Sep 21 15:26:59 OPSO sshd\[5567\]: Invalid user qg from 142.93.195.102 port 38558 Sep 21 15:26:59 OPSO sshd\[5567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.102 Sep 21 15:27:01 OPSO sshd\[5567\]: Failed password for invalid user qg from 142.93.195.102 port 38558 ssh2 Sep 21 15:31:20 OPSO sshd\[6549\]: Invalid user dani from 142.93.195.102 port 52576 Sep 21 15:31:20 OPSO sshd\[6549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.195.102 |
2019-09-21 23:36:11 |
| 139.99.37.130 | attackbotsspam | 2019-09-21T10:53:45.7558501495-001 sshd\[54107\]: Failed password for invalid user webmaster from 139.99.37.130 port 47988 ssh2 2019-09-21T11:08:09.6264081495-001 sshd\[55221\]: Invalid user gast2 from 139.99.37.130 port 37378 2019-09-21T11:08:09.6299091495-001 sshd\[55221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip130.ip-139-99-37.net 2019-09-21T11:08:12.0932511495-001 sshd\[55221\]: Failed password for invalid user gast2 from 139.99.37.130 port 37378 ssh2 2019-09-21T11:12:57.7828871495-001 sshd\[55551\]: Invalid user mainville from 139.99.37.130 port 12518 2019-09-21T11:12:57.7860491495-001 sshd\[55551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip130.ip-139-99-37.net ... |
2019-09-21 23:22:46 |
| 46.38.144.179 | attack | Sep 21 16:54:59 mail postfix/smtpd\[14861\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 21 17:26:15 mail postfix/smtpd\[14528\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 21 17:28:40 mail postfix/smtpd\[16830\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Sep 21 17:31:05 mail postfix/smtpd\[16247\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-09-21 23:31:20 |
| 122.116.140.68 | attackspambots | Sep 21 04:47:16 php1 sshd\[17964\]: Invalid user add from 122.116.140.68 Sep 21 04:47:16 php1 sshd\[17964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.140.68 Sep 21 04:47:18 php1 sshd\[17964\]: Failed password for invalid user add from 122.116.140.68 port 60210 ssh2 Sep 21 04:52:07 php1 sshd\[18435\]: Invalid user romeu from 122.116.140.68 Sep 21 04:52:07 php1 sshd\[18435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.140.68 |
2019-09-21 23:01:10 |
| 49.68.9.86 | attackbotsspam | Time: Sat Sep 21 10:12:30 2019 -0400 IP: 49.68.9.86 (CN/China/-) Failures: 10 (ftpd) Interval: 3600 seconds Blocked: Permanent Block |
2019-09-21 23:14:14 |
| 79.155.252.22 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/79.155.252.22/ ES - 1H : (38) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : ES NAME ASN : ASN3352 IP : 79.155.252.22 CIDR : 79.155.0.0/16 PREFIX COUNT : 662 UNIQUE IP COUNT : 10540800 WYKRYTE ATAKI Z ASN3352 : 1H - 1 3H - 11 6H - 13 12H - 15 24H - 17 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN - data recovery |
2019-09-21 23:34:23 |
| 110.77.232.226 | attackbots | Chat Spam |
2019-09-21 23:30:00 |
| 185.175.93.104 | attack | slow and persistent scanner |
2019-09-21 23:30:40 |
| 187.162.55.22 | attackspambots | CloudCIX Reconnaissance Scan Detected, PTR: 187-162-55-22.static.axtel.net. |
2019-09-21 23:08:07 |
| 222.220.167.202 | attackspam | Unauthorised access (Sep 21) SRC=222.220.167.202 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=61799 TCP DPT=8080 WINDOW=12757 SYN Unauthorised access (Sep 21) SRC=222.220.167.202 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=20900 TCP DPT=8080 WINDOW=41282 SYN Unauthorised access (Sep 19) SRC=222.220.167.202 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=4699 TCP DPT=8080 WINDOW=24825 SYN |
2019-09-21 23:04:40 |
| 138.68.4.8 | attackbotsspam | Sep 21 11:40:17 xtremcommunity sshd\[324686\]: Invalid user readonly from 138.68.4.8 port 56838 Sep 21 11:40:17 xtremcommunity sshd\[324686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.8 Sep 21 11:40:19 xtremcommunity sshd\[324686\]: Failed password for invalid user readonly from 138.68.4.8 port 56838 ssh2 Sep 21 11:44:55 xtremcommunity sshd\[324787\]: Invalid user acitoolkit from 138.68.4.8 port 42702 Sep 21 11:44:55 xtremcommunity sshd\[324787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.8 ... |
2019-09-21 23:50:27 |
| 185.45.13.11 | attackbotsspam | Fail2Ban Ban Triggered |
2019-09-21 23:49:33 |
| 115.78.8.83 | attackspam | Sep 21 17:05:30 markkoudstaal sshd[29050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.8.83 Sep 21 17:05:32 markkoudstaal sshd[29050]: Failed password for invalid user rm from 115.78.8.83 port 58565 ssh2 Sep 21 17:11:05 markkoudstaal sshd[29667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.78.8.83 |
2019-09-21 23:24:51 |