城市(city): unknown
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.161.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.2.161.249. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:56:22 CST 2025
;; MSG SIZE rcvd: 105
249.161.2.42.in-addr.arpa domain name pointer 42-2-161-249.static.netvigator.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
249.161.2.42.in-addr.arpa name = 42-2-161-249.static.netvigator.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 178.49.9.210 | attackbotsspam | Dec 18 21:36:01 root sshd[15284]: Failed password for backup from 178.49.9.210 port 59908 ssh2 Dec 18 21:43:12 root sshd[15419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.49.9.210 Dec 18 21:43:15 root sshd[15419]: Failed password for invalid user pepperrell from 178.49.9.210 port 40894 ssh2 ... |
2019-12-19 04:53:41 |
| 189.148.104.67 | attack | [WedDec1815:31:01.1949422019][:error][pid29259:tid140308620752640][client189.148.104.67:23170][client189.148.104.67]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"398"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(DisableifyouwanttoallowMSIE6\)"][severity"WARNING"][hostname"galardi.ch"][uri"/"][unique_id"Xfo4JD02JwmgWWvS-5dQGgAAAQg"][WedDec1815:31:08.2890462019][:error][pid30501:tid140308505364224][client189.148.104.67:28482][client189.148.104.67]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"398"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(Disablei |
2019-12-19 05:14:30 |
| 186.179.106.36 | attackspambots | Unauthorized connection attempt from IP address 186.179.106.36 on Port 445(SMB) |
2019-12-19 05:18:54 |
| 113.31.102.157 | attackbotsspam | Dec 18 23:48:08 itv-usvr-01 sshd[28121]: Invalid user amount from 113.31.102.157 Dec 18 23:48:08 itv-usvr-01 sshd[28121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.102.157 Dec 18 23:48:08 itv-usvr-01 sshd[28121]: Invalid user amount from 113.31.102.157 Dec 18 23:48:09 itv-usvr-01 sshd[28121]: Failed password for invalid user amount from 113.31.102.157 port 52342 ssh2 Dec 18 23:55:59 itv-usvr-01 sshd[28414]: Invalid user zabielski from 113.31.102.157 |
2019-12-19 05:15:21 |
| 77.233.4.133 | attackspambots | 2019-12-18T20:52:15.661523abusebot-7.cloudsearch.cf sshd\[18894\]: Invalid user ftpuser from 77.233.4.133 port 37734 2019-12-18T20:52:15.665559abusebot-7.cloudsearch.cf sshd\[18894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.nceco.ru 2019-12-18T20:52:18.026414abusebot-7.cloudsearch.cf sshd\[18894\]: Failed password for invalid user ftpuser from 77.233.4.133 port 37734 ssh2 2019-12-18T20:57:10.921065abusebot-7.cloudsearch.cf sshd\[18920\]: Invalid user kuhlow from 77.233.4.133 port 40079 |
2019-12-19 05:22:27 |
| 40.92.75.83 | attack | Dec 18 18:49:55 debian-2gb-vpn-nbg1-1 kernel: [1062559.827544] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.75.83 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=36697 DF PROTO=TCP SPT=10587 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-19 05:21:16 |
| 177.106.61.239 | attackspam | Dec 18 20:50:04 vtv3 sshd[417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.106.61.239 Dec 18 20:50:05 vtv3 sshd[417]: Failed password for invalid user nicolina from 177.106.61.239 port 58104 ssh2 Dec 18 20:56:34 vtv3 sshd[3774]: Failed password for root from 177.106.61.239 port 39526 ssh2 Dec 18 21:09:59 vtv3 sshd[9632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.106.61.239 Dec 18 21:10:00 vtv3 sshd[9632]: Failed password for invalid user nu from 177.106.61.239 port 59130 ssh2 Dec 18 21:16:53 vtv3 sshd[13460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.106.61.239 Dec 18 21:30:30 vtv3 sshd[19893]: Failed password for root from 177.106.61.239 port 60242 ssh2 Dec 18 21:37:22 vtv3 sshd[23018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.106.61.239 Dec 18 21:37:24 vtv3 sshd[23018]: Failed password for invalid user test |
2019-12-19 04:56:54 |
| 37.59.58.142 | attack | Dec 18 20:32:11 MainVPS sshd[28926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.58.142 user=root Dec 18 20:32:13 MainVPS sshd[28926]: Failed password for root from 37.59.58.142 port 46170 ssh2 Dec 18 20:40:10 MainVPS sshd[12326]: Invalid user test from 37.59.58.142 port 37078 Dec 18 20:40:11 MainVPS sshd[12326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.58.142 Dec 18 20:40:10 MainVPS sshd[12326]: Invalid user test from 37.59.58.142 port 37078 Dec 18 20:40:13 MainVPS sshd[12326]: Failed password for invalid user test from 37.59.58.142 port 37078 ssh2 ... |
2019-12-19 05:26:19 |
| 119.136.125.194 | attackspam | Dec 18 15:31:15 grey postfix/smtpd\[23208\]: NOQUEUE: reject: RCPT from unknown\[119.136.125.194\]: 554 5.7.1 Service unavailable\; Client host \[119.136.125.194\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[119.136.125.194\]\; from=\ |
2019-12-19 05:09:23 |
| 51.83.72.243 | attackspambots | Triggered by Fail2Ban at Vostok web server |
2019-12-19 04:52:49 |
| 187.16.96.35 | attack | Invalid user ogrish from 187.16.96.35 port 52528 |
2019-12-19 05:03:54 |
| 190.39.40.243 | attackspam | 1576681667 - 12/18/2019 16:07:47 Host: 190.39.40.243/190.39.40.243 Port: 445 TCP Blocked |
2019-12-19 04:53:13 |
| 162.243.99.164 | attackspam | Dec 18 15:19:56 ws12vmsma01 sshd[48347]: Failed password for invalid user server from 162.243.99.164 port 51542 ssh2 Dec 18 15:25:45 ws12vmsma01 sshd[49154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.99.164 user=root Dec 18 15:25:47 ws12vmsma01 sshd[49154]: Failed password for root from 162.243.99.164 port 56827 ssh2 ... |
2019-12-19 05:19:56 |
| 142.93.241.93 | attackbots | Invalid user morgan from 142.93.241.93 port 45424 |
2019-12-19 04:59:57 |
| 211.220.27.191 | attack | Dec 18 21:35:00 MK-Soft-VM8 sshd[16541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.27.191 Dec 18 21:35:03 MK-Soft-VM8 sshd[16541]: Failed password for invalid user szaplonczay from 211.220.27.191 port 44092 ssh2 ... |
2019-12-19 05:05:43 |