城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.213.160.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.213.160.18. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:56:19 CST 2025
;; MSG SIZE rcvd: 106
Host 18.160.213.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 18.160.213.42.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 42.200.66.164 | attackbotsspam | (sshd) Failed SSH login from 42.200.66.164 (HK/Hong Kong/42-200-66-164.static.imsbiz.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 7 14:46:03 amsweb01 sshd[10224]: Invalid user ubuntu from 42.200.66.164 port 47564 Apr 7 14:46:06 amsweb01 sshd[10224]: Failed password for invalid user ubuntu from 42.200.66.164 port 47564 ssh2 Apr 7 14:50:33 amsweb01 sshd[10770]: Invalid user user from 42.200.66.164 port 59286 Apr 7 14:50:35 amsweb01 sshd[10770]: Failed password for invalid user user from 42.200.66.164 port 59286 ssh2 Apr 7 14:54:38 amsweb01 sshd[11173]: Invalid user user from 42.200.66.164 port 39014 |
2020-04-08 00:59:53 |
| 104.168.152.87 | attackbots | Mail contains malware |
2020-04-08 00:56:43 |
| 165.228.76.66 | attack | Automatic report - Port Scan Attack |
2020-04-08 01:24:07 |
| 112.3.30.17 | attack | Apr 7 15:52:17 ws26vmsma01 sshd[163886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.17 Apr 7 15:52:18 ws26vmsma01 sshd[163886]: Failed password for invalid user luis from 112.3.30.17 port 57324 ssh2 ... |
2020-04-08 01:27:29 |
| 52.163.251.132 | attack | RDP Brute-Force (Grieskirchen RZ2) |
2020-04-08 00:29:28 |
| 205.205.150.28 | attack | 205.205.150.28 was recorded 99 times by 1 hosts attempting to connect to the following ports: 129,1433,3749,135,1471,3780,3784,143,1599,4000,161,4022,1604,175,1723,179,1741,4063,311,1900,323,389,1911,1962,7,1991,4444,2000,13,444,4567,2081,4730,19,465,2082,21,4840,22,4848,2083,502,23,4911,2086,4949,25,515,2087,5000,523,5001,49,548,53,2332,2375,5007,2379,70,5009,79,2404,2425,666,774,81,2480,789,82,873,3000,3001,902,992,88,3128,993,995,102,3306,3310,1023,1025,3388,3389,111,1098,3460,1099,1177,3541,113,1200,1234. Incident counter (4h, 24h, all-time): 99, 99, 99 |
2020-04-08 00:45:37 |
| 106.13.37.213 | attackbots | Apr 7 15:40:59 ift sshd\[5461\]: Invalid user postgres from 106.13.37.213Apr 7 15:41:00 ift sshd\[5461\]: Failed password for invalid user postgres from 106.13.37.213 port 53520 ssh2Apr 7 15:44:36 ift sshd\[5863\]: Invalid user rosa from 106.13.37.213Apr 7 15:44:38 ift sshd\[5863\]: Failed password for invalid user rosa from 106.13.37.213 port 40334 ssh2Apr 7 15:48:41 ift sshd\[6686\]: Invalid user postgres from 106.13.37.213 ... |
2020-04-08 00:54:07 |
| 138.68.226.234 | attack | 2020-04-07T17:38:47.571828 sshd[10666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.226.234 user=ftp 2020-04-07T17:38:49.805724 sshd[10666]: Failed password for ftp from 138.68.226.234 port 51764 ssh2 2020-04-07T17:48:23.229325 sshd[10857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.226.234 user=mysql 2020-04-07T17:48:25.536625 sshd[10857]: Failed password for mysql from 138.68.226.234 port 46510 ssh2 ... |
2020-04-08 01:11:46 |
| 117.89.132.36 | attackbots | 2020-04-07T19:07:34.211786vps773228.ovh.net sshd[6006]: Failed password for invalid user test from 117.89.132.36 port 64092 ssh2 2020-04-07T19:09:20.583758vps773228.ovh.net sshd[6667]: Invalid user ubuntu from 117.89.132.36 port 48242 2020-04-07T19:09:20.595500vps773228.ovh.net sshd[6667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.89.132.36 2020-04-07T19:09:20.583758vps773228.ovh.net sshd[6667]: Invalid user ubuntu from 117.89.132.36 port 48242 2020-04-07T19:09:22.016158vps773228.ovh.net sshd[6667]: Failed password for invalid user ubuntu from 117.89.132.36 port 48242 ssh2 ... |
2020-04-08 01:21:20 |
| 103.40.242.250 | attack | 20 attempts against mh-misbehave-ban on ice |
2020-04-08 00:39:08 |
| 106.51.80.198 | attackspambots | 2020-04-07T17:20:54.064124 sshd[10345]: Invalid user arma3server from 106.51.80.198 port 54754 2020-04-07T17:20:54.078503 sshd[10345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198 2020-04-07T17:20:54.064124 sshd[10345]: Invalid user arma3server from 106.51.80.198 port 54754 2020-04-07T17:20:55.675216 sshd[10345]: Failed password for invalid user arma3server from 106.51.80.198 port 54754 ssh2 ... |
2020-04-08 00:48:36 |
| 2.224.168.43 | attackspambots | Apr 7 15:15:25 h2779839 sshd[11569]: Invalid user halflifeserver from 2.224.168.43 port 49256 Apr 7 15:15:25 h2779839 sshd[11569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.224.168.43 Apr 7 15:15:25 h2779839 sshd[11569]: Invalid user halflifeserver from 2.224.168.43 port 49256 Apr 7 15:15:27 h2779839 sshd[11569]: Failed password for invalid user halflifeserver from 2.224.168.43 port 49256 ssh2 Apr 7 15:18:05 h2779839 sshd[11624]: Invalid user admin from 2.224.168.43 port 43364 Apr 7 15:18:06 h2779839 sshd[11624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.224.168.43 Apr 7 15:18:05 h2779839 sshd[11624]: Invalid user admin from 2.224.168.43 port 43364 Apr 7 15:18:08 h2779839 sshd[11624]: Failed password for invalid user admin from 2.224.168.43 port 43364 ssh2 Apr 7 15:20:45 h2779839 sshd[11674]: Invalid user ts3srv from 2.224.168.43 port 37462 ... |
2020-04-08 00:39:28 |
| 36.228.115.144 | attackspam | 20/4/7@09:39:22: FAIL: Alarm-Network address from=36.228.115.144 20/4/7@09:39:22: FAIL: Alarm-Network address from=36.228.115.144 ... |
2020-04-08 01:22:22 |
| 172.105.79.79 | attackspam | Port 22 Scan, PTR: None |
2020-04-08 00:26:57 |
| 222.101.206.56 | attack | Triggered by Fail2Ban at Ares web server |
2020-04-08 00:31:52 |