城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.216.121.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.216.121.79. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 00:36:29 CST 2025
;; MSG SIZE rcvd: 106
Host 79.121.216.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 79.121.216.42.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.13.187.42 | attack | Invalid user wfz from 106.13.187.42 port 44486 |
2020-03-18 01:37:10 |
| 217.165.69.206 | attack | 1584434396 - 03/17/2020 09:39:56 Host: 217.165.69.206/217.165.69.206 Port: 445 TCP Blocked |
2020-03-18 01:22:42 |
| 187.189.241.135 | attack | 5x Failed Password |
2020-03-18 01:58:38 |
| 51.91.212.79 | attackbotsspam | " " |
2020-03-18 01:40:50 |
| 118.96.36.248 | attackbots | Unauthorized connection attempt from IP address 118.96.36.248 on Port 445(SMB) |
2020-03-18 01:29:23 |
| 27.78.14.83 | attack | SSH brute-force: detected 12 distinct usernames within a 24-hour window. |
2020-03-18 01:27:04 |
| 219.79.236.75 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-03-18 01:38:19 |
| 222.186.173.238 | attackspambots | Mar 17 18:04:00 sd-53420 sshd\[4520\]: User root from 222.186.173.238 not allowed because none of user's groups are listed in AllowGroups Mar 17 18:04:01 sd-53420 sshd\[4520\]: Failed none for invalid user root from 222.186.173.238 port 65430 ssh2 Mar 17 18:04:01 sd-53420 sshd\[4520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238 user=root Mar 17 18:04:03 sd-53420 sshd\[4520\]: Failed password for invalid user root from 222.186.173.238 port 65430 ssh2 Mar 17 18:04:19 sd-53420 sshd\[4618\]: User root from 222.186.173.238 not allowed because none of user's groups are listed in AllowGroups ... |
2020-03-18 01:10:38 |
| 80.82.70.239 | attackspambots | Port 41001 scan denied |
2020-03-18 01:08:44 |
| 222.186.175.150 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Failed password for root from 222.186.175.150 port 11626 ssh2 Failed password for root from 222.186.175.150 port 11626 ssh2 Failed password for root from 222.186.175.150 port 11626 ssh2 Failed password for root from 222.186.175.150 port 11626 ssh2 |
2020-03-18 01:49:13 |
| 125.165.113.150 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 17-03-2020 08:40:10. |
2020-03-18 01:06:40 |
| 60.168.206.19 | attackspam | 08:39:04.972 1 ACCOUNT(james) login(SMTP) from [60.168.206.19] failed. Error Code=incorrect password 08:39:26.433 1 ACCOUNT(james) login(SMTP) from [60.168.206.19] failed. Error Code=incorrect password ... |
2020-03-18 01:48:22 |
| 162.243.131.164 | attackspam | Port 4848 scan denied |
2020-03-18 01:46:31 |
| 152.136.36.250 | attackspambots | 2020-03-17T10:59:13.663543scmdmz1 sshd[8797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.36.250 2020-03-17T10:59:13.659020scmdmz1 sshd[8797]: Invalid user ahmad from 152.136.36.250 port 36158 2020-03-17T10:59:15.715600scmdmz1 sshd[8797]: Failed password for invalid user ahmad from 152.136.36.250 port 36158 ssh2 ... |
2020-03-18 02:00:08 |
| 89.38.219.22 | attackspam | firewall-block, port(s): 4567/tcp |
2020-03-18 01:04:55 |