城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.239.148.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.239.148.71. IN A
;; AUTHORITY SECTION:
. 556 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:02:48 CST 2022
;; MSG SIZE rcvd: 106
71.148.239.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
71.148.239.42.in-addr.arpa name = hn.kd.ny.adsl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 200.113.201.20 | attackbotsspam | Unauthorized connection attempt from IP address 200.113.201.20 on Port 445(SMB) |
2020-10-14 01:57:30 |
| 202.29.220.182 | attackspam | SSH login attempts. |
2020-10-14 01:38:35 |
| 61.163.104.156 | attack | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-10-14 01:45:28 |
| 134.17.94.55 | attackbotsspam | 2020-10-13T17:37:42+0000 Failed SSH Authentication/Brute Force Attack. (Server 6) |
2020-10-14 01:39:34 |
| 200.83.33.42 | attackbots | Unauthorized connection attempt from IP address 200.83.33.42 on Port 445(SMB) |
2020-10-14 02:09:15 |
| 123.207.97.250 | attack | 2020-10-13T09:52:45.137623yoshi.linuxbox.ninja sshd[1497759]: Failed password for invalid user noel from 123.207.97.250 port 43844 ssh2 2020-10-13T09:56:31.254973yoshi.linuxbox.ninja sshd[1506491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.97.250 user=root 2020-10-13T09:56:32.345651yoshi.linuxbox.ninja sshd[1506491]: Failed password for root from 123.207.97.250 port 53044 ssh2 ... |
2020-10-14 01:57:54 |
| 112.85.42.200 | attack | Oct 13 18:10:18 localhost sshd[39953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200 user=root Oct 13 18:10:20 localhost sshd[39953]: Failed password for root from 112.85.42.200 port 28018 ssh2 Oct 13 18:10:23 localhost sshd[39953]: Failed password for root from 112.85.42.200 port 28018 ssh2 Oct 13 18:10:18 localhost sshd[39953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200 user=root Oct 13 18:10:20 localhost sshd[39953]: Failed password for root from 112.85.42.200 port 28018 ssh2 Oct 13 18:10:23 localhost sshd[39953]: Failed password for root from 112.85.42.200 port 28018 ssh2 Oct 13 18:10:18 localhost sshd[39953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.200 user=root Oct 13 18:10:20 localhost sshd[39953]: Failed password for root from 112.85.42.200 port 28018 ssh2 Oct 13 18:10:23 localhost sshd[39953]: Failed pas ... |
2020-10-14 02:12:02 |
| 103.89.176.74 | attackbotsspam | Oct 13 19:51:26 abendstille sshd\[24518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.176.74 user=root Oct 13 19:51:28 abendstille sshd\[24518\]: Failed password for root from 103.89.176.74 port 54100 ssh2 Oct 13 19:55:17 abendstille sshd\[29206\]: Invalid user menyhart from 103.89.176.74 Oct 13 19:55:17 abendstille sshd\[29206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.176.74 Oct 13 19:55:19 abendstille sshd\[29206\]: Failed password for invalid user menyhart from 103.89.176.74 port 50162 ssh2 ... |
2020-10-14 02:05:27 |
| 170.0.53.8 | attack | Automatic report - Port Scan Attack |
2020-10-14 01:44:44 |
| 158.69.74.240 | attack | Oct 12 02:32:21 HOST sshd[5268]: reveeclipse mapping checking getaddrinfo for ip-158-69-74.eu [158.69.74.240] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 12 02:32:23 HOST sshd[5268]: Failed password for invalid user gyoshi from 158.69.74.240 port 28114 ssh2 Oct 12 02:32:23 HOST sshd[5268]: Received disconnect from 158.69.74.240: 11: Bye Bye [preauth] Oct 12 02:36:05 HOST sshd[5396]: reveeclipse mapping checking getaddrinfo for ip-158-69-74.eu [158.69.74.240] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 12 02:36:05 HOST sshd[5396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.74.240 user=r.r Oct 12 02:36:06 HOST sshd[5396]: Failed password for r.r from 158.69.74.240 port 9480 ssh2 Oct 12 02:36:06 HOST sshd[5396]: Received disconnect from 158.69.74.240: 11: Bye Bye [preauth] Oct 12 02:37:36 HOST sshd[5425]: reveeclipse mapping checking getaddrinfo for ip-158-69-74.eu [158.69.74.240] failed - POSSIBLE BREAK-IN ATTEMPT! Oct 12 02:37........ ------------------------------- |
2020-10-14 02:01:36 |
| 167.172.46.87 | attack | Oct 13 19:54:31 OPSO sshd\[18563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.46.87 user=root Oct 13 19:54:33 OPSO sshd\[18563\]: Failed password for root from 167.172.46.87 port 46052 ssh2 Oct 13 19:57:50 OPSO sshd\[19737\]: Invalid user youhong from 167.172.46.87 port 50296 Oct 13 19:57:50 OPSO sshd\[19737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.46.87 Oct 13 19:57:52 OPSO sshd\[19737\]: Failed password for invalid user youhong from 167.172.46.87 port 50296 ssh2 |
2020-10-14 02:08:09 |
| 139.199.32.22 | attackspam | $f2bV_matches |
2020-10-14 02:11:32 |
| 177.75.107.3 | attackspam | Unauthorized connection attempt from IP address 177.75.107.3 on Port 445(SMB) |
2020-10-14 01:46:13 |
| 27.195.159.166 | attack | Oct 13 19:06:27 *hidden* sshd[1598]: Failed password for invalid user matt from 27.195.159.166 port 41232 ssh2 Oct 13 19:11:01 *hidden* sshd[1769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.195.159.166 user=root Oct 13 19:11:03 *hidden* sshd[1769]: Failed password for *hidden* from 27.195.159.166 port 21436 ssh2 |
2020-10-14 01:57:04 |
| 201.72.186.50 | attackspambots | Unauthorized connection attempt from IP address 201.72.186.50 on Port 445(SMB) |
2020-10-14 02:07:41 |