城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.239.46.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30403
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.239.46.244. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011200 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 22:21:44 CST 2025
;; MSG SIZE rcvd: 106
244.46.239.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
244.46.239.42.in-addr.arpa name = hn.kd.ny.adsl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.59.34.17 | attack | Jun 30 16:40:39 XXX sshd[46191]: Invalid user ubuntu from 139.59.34.17 port 42670 |
2019-07-01 01:59:10 |
| 155.230.28.249 | attackspambots | 2019-06-30T20:18:56.240806enmeeting.mahidol.ac.th sshd\[6096\]: Invalid user zen from 155.230.28.249 port 42840 2019-06-30T20:18:56.259424enmeeting.mahidol.ac.th sshd\[6096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.230.28.249 2019-06-30T20:18:58.535010enmeeting.mahidol.ac.th sshd\[6096\]: Failed password for invalid user zen from 155.230.28.249 port 42840 ssh2 ... |
2019-07-01 02:37:52 |
| 143.208.115.95 | attack | SMTP-sasl brute force ... |
2019-07-01 02:24:56 |
| 46.161.27.42 | attackbotsspam | 30.06.2019 17:43:13 Connection to port 1723 blocked by firewall |
2019-07-01 02:41:00 |
| 92.119.160.150 | attackbots | 6666/tcp 222/tcp 3333/tcp... [2019-06-26/30]181pkt,57pt.(tcp) |
2019-07-01 02:09:46 |
| 51.75.207.61 | attack | Jun 30 16:00:50 unicornsoft sshd\[20181\]: Invalid user mobile from 51.75.207.61 Jun 30 16:00:50 unicornsoft sshd\[20181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.207.61 Jun 30 16:00:52 unicornsoft sshd\[20181\]: Failed password for invalid user mobile from 51.75.207.61 port 57982 ssh2 |
2019-07-01 02:37:29 |
| 140.143.199.248 | attackspam | 30.06.2019 14:22:28 SSH access blocked by firewall |
2019-07-01 02:16:49 |
| 80.248.6.166 | attackspambots | SSH Brute Force, server-1 sshd[11804]: Failed password for root from 80.248.6.166 port 54174 ssh2 |
2019-07-01 02:08:56 |
| 209.97.153.35 | attackbots | Jun 30 17:20:25 ip-172-31-1-72 sshd\[26073\]: Invalid user hoge from 209.97.153.35 Jun 30 17:20:25 ip-172-31-1-72 sshd\[26073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.153.35 Jun 30 17:20:27 ip-172-31-1-72 sshd\[26073\]: Failed password for invalid user hoge from 209.97.153.35 port 34326 ssh2 Jun 30 17:23:30 ip-172-31-1-72 sshd\[26157\]: Invalid user admin from 209.97.153.35 Jun 30 17:23:30 ip-172-31-1-72 sshd\[26157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.153.35 |
2019-07-01 02:28:01 |
| 167.114.227.94 | attack | Unauthorized access to web resources |
2019-07-01 02:37:09 |
| 119.29.135.217 | attackbotsspam | Jun 30 15:20:06 tuxlinux sshd[58588]: Invalid user theodore from 119.29.135.217 port 44722 Jun 30 15:20:06 tuxlinux sshd[58588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.135.217 Jun 30 15:20:06 tuxlinux sshd[58588]: Invalid user theodore from 119.29.135.217 port 44722 Jun 30 15:20:06 tuxlinux sshd[58588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.135.217 Jun 30 15:20:06 tuxlinux sshd[58588]: Invalid user theodore from 119.29.135.217 port 44722 Jun 30 15:20:06 tuxlinux sshd[58588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.135.217 Jun 30 15:20:08 tuxlinux sshd[58588]: Failed password for invalid user theodore from 119.29.135.217 port 44722 ssh2 ... |
2019-07-01 02:13:54 |
| 45.71.244.2 | attackspam | Jun 30 15:20:08 ubuntu-2gb-nbg1-dc3-1 sshd[5677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.71.244.2 Jun 30 15:20:10 ubuntu-2gb-nbg1-dc3-1 sshd[5677]: Failed password for invalid user mysql1 from 45.71.244.2 port 39754 ssh2 ... |
2019-07-01 02:11:34 |
| 106.12.19.196 | attackspambots | Jun 30 18:04:30 server sshd[32496]: Failed password for invalid user elk_user from 106.12.19.196 port 42686 ssh2 Jun 30 18:08:29 server sshd[33394]: Failed password for invalid user jordan from 106.12.19.196 port 46728 ssh2 Jun 30 18:10:45 server sshd[33957]: Failed password for invalid user artifactory from 106.12.19.196 port 35210 ssh2 |
2019-07-01 02:35:28 |
| 170.0.60.70 | attack | 2019-06-30T16:18:59.6025101240 sshd\[2950\]: Invalid user wap from 170.0.60.70 port 47585 2019-06-30T16:18:59.6078681240 sshd\[2950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.0.60.70 2019-06-30T16:19:01.1801811240 sshd\[2950\]: Failed password for invalid user wap from 170.0.60.70 port 47585 ssh2 ... |
2019-07-01 02:39:25 |
| 178.62.237.38 | attack | Brute SSH |
2019-07-01 02:05:29 |