城市(city): unknown
省份(region): unknown
国家(country): Korea (the Republic of)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.24.111.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.24.111.38. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 19:30:01 CST 2025
;; MSG SIZE rcvd: 105
Host 38.111.24.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 38.111.24.42.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.68.192.106 | attack | Dec 16 12:33:37 tdfoods sshd\[18142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip106.ip-51-68-192.eu user=root Dec 16 12:33:39 tdfoods sshd\[18142\]: Failed password for root from 51.68.192.106 port 34158 ssh2 Dec 16 12:38:34 tdfoods sshd\[18593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip106.ip-51-68-192.eu user=root Dec 16 12:38:36 tdfoods sshd\[18593\]: Failed password for root from 51.68.192.106 port 41540 ssh2 Dec 16 12:43:28 tdfoods sshd\[19094\]: Invalid user 1 from 51.68.192.106 |
2019-12-17 06:43:59 |
| 115.79.60.104 | attackspambots | $f2bV_matches |
2019-12-17 06:41:38 |
| 187.12.181.106 | attackspambots | Dec 16 21:51:48 hcbbdb sshd\[3555\]: Invalid user yeen from 187.12.181.106 Dec 16 21:51:48 hcbbdb sshd\[3555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.12.181.106 Dec 16 21:51:50 hcbbdb sshd\[3555\]: Failed password for invalid user yeen from 187.12.181.106 port 46706 ssh2 Dec 16 21:59:49 hcbbdb sshd\[4553\]: Invalid user ftp_user from 187.12.181.106 Dec 16 21:59:49 hcbbdb sshd\[4553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.12.181.106 |
2019-12-17 06:19:39 |
| 118.24.82.81 | attackbotsspam | Dec 16 23:30:55 ns381471 sshd[15739]: Failed password for root from 118.24.82.81 port 46935 ssh2 |
2019-12-17 06:35:27 |
| 104.199.175.58 | attackspam | Dec 16 23:09:26 mail sshd[3412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.175.58 Dec 16 23:09:28 mail sshd[3412]: Failed password for invalid user scheduler from 104.199.175.58 port 36868 ssh2 Dec 16 23:15:30 mail sshd[6183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.175.58 |
2019-12-17 06:27:22 |
| 40.92.42.37 | attackspambots | Dec 17 00:59:44 debian-2gb-vpn-nbg1-1 kernel: [911953.122550] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.42.37 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=230 ID=35462 DF PROTO=TCP SPT=6369 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-17 06:30:48 |
| 68.183.204.162 | attack | Dec 16 22:14:22 zeus sshd[26904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.204.162 Dec 16 22:14:25 zeus sshd[26904]: Failed password for invalid user wwwadmin from 68.183.204.162 port 51512 ssh2 Dec 16 22:19:14 zeus sshd[26996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.204.162 Dec 16 22:19:17 zeus sshd[26996]: Failed password for invalid user neteh from 68.183.204.162 port 56786 ssh2 |
2019-12-17 06:33:29 |
| 222.186.190.2 | attack | Dec 16 12:34:56 sachi sshd\[15083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Dec 16 12:34:58 sachi sshd\[15083\]: Failed password for root from 222.186.190.2 port 6310 ssh2 Dec 16 12:35:01 sachi sshd\[15083\]: Failed password for root from 222.186.190.2 port 6310 ssh2 Dec 16 12:35:04 sachi sshd\[15083\]: Failed password for root from 222.186.190.2 port 6310 ssh2 Dec 16 12:35:06 sachi sshd\[15083\]: Failed password for root from 222.186.190.2 port 6310 ssh2 |
2019-12-17 06:40:25 |
| 80.211.67.90 | attackbots | Dec 16 23:09:33 mail sshd[3435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90 Dec 16 23:09:34 mail sshd[3435]: Failed password for invalid user flower from 80.211.67.90 port 35546 ssh2 Dec 16 23:15:17 mail sshd[5956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90 |
2019-12-17 06:27:53 |
| 129.213.63.120 | attackspam | Dec 16 17:15:30 plusreed sshd[5160]: Invalid user terisocks from 129.213.63.120 ... |
2019-12-17 06:25:15 |
| 209.17.96.58 | attack | 209.17.96.58 was recorded 18 times by 15 hosts attempting to connect to the following ports: 3389,5061,5353,20249,8531,987,8000,118,7443,3333,68,5222,161,995,143. Incident counter (4h, 24h, all-time): 18, 64, 2269 |
2019-12-17 06:07:57 |
| 157.245.243.4 | attackspam | Dec 17 00:05:47 vtv3 sshd[8921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.243.4 Dec 17 00:05:48 vtv3 sshd[8921]: Failed password for invalid user ching from 157.245.243.4 port 40086 ssh2 Dec 17 00:13:04 vtv3 sshd[12502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.243.4 Dec 17 00:37:44 vtv3 sshd[24290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.243.4 Dec 17 00:37:46 vtv3 sshd[24290]: Failed password for invalid user misutka from 157.245.243.4 port 53868 ssh2 Dec 17 00:42:46 vtv3 sshd[26824]: Failed password for root from 157.245.243.4 port 33350 ssh2 Dec 17 00:57:23 vtv3 sshd[1602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.243.4 Dec 17 00:57:25 vtv3 sshd[1602]: Failed password for invalid user reker from 157.245.243.4 port 56488 ssh2 Dec 17 01:02:34 vtv3 sshd[3936]: Failed password for root fr |
2019-12-17 06:11:18 |
| 117.50.12.10 | attackbotsspam | Dec 16 23:12:48 lnxmail61 sshd[30730]: Failed password for root from 117.50.12.10 port 50118 ssh2 Dec 16 23:12:48 lnxmail61 sshd[30730]: Failed password for root from 117.50.12.10 port 50118 ssh2 Dec 16 23:20:01 lnxmail61 sshd[31638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.12.10 |
2019-12-17 06:38:32 |
| 107.170.242.185 | attack | Dec 16 22:50:01 mail sshd[28277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.242.185 Dec 16 22:50:03 mail sshd[28277]: Failed password for invalid user admin007g from 107.170.242.185 port 59530 ssh2 Dec 16 22:59:14 mail sshd[31717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.242.185 |
2019-12-17 06:26:31 |
| 162.243.137.171 | attackbots | Dec 16 12:10:33 kapalua sshd\[17698\]: Invalid user mccreath from 162.243.137.171 Dec 16 12:10:33 kapalua sshd\[17698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.137.171 Dec 16 12:10:35 kapalua sshd\[17698\]: Failed password for invalid user mccreath from 162.243.137.171 port 57552 ssh2 Dec 16 12:16:07 kapalua sshd\[18279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.137.171 user=root Dec 16 12:16:10 kapalua sshd\[18279\]: Failed password for root from 162.243.137.171 port 33162 ssh2 |
2019-12-17 06:32:13 |