城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): China Unicom
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 42.57.205.180 | attack | Port Scan detected |
2020-08-23 08:00:33 |
| 42.57.203.243 | attack | Unauthorised access (Jul 14) SRC=42.57.203.243 LEN=40 TTL=49 ID=27441 TCP DPT=23 WINDOW=43325 SYN |
2019-07-14 23:21:02 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.57.20.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.57.20.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:06:17 CST 2025
;; MSG SIZE rcvd: 105
Host 104.20.57.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.20.57.42.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 113.141.66.255 | attackbots | Nov 1 14:07:43 legacy sshd[22857]: Failed password for root from 113.141.66.255 port 33521 ssh2 Nov 1 14:12:21 legacy sshd[22975]: Failed password for root from 113.141.66.255 port 52547 ssh2 ... |
2019-11-01 21:30:26 |
| 95.123.94.182 | attackspam | Nov 1 13:44:20 ns41 sshd[30326]: Failed password for root from 95.123.94.182 port 37758 ssh2 Nov 1 13:44:20 ns41 sshd[30326]: Failed password for root from 95.123.94.182 port 37758 ssh2 |
2019-11-01 21:25:12 |
| 157.52.229.4 | attackbots | Lines containing failures of 157.52.229.4 Nov 1 12:45:56 shared04 postfix/smtpd[23650]: connect from walmart-us-west-walmartaws4.kuygs.com[157.52.229.4] Nov 1 12:45:56 shared04 policyd-spf[30431]: prepend Received-SPF: Permerror (mailfrom) identhostnamey=mailfrom; client-ip=157.52.229.4; helo=walmart-us-west-walmartaws4.kuygs.com; envelope-from=x@x Nov x@x Nov 1 12:45:57 shared04 postfix/smtpd[23650]: disconnect from walmart-us-west-walmartaws4.kuygs.com[157.52.229.4] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=157.52.229.4 |
2019-11-01 21:09:12 |
| 106.13.65.210 | attackbotsspam | Nov 1 12:05:36 thevastnessof sshd[23499]: Failed password for invalid user tomcat from 106.13.65.210 port 33430 ssh2 ... |
2019-11-01 21:39:37 |
| 185.26.99.0 | attack | [01/Nov/2019 15:13:00] DROP "deny Trojans SMTP" packet from wan-TG, proto:TCP, len:40, 185.26.99.61:53555 -> xxx:465, flags:[ SYN ], seq:3690976053 ack:0, win:29200, tcplen:0 [01/Nov/2019 15:13:03] DROP "deny Trojans SMTP" packet from wan-TG, proto:TCP, len:40, 185.26.99.70:52099 -> xxx:25, flags:[ SYN ], seq:1757067061 ack:0, win:29200, tcplen:0 ack:0, win:29200, tcplen:0 [01/Nov/2019 15:13:05] DROP "deny Trojans SMTP" packet from wan-TG, proto:TCP, len:40, 185.26.99.178:34644 -> xxx:25, flags:[ SYN ], seq:538299571 ack:0, win:29200, tcplen:0 [01/Nov/2019 15:13:05] DROP "deny Trojans SMTP" packet from wan-TG, proto:TCP, len:40, 185.26.99.235:39933 -> xxx:465, flags:[ SYN ], seq:1624656505 ack:0, win:29200, tcplen:0 |
2019-11-01 21:15:42 |
| 190.234.60.71 | attackbotsspam | Automatic report - Port Scan Attack |
2019-11-01 21:16:34 |
| 162.144.200.40 | attack | xmlrpc attack |
2019-11-01 21:33:34 |
| 64.53.14.211 | attackbots | Nov 1 13:08:30 web8 sshd\[13946\]: Invalid user 123456 from 64.53.14.211 Nov 1 13:08:30 web8 sshd\[13946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.53.14.211 Nov 1 13:08:32 web8 sshd\[13946\]: Failed password for invalid user 123456 from 64.53.14.211 port 38701 ssh2 Nov 1 13:12:31 web8 sshd\[15862\]: Invalid user felix from 64.53.14.211 Nov 1 13:12:31 web8 sshd\[15862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.53.14.211 |
2019-11-01 21:28:18 |
| 207.180.198.241 | attackspambots | Automatic report - Banned IP Access |
2019-11-01 21:26:32 |
| 178.128.242.233 | attack | Nov 1 13:24:55 ns381471 sshd[20055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.242.233 Nov 1 13:24:57 ns381471 sshd[20055]: Failed password for invalid user ts3bot3 from 178.128.242.233 port 40260 ssh2 |
2019-11-01 21:12:52 |
| 86.30.243.212 | attackbotsspam | Nov 1 17:39:32 gw1 sshd[22147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.30.243.212 Nov 1 17:39:33 gw1 sshd[22147]: Failed password for invalid user qh from 86.30.243.212 port 54444 ssh2 ... |
2019-11-01 21:31:00 |
| 191.252.204.222 | attack | Lines containing failures of 191.252.204.222 Oct 30 18:05:07 siirappi sshd[2292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.204.222 user=r.r Oct 30 18:05:09 siirappi sshd[2292]: Failed password for r.r from 191.252.204.222 port 54470 ssh2 Oct 30 18:05:10 siirappi sshd[2292]: Received disconnect from 191.252.204.222 port 54470:11: Bye Bye [preauth] Oct 30 18:05:10 siirappi sshd[2292]: Disconnected from 191.252.204.222 port 54470 [preauth] Oct 30 18:23:17 siirappi sshd[2544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.204.222 user=r.r Oct 30 18:23:18 siirappi sshd[2544]: Failed password for r.r from 191.252.204.222 port 47260 ssh2 Oct 30 18:23:19 siirappi sshd[2544]: Received disconnect from 191.252.204.222 port 47260:11: Bye Bye [preauth] Oct 30 18:23:19 siirappi sshd[2544]: Disconnected from 191.252.204.222 port 47260 [preauth] Oct 30 18:29:51 siirappi sshd[2618]:........ ------------------------------ |
2019-11-01 21:18:37 |
| 190.227.168.165 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-01 21:11:07 |
| 222.186.175.155 | attackspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155 user=root Failed password for root from 222.186.175.155 port 8550 ssh2 Failed password for root from 222.186.175.155 port 8550 ssh2 Failed password for root from 222.186.175.155 port 8550 ssh2 Failed password for root from 222.186.175.155 port 8550 ssh2 |
2019-11-01 21:10:38 |
| 220.76.205.178 | attackspam | Nov 1 12:53:03 amit sshd\[31679\]: Invalid user wwwadmin from 220.76.205.178 Nov 1 12:53:03 amit sshd\[31679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.178 Nov 1 12:53:05 amit sshd\[31679\]: Failed password for invalid user wwwadmin from 220.76.205.178 port 46110 ssh2 ... |
2019-11-01 21:25:59 |