城市(city): unknown
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.91.206.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;43.91.206.42. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:16:24 CST 2025
;; MSG SIZE rcvd: 105
Host 42.206.91.43.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.206.91.43.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.143.221.61 | attackspam | Jul 20 22:06:24 h2177944 kernel: \[1977306.744980\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=40167 PROTO=TCP SPT=59317 DPT=9463 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 20 22:18:56 h2177944 kernel: \[1978059.101388\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=28960 PROTO=TCP SPT=59317 DPT=9711 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 20 22:54:29 h2177944 kernel: \[1980191.268600\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=57695 PROTO=TCP SPT=59317 DPT=9460 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 20 23:00:34 h2177944 kernel: \[1980556.049212\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=18775 PROTO=TCP SPT=59317 DPT=9550 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 20 23:05:54 h2177944 kernel: \[1980876.738701\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.61 DST=85.214. |
2019-07-21 05:06:53 |
| 120.29.77.86 | attackspambots | Malicious/Probing: /xmlrpc.php |
2019-07-21 05:18:34 |
| 116.106.30.113 | attackspambots | Unauthorized connection attempt from IP address 116.106.30.113 on Port 445(SMB) |
2019-07-21 05:30:00 |
| 188.166.36.177 | attackspam | Jul 20 18:39:21 legacy sshd[25132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.36.177 Jul 20 18:39:22 legacy sshd[25132]: Failed password for invalid user jira from 188.166.36.177 port 36558 ssh2 Jul 20 18:44:06 legacy sshd[25259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.36.177 ... |
2019-07-21 05:21:22 |
| 81.118.52.78 | attackbots | 2019-07-20T21:00:15.994923abusebot.cloudsearch.cf sshd\[6812\]: Invalid user sj from 81.118.52.78 port 46562 |
2019-07-21 05:20:05 |
| 60.24.231.4 | attackspam | " " |
2019-07-21 04:52:54 |
| 164.132.104.58 | attackspam | Jul 20 22:29:27 SilenceServices sshd[11789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.104.58 Jul 20 22:29:29 SilenceServices sshd[11789]: Failed password for invalid user printer from 164.132.104.58 port 42906 ssh2 Jul 20 22:33:40 SilenceServices sshd[14027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.104.58 |
2019-07-21 04:54:06 |
| 183.82.246.218 | attackspambots | 183.82.246.218 - - [20/Jul/2019:13:32:03 +0200] "GET /wp-login.php HTTP/1.1" 302 573 ... |
2019-07-21 05:15:23 |
| 67.205.167.142 | attack | Jul 20 23:17:37 giegler sshd[27814]: Invalid user btsync from 67.205.167.142 port 59152 |
2019-07-21 05:26:36 |
| 159.89.38.26 | attackbots | Jul 20 22:49:30 eventyay sshd[17230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.38.26 Jul 20 22:49:32 eventyay sshd[17230]: Failed password for invalid user steven from 159.89.38.26 port 54327 ssh2 Jul 20 22:56:28 eventyay sshd[18756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.38.26 ... |
2019-07-21 05:14:53 |
| 72.215.255.135 | attack | 2019-07-20T18:34:38.134316abusebot-7.cloudsearch.cf sshd\[30090\]: Invalid user pi from 72.215.255.135 port 63579 |
2019-07-21 04:50:39 |
| 134.209.161.167 | attackspam | Jul 20 22:23:23 microserver sshd[54883]: Invalid user gaurav from 134.209.161.167 port 46080 Jul 20 22:23:23 microserver sshd[54883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.161.167 Jul 20 22:23:25 microserver sshd[54883]: Failed password for invalid user gaurav from 134.209.161.167 port 46080 ssh2 Jul 20 22:27:58 microserver sshd[57310]: Invalid user tena from 134.209.161.167 port 43032 Jul 20 22:27:58 microserver sshd[57310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.161.167 Jul 20 22:41:11 microserver sshd[12251]: Invalid user roger from 134.209.161.167 port 33920 Jul 20 22:41:11 microserver sshd[12251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.161.167 Jul 20 22:41:13 microserver sshd[12251]: Failed password for invalid user roger from 134.209.161.167 port 33920 ssh2 Jul 20 22:45:47 microserver sshd[14514]: Invalid user s from 134.209.161.167 p |
2019-07-21 05:21:50 |
| 51.68.227.49 | attackspam | Jul 20 23:19:17 tux-35-217 sshd\[6873\]: Invalid user psql from 51.68.227.49 port 43394 Jul 20 23:19:17 tux-35-217 sshd\[6873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.227.49 Jul 20 23:19:19 tux-35-217 sshd\[6873\]: Failed password for invalid user psql from 51.68.227.49 port 43394 ssh2 Jul 20 23:23:37 tux-35-217 sshd\[6899\]: Invalid user gladys from 51.68.227.49 port 40236 Jul 20 23:23:37 tux-35-217 sshd\[6899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.227.49 ... |
2019-07-21 05:25:28 |
| 218.72.174.16 | attackbots | Unauthorized connection attempt from IP address 218.72.174.16 on Port 445(SMB) |
2019-07-21 05:31:16 |
| 175.140.189.36 | attack | Automatic report - Port Scan Attack |
2019-07-21 05:20:53 |