城市(city): unknown
省份(region): unknown
国家(country): Korea (the Republic of)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.120.68.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11157
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.120.68.172. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 18:10:24 CST 2025
;; MSG SIZE rcvd: 106
Host 172.68.120.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 172.68.120.45.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 175.211.112.254 | attack | Automatic report - Banned IP Access |
2019-10-28 17:23:19 |
| 213.79.125.30 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-10-28 17:33:44 |
| 68.116.41.6 | attack | 2019-10-22T18:54:28.612172ns525875 sshd\[17468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68-116-41-6.static.mdfd.or.charter.com user=root 2019-10-22T18:54:30.730055ns525875 sshd\[17468\]: Failed password for root from 68.116.41.6 port 57890 ssh2 2019-10-22T18:58:23.375733ns525875 sshd\[22280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68-116-41-6.static.mdfd.or.charter.com user=root 2019-10-22T18:58:25.422615ns525875 sshd\[22280\]: Failed password for root from 68.116.41.6 port 42762 ssh2 2019-10-22T19:02:15.404821ns525875 sshd\[27083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68-116-41-6.static.mdfd.or.charter.com user=root 2019-10-22T19:02:17.301751ns525875 sshd\[27083\]: Failed password for root from 68.116.41.6 port 55872 ssh2 2019-10-22T19:06:01.003728ns525875 sshd\[31587\]: pam_unix\(sshd:auth\): authentication failure\; logna ... |
2019-10-28 17:25:01 |
| 104.248.121.67 | attackbotsspam | Oct 28 08:30:00 OPSO sshd\[26054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67 user=root Oct 28 08:30:01 OPSO sshd\[26054\]: Failed password for root from 104.248.121.67 port 49793 ssh2 Oct 28 08:34:01 OPSO sshd\[26878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67 user=root Oct 28 08:34:03 OPSO sshd\[26878\]: Failed password for root from 104.248.121.67 port 40743 ssh2 Oct 28 08:37:52 OPSO sshd\[27610\]: Invalid user qhsupport from 104.248.121.67 port 59926 Oct 28 08:37:52 OPSO sshd\[27610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67 |
2019-10-28 17:42:45 |
| 94.51.195.255 | attackspambots | Fail2Ban Ban Triggered |
2019-10-28 17:30:50 |
| 223.79.182.71 | attackspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-10-28 17:15:18 |
| 200.108.143.6 | attackbots | 2019-10-18T11:11:33.596172ns525875 sshd\[9090\]: Invalid user odilon from 200.108.143.6 port 60574 2019-10-18T11:11:33.597758ns525875 sshd\[9090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6 2019-10-18T11:11:35.163872ns525875 sshd\[9090\]: Failed password for invalid user odilon from 200.108.143.6 port 60574 ssh2 2019-10-18T11:16:14.179147ns525875 sshd\[15081\]: Invalid user wp-user from 200.108.143.6 port 42632 2019-10-18T11:16:14.183177ns525875 sshd\[15081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6 2019-10-18T11:16:15.990386ns525875 sshd\[15081\]: Failed password for invalid user wp-user from 200.108.143.6 port 42632 ssh2 2019-10-18T11:20:49.319521ns525875 sshd\[20676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.143.6 user=root 2019-10-18T11:20:50.880580ns525875 sshd\[20676\]: Failed password for root ... |
2019-10-28 17:45:44 |
| 123.31.31.68 | attackbots | 2019-10-24T21:19:37.748860ns525875 sshd\[25136\]: Invalid user admin from 123.31.31.68 port 46122 2019-10-24T21:19:37.755103ns525875 sshd\[25136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.31.68 2019-10-24T21:19:39.894674ns525875 sshd\[25136\]: Failed password for invalid user admin from 123.31.31.68 port 46122 ssh2 2019-10-24T21:23:45.883426ns525875 sshd\[27825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.31.68 user=root 2019-10-24T21:23:48.069294ns525875 sshd\[27825\]: Failed password for root from 123.31.31.68 port 56058 ssh2 2019-10-24T21:27:46.162141ns525875 sshd\[30499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.31.68 user=root 2019-10-24T21:27:47.765962ns525875 sshd\[30499\]: Failed password for root from 123.31.31.68 port 37742 ssh2 2019-10-24T21:31:52.465068ns525875 sshd\[904\]: pam_unix\(sshd:auth\): authen ... |
2019-10-28 17:10:24 |
| 138.197.5.224 | attackbots | 138.197.5.224 - - [28/Oct/2019:06:48:20 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.197.5.224 - - [28/Oct/2019:06:48:20 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.197.5.224 - - [28/Oct/2019:06:48:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.197.5.224 - - [28/Oct/2019:06:48:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.197.5.224 - - [28/Oct/2019:06:48:21 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 138.197.5.224 - - [28/Oct/2019:06:48:21 +0100] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-10-28 17:39:40 |
| 193.112.108.135 | attackspambots | $f2bV_matches |
2019-10-28 17:38:20 |
| 120.70.101.103 | attackspambots | Oct 28 07:14:32 mail sshd[10122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103 user=root Oct 28 07:14:34 mail sshd[10122]: Failed password for root from 120.70.101.103 port 33717 ssh2 Oct 28 07:23:04 mail sshd[11107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103 user=root Oct 28 07:23:06 mail sshd[11107]: Failed password for root from 120.70.101.103 port 60179 ssh2 Oct 28 07:27:46 mail sshd[11680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.101.103 user=root Oct 28 07:27:47 mail sshd[11680]: Failed password for root from 120.70.101.103 port 49599 ssh2 ... |
2019-10-28 17:38:58 |
| 54.39.138.246 | attackbots | 2019-10-11T06:35:14.505186ns525875 sshd\[31127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip246.ip-54-39-138.net user=root 2019-10-11T06:35:15.886647ns525875 sshd\[31127\]: Failed password for root from 54.39.138.246 port 46112 ssh2 2019-10-11T06:38:45.274874ns525875 sshd\[3145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip246.ip-54-39-138.net user=root 2019-10-11T06:38:47.292728ns525875 sshd\[3145\]: Failed password for root from 54.39.138.246 port 56956 ssh2 2019-10-11T06:42:15.997622ns525875 sshd\[7383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip246.ip-54-39-138.net user=root 2019-10-11T06:42:17.846209ns525875 sshd\[7383\]: Failed password for root from 54.39.138.246 port 39564 ssh2 2019-10-11T06:45:43.154991ns525875 sshd\[11528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip246.ip ... |
2019-10-28 17:16:57 |
| 128.199.52.45 | attackbots | 2019-10-06T20:45:43.879414ns525875 sshd\[24899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45 user=root 2019-10-06T20:45:45.914681ns525875 sshd\[24899\]: Failed password for root from 128.199.52.45 port 59318 ssh2 2019-10-06T20:50:23.209584ns525875 sshd\[30554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45 user=root 2019-10-06T20:50:24.683100ns525875 sshd\[30554\]: Failed password for root from 128.199.52.45 port 42228 ssh2 2019-10-06T20:54:59.716379ns525875 sshd\[3869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.52.45 user=root 2019-10-06T20:55:01.079261ns525875 sshd\[3869\]: Failed password for root from 128.199.52.45 port 53368 ssh2 2019-10-06T20:59:17.783543ns525875 sshd\[9114\]: Invalid user 123 from 128.199.52.45 port 36280 2019-10-06T20:59:17.789461ns525875 sshd\[9114\]: pam_unix\(sshd:auth\): authen ... |
2019-10-28 17:40:32 |
| 157.245.69.186 | attack | WordPress wp-login brute force :: 157.245.69.186 0.124 BYPASS [28/Oct/2019:05:14:14 0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 1525 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-10-28 17:45:01 |
| 106.12.47.216 | attackbotsspam | Oct 28 10:03:32 vpn01 sshd[29586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.47.216 Oct 28 10:03:34 vpn01 sshd[29586]: Failed password for invalid user supervisor from 106.12.47.216 port 44146 ssh2 ... |
2019-10-28 17:42:30 |