城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.133.21.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.133.21.111. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:44:30 CST 2025
;; MSG SIZE rcvd: 106
Host 111.21.133.48.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 111.21.133.48.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
109.116.41.238 | attackbotsspam | 109.116.41.238 (IT/Italy/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 12 05:01:42 jbs1 sshd[16386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.128.20.226 user=root Sep 12 04:51:09 jbs1 sshd[12527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.122.5.6 user=root Sep 12 04:51:11 jbs1 sshd[12527]: Failed password for root from 112.122.5.6 port 48264 ssh2 Sep 12 05:01:40 jbs1 sshd[16390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.41.238 user=root Sep 12 05:00:33 jbs1 sshd[15940]: Failed password for root from 93.149.79.247 port 39321 ssh2 IP Addresses Blocked: 222.128.20.226 (CN/China/-) 112.122.5.6 (CN/China/-) |
2020-09-12 21:02:54 |
211.219.18.186 | attackspam | 211.219.18.186 (KR/South Korea/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 12 07:06:28 jbs1 sshd[7581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.219.18.186 user=root Sep 12 07:04:11 jbs1 sshd[6889]: Failed password for root from 61.221.64.6 port 51072 ssh2 Sep 12 07:04:15 jbs1 sshd[6937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.167.116 user=root Sep 12 07:04:17 jbs1 sshd[6937]: Failed password for root from 163.172.167.116 port 37504 ssh2 Sep 12 07:04:20 jbs1 sshd[6944]: Failed password for root from 51.255.172.77 port 44888 ssh2 IP Addresses Blocked: |
2020-09-12 21:13:23 |
222.186.190.2 | attackspambots | 2020-09-12T16:25:13.857771afi-git.jinr.ru sshd[9663]: Failed password for root from 222.186.190.2 port 61888 ssh2 2020-09-12T16:25:17.099562afi-git.jinr.ru sshd[9663]: Failed password for root from 222.186.190.2 port 61888 ssh2 2020-09-12T16:25:20.752783afi-git.jinr.ru sshd[9663]: Failed password for root from 222.186.190.2 port 61888 ssh2 2020-09-12T16:25:20.752915afi-git.jinr.ru sshd[9663]: error: maximum authentication attempts exceeded for root from 222.186.190.2 port 61888 ssh2 [preauth] 2020-09-12T16:25:20.752928afi-git.jinr.ru sshd[9663]: Disconnecting: Too many authentication failures [preauth] ... |
2020-09-12 21:25:49 |
200.219.207.42 | attack | (sshd) Failed SSH login from 200.219.207.42 (BR/Brazil/static.200.219.207.42.datacenter1.com.br): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Sep 12 06:19:25 honeypot sshd[22726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.219.207.42 user=root Sep 12 06:19:28 honeypot sshd[22726]: Failed password for root from 200.219.207.42 port 36760 ssh2 Sep 12 06:24:18 honeypot sshd[22764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.219.207.42 user=root |
2020-09-12 21:29:14 |
145.239.78.59 | attackbotsspam | Sep 12 09:08:15 ny01 sshd[5040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.78.59 Sep 12 09:08:17 ny01 sshd[5040]: Failed password for invalid user trial142145128 from 145.239.78.59 port 60272 ssh2 Sep 12 09:11:03 ny01 sshd[5451]: Failed password for root from 145.239.78.59 port 49858 ssh2 |
2020-09-12 21:22:47 |
170.84.15.226 | attackspambots | Automatic report - Port Scan Attack |
2020-09-12 21:00:12 |
124.193.224.11 | attackspam | Sep 12 14:31:20 host1 sshd[317201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.193.224.11 user=root Sep 12 14:31:21 host1 sshd[317201]: Failed password for root from 124.193.224.11 port 52674 ssh2 Sep 12 14:31:40 host1 sshd[317201]: error: maximum authentication attempts exceeded for root from 124.193.224.11 port 52674 ssh2 [preauth] Sep 12 14:31:42 host1 sshd[317341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.193.224.11 user=root Sep 12 14:31:44 host1 sshd[317341]: Failed password for root from 124.193.224.11 port 65297 ssh2 ... |
2020-09-12 21:15:55 |
118.24.7.98 | attackspam | Sep 12 15:02:18 lnxweb62 sshd[3737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.7.98 Sep 12 15:02:18 lnxweb62 sshd[3737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.7.98 |
2020-09-12 21:29:35 |
159.65.11.115 | attackspam | (sshd) Failed SSH login from 159.65.11.115 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 12 08:33:15 server sshd[26064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.11.115 user=root Sep 12 08:33:17 server sshd[26064]: Failed password for root from 159.65.11.115 port 33412 ssh2 Sep 12 08:37:54 server sshd[27153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.11.115 user=root Sep 12 08:37:56 server sshd[27153]: Failed password for root from 159.65.11.115 port 37422 ssh2 Sep 12 08:40:55 server sshd[28035]: Invalid user ftpd from 159.65.11.115 port 53666 |
2020-09-12 20:58:38 |
164.132.103.232 | attackspam | 2020-09-12T16:58:47.065034hostname sshd[20723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=232.ip-164-132-103.eu user=root 2020-09-12T16:58:48.621692hostname sshd[20723]: Failed password for root from 164.132.103.232 port 46784 ssh2 ... |
2020-09-12 21:12:18 |
62.173.149.5 | attackbots | [2020-09-12 09:04:38] NOTICE[1239][C-000022af] chan_sip.c: Call from '' (62.173.149.5:57806) to extension '801112062587273' rejected because extension not found in context 'public'. [2020-09-12 09:04:38] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-12T09:04:38.756-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="801112062587273",SessionID="0x7f4d480d6c18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.173.149.5/57806",ACLName="no_extension_match" [2020-09-12 09:04:58] NOTICE[1239][C-000022b3] chan_sip.c: Call from '' (62.173.149.5:61751) to extension '912062587273' rejected because extension not found in context 'public'. [2020-09-12 09:04:58] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-12T09:04:58.581-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="912062587273",SessionID="0x7f4d482e4338",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.173.14 ... |
2020-09-12 21:07:55 |
13.85.152.27 | attackbotsspam | Sep 12 11:42:30 XXXXXX sshd[37506]: Invalid user ec2-user from 13.85.152.27 port 38212 |
2020-09-12 20:57:25 |
218.92.0.171 | attackspam | " " |
2020-09-12 21:32:26 |
157.45.29.243 | attackbots | 20/9/11@12:57:40: FAIL: Alarm-Intrusion address from=157.45.29.243 20/9/11@12:57:41: FAIL: Alarm-Intrusion address from=157.45.29.243 ... |
2020-09-12 21:30:27 |
123.241.52.94 | attackspambots | Automatic report - Port Scan Attack |
2020-09-12 21:29:50 |