城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.214.119.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1324
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.214.119.47. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 01:29:29 CST 2025
;; MSG SIZE rcvd: 106
Host 47.119.214.48.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 47.119.214.48.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.243.136.198 | attack | 1597550186 - 08/16/2020 05:56:26 Host: 14.243.136.198/14.243.136.198 Port: 445 TCP Blocked |
2020-08-16 13:33:38 |
| 62.210.194.9 | attackspam | Aug 16 06:28:59 mail.srvfarm.net postfix/smtpd[1913747]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] Aug 16 06:32:26 mail.srvfarm.net postfix/smtpd[1931088]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] Aug 16 06:35:38 mail.srvfarm.net postfix/smtpd[1931990]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] Aug 16 06:36:43 mail.srvfarm.net postfix/smtpd[1924776]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] Aug 16 06:38:05 mail.srvfarm.net postfix/smtpd[1931086]: lost connection after STARTTLS from r9.news.eu.rvca.com[62.210.194.9] |
2020-08-16 13:24:19 |
| 123.22.212.99 | attackbotsspam | 2020-08-15T21:56:10.328162linuxbox-skyline sshd[126580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.22.212.99 user=root 2020-08-15T21:56:12.330047linuxbox-skyline sshd[126580]: Failed password for root from 123.22.212.99 port 47586 ssh2 ... |
2020-08-16 13:44:15 |
| 80.82.154.141 | attackbotsspam | Aug 16 05:00:35 mail.srvfarm.net postfix/smtps/smtpd[1870327]: warning: unknown[80.82.154.141]: SASL PLAIN authentication failed: Aug 16 05:00:35 mail.srvfarm.net postfix/smtps/smtpd[1870327]: lost connection after AUTH from unknown[80.82.154.141] Aug 16 05:04:38 mail.srvfarm.net postfix/smtps/smtpd[1870325]: warning: unknown[80.82.154.141]: SASL PLAIN authentication failed: Aug 16 05:04:38 mail.srvfarm.net postfix/smtps/smtpd[1870325]: lost connection after AUTH from unknown[80.82.154.141] Aug 16 05:08:27 mail.srvfarm.net postfix/smtps/smtpd[1887813]: warning: unknown[80.82.154.141]: SASL PLAIN authentication failed: |
2020-08-16 13:23:17 |
| 74.82.47.5 | attackbotsspam | [Sun Aug 16 11:35:45.596314 2020] [:error] [pid 10842:tid 140592449312512] [client 74.82.47.5:28412] [client 74.82.47.5] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/"] [unique_id "Xzi3oaQvHzFcjSCDXQIEBAAAAfE"] ... |
2020-08-16 13:57:08 |
| 66.98.69.52 | attackbots | Unauthorized IMAP connection attempt |
2020-08-16 13:32:18 |
| 185.220.101.200 | attackspam | Invalid user admin from 185.220.101.200 port 6318 |
2020-08-16 13:46:14 |
| 62.210.194.6 | attackbots | Aug 16 06:28:58 mail.srvfarm.net postfix/smtpd[1913728]: lost connection after STARTTLS from r6.news.eu.rvca.com[62.210.194.6] Aug 16 06:32:25 mail.srvfarm.net postfix/smtpd[1929155]: lost connection after STARTTLS from r6.news.eu.rvca.com[62.210.194.6] Aug 16 06:35:37 mail.srvfarm.net postfix/smtpd[1924776]: lost connection after STARTTLS from r6.news.eu.rvca.com[62.210.194.6] Aug 16 06:36:42 mail.srvfarm.net postfix/smtpd[1931084]: lost connection after STARTTLS from r6.news.eu.rvca.com[62.210.194.6] Aug 16 06:38:04 mail.srvfarm.net postfix/smtpd[1931084]: lost connection after STARTTLS from r6.news.eu.rvca.com[62.210.194.6] |
2020-08-16 13:25:16 |
| 41.79.19.195 | attack | Aug 16 05:06:59 mail.srvfarm.net postfix/smtps/smtpd[1887813]: warning: unknown[41.79.19.195]: SASL PLAIN authentication failed: Aug 16 05:06:59 mail.srvfarm.net postfix/smtps/smtpd[1887813]: lost connection after AUTH from unknown[41.79.19.195] Aug 16 05:08:07 mail.srvfarm.net postfix/smtpd[1887547]: warning: unknown[41.79.19.195]: SASL PLAIN authentication failed: Aug 16 05:08:07 mail.srvfarm.net postfix/smtpd[1887547]: lost connection after AUTH from unknown[41.79.19.195] Aug 16 05:15:38 mail.srvfarm.net postfix/smtpd[1887547]: warning: unknown[41.79.19.195]: SASL PLAIN authentication failed: |
2020-08-16 13:28:18 |
| 212.64.77.173 | attackspambots | 2020-08-16T10:52:14.168589hostname sshd[22547]: Failed password for root from 212.64.77.173 port 46632 ssh2 2020-08-16T10:56:25.774304hostname sshd[24124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.77.173 user=root 2020-08-16T10:56:27.841691hostname sshd[24124]: Failed password for root from 212.64.77.173 port 34546 ssh2 ... |
2020-08-16 13:31:13 |
| 14.144.60.72 | attack | Automatic report - Port Scan Attack |
2020-08-16 13:29:44 |
| 45.67.234.29 | attackspam | From returns@simpleseunico.live Sun Aug 16 00:56:22 2020 Received: from simpmx5.simpleseunico.live ([45.67.234.29]:38225) |
2020-08-16 13:37:02 |
| 80.82.77.33 | attackspambots | srv02 Mass scanning activity detected Target: 9000 .. |
2020-08-16 13:23:47 |
| 106.12.94.186 | attackbotsspam | Aug 16 05:56:24 db sshd[21419]: User root from 106.12.94.186 not allowed because none of user's groups are listed in AllowGroups ... |
2020-08-16 13:35:41 |
| 37.59.47.61 | attackspam | 37.59.47.61 - - [16/Aug/2020:06:41:10 +0100] "POST /wp-login.php HTTP/1.1" 200 5249 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 37.59.47.61 - - [16/Aug/2020:06:42:55 +0100] "POST /wp-login.php HTTP/1.1" 200 5249 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 37.59.47.61 - - [16/Aug/2020:06:47:54 +0100] "POST /wp-login.php HTTP/1.1" 200 5249 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" ... |
2020-08-16 13:59:36 |