城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.107.104.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.107.104.102. IN A
;; AUTHORITY SECTION:
. 198 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020082101 1800 900 604800 86400
;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 22 12:28:36 CST 2020
;; MSG SIZE rcvd: 118
Host 102.104.107.49.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 102.104.107.49.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
154.194.3.125 | attackbots | Nov 29 18:02:00 ns3042688 sshd\[32724\]: Invalid user server from 154.194.3.125 Nov 29 18:02:00 ns3042688 sshd\[32724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.194.3.125 Nov 29 18:02:02 ns3042688 sshd\[32724\]: Failed password for invalid user server from 154.194.3.125 port 42080 ssh2 Nov 29 18:05:32 ns3042688 sshd\[1239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.194.3.125 user=root Nov 29 18:05:35 ns3042688 sshd\[1239\]: Failed password for root from 154.194.3.125 port 50260 ssh2 ... |
2019-11-30 01:12:52 |
61.58.101.227 | attack | port scan and connect, tcp 23 (telnet) |
2019-11-30 01:36:27 |
112.85.195.161 | attackbotsspam | Nov 29 15:52:05 mxgate1 postfix/postscreen[25060]: CONNECT from [112.85.195.161]:4691 to [176.31.12.44]:25 Nov 29 15:52:05 mxgate1 postfix/dnsblog[25079]: addr 112.85.195.161 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 29 15:52:05 mxgate1 postfix/dnsblog[25079]: addr 112.85.195.161 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 29 15:52:05 mxgate1 postfix/dnsblog[25079]: addr 112.85.195.161 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 29 15:52:05 mxgate1 postfix/dnsblog[25061]: addr 112.85.195.161 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 29 15:52:05 mxgate1 postfix/dnsblog[25064]: addr 112.85.195.161 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 29 15:52:11 mxgate1 postfix/postscreen[25060]: DNSBL rank 4 for [112.85.195.161]:4691 Nov x@x Nov 29 15:52:13 mxgate1 postfix/postscreen[25060]: DISCONNECT [112.85.195.161]:4691 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=112.85.195.161 |
2019-11-30 01:35:19 |
185.175.93.25 | attackbots | 11/29/2019-16:11:37.029659 185.175.93.25 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-30 01:33:56 |
159.89.165.7 | attackbots | Lines containing failures of 159.89.165.7 Nov 29 15:55:37 shared02 sshd[32623]: Invalid user bianca from 159.89.165.7 port 54460 Nov 29 15:55:37 shared02 sshd[32623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.165.7 Nov 29 15:55:39 shared02 sshd[32623]: Failed password for invalid user bianca from 159.89.165.7 port 54460 ssh2 Nov 29 15:55:40 shared02 sshd[32623]: Received disconnect from 159.89.165.7 port 54460:11: Bye Bye [preauth] Nov 29 15:55:40 shared02 sshd[32623]: Disconnected from invalid user bianca 159.89.165.7 port 54460 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=159.89.165.7 |
2019-11-30 01:51:21 |
185.143.223.81 | attack | Nov 29 17:12:58 h2177944 kernel: \[7919252.569727\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=53849 PROTO=TCP SPT=48939 DPT=10671 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 29 17:13:38 h2177944 kernel: \[7919292.683427\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=51415 PROTO=TCP SPT=48939 DPT=21559 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 29 17:16:23 h2177944 kernel: \[7919457.881591\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=54350 PROTO=TCP SPT=48939 DPT=57210 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 29 17:22:08 h2177944 kernel: \[7919802.825236\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=63330 PROTO=TCP SPT=48939 DPT=63195 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 29 17:28:49 h2177944 kernel: \[7920203.297554\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.223.81 DST=85. |
2019-11-30 01:23:48 |
163.172.191.192 | attack | Nov 29 17:11:24 zeus sshd[21536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.191.192 Nov 29 17:11:27 zeus sshd[21536]: Failed password for invalid user test from 163.172.191.192 port 43918 ssh2 Nov 29 17:14:36 zeus sshd[21584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.191.192 Nov 29 17:14:37 zeus sshd[21584]: Failed password for invalid user test from 163.172.191.192 port 52132 ssh2 |
2019-11-30 01:28:50 |
218.92.206.106 | attackbots | TCP src-port=2090 dst-port=25 Listed on dnsbl-sorbs abuseat-org barracuda (Project Honey Pot rated Suspicious) (543) |
2019-11-30 01:47:32 |
116.239.104.143 | attack | Nov 29 09:45:36 eola postfix/smtpd[17528]: connect from unknown[116.239.104.143] Nov 29 09:45:37 eola postfix/smtpd[17528]: lost connection after AUTH from unknown[116.239.104.143] Nov 29 09:45:37 eola postfix/smtpd[17528]: disconnect from unknown[116.239.104.143] ehlo=1 auth=0/1 commands=1/2 Nov 29 09:45:37 eola postfix/smtpd[17528]: connect from unknown[116.239.104.143] Nov 29 09:45:38 eola postfix/smtpd[17528]: lost connection after AUTH from unknown[116.239.104.143] Nov 29 09:45:38 eola postfix/smtpd[17528]: disconnect from unknown[116.239.104.143] ehlo=1 auth=0/1 commands=1/2 Nov 29 09:45:41 eola postfix/smtpd[17528]: connect from unknown[116.239.104.143] Nov 29 09:45:43 eola postfix/smtpd[17528]: lost connection after AUTH from unknown[116.239.104.143] Nov 29 09:45:43 eola postfix/smtpd[17528]: disconnect from unknown[116.239.104.143] ehlo=1 auth=0/1 commands=1/2 Nov 29 09:45:43 eola postfix/smtpd[17528]: connect from unknown[116.239.104.143] Nov 29 09:46:41 eola ........ ------------------------------- |
2019-11-30 01:31:14 |
91.121.7.155 | attack | Nov 29 18:25:04 fr01 sshd[28013]: Invalid user http from 91.121.7.155 Nov 29 18:25:04 fr01 sshd[28013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.7.155 Nov 29 18:25:04 fr01 sshd[28013]: Invalid user http from 91.121.7.155 Nov 29 18:25:06 fr01 sshd[28013]: Failed password for invalid user http from 91.121.7.155 port 55238 ssh2 Nov 29 18:28:32 fr01 sshd[28570]: Invalid user frants from 91.121.7.155 ... |
2019-11-30 01:41:44 |
139.59.84.111 | attack | Nov 29 16:11:52 lnxded64 sshd[13721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.111 |
2019-11-30 01:24:16 |
112.158.210.167 | attack | port scan/probe/communication attempt |
2019-11-30 01:14:41 |
103.56.113.69 | attack | $f2bV_matches |
2019-11-30 01:37:18 |
119.29.16.76 | attack | Invalid user norma from 119.29.16.76 port 53397 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.16.76 Failed password for invalid user norma from 119.29.16.76 port 53397 ssh2 Invalid user chatoian from 119.29.16.76 port 4881 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.16.76 |
2019-11-30 01:27:16 |
92.63.196.10 | attack | TCP Port Scanning |
2019-11-30 01:19:38 |