城市(city): Yongin-si
省份(region): Gyeonggi-do
国家(country): South Korea
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.170.4.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24863
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;49.170.4.19. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:46:04 CST 2025
;; MSG SIZE rcvd: 104
Host 19.4.170.49.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 19.4.170.49.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.35.168.239 | attackbotsspam | Port scanning [3 denied] |
2020-06-22 13:10:49 |
| 106.13.126.15 | attackbots | Jun 22 06:14:42 OPSO sshd\[816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15 user=root Jun 22 06:14:44 OPSO sshd\[816\]: Failed password for root from 106.13.126.15 port 33896 ssh2 Jun 22 06:18:03 OPSO sshd\[1601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15 user=root Jun 22 06:18:05 OPSO sshd\[1601\]: Failed password for root from 106.13.126.15 port 51060 ssh2 Jun 22 06:21:41 OPSO sshd\[2368\]: Invalid user linda from 106.13.126.15 port 39988 Jun 22 06:21:41 OPSO sshd\[2368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.126.15 |
2020-06-22 12:53:33 |
| 220.78.28.68 | attack | k+ssh-bruteforce |
2020-06-22 12:33:56 |
| 68.69.167.149 | attack | *Port Scan* detected from 68.69.167.149 (US/United States/Utah/Springville/68-69-167-149.utopia.xmission.net). 4 hits in the last 30 seconds |
2020-06-22 12:44:52 |
| 51.161.34.239 | attackbotsspam | Jun 22 05:41:08 ns382633 sshd\[25967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.34.239 user=root Jun 22 05:41:10 ns382633 sshd\[25967\]: Failed password for root from 51.161.34.239 port 45646 ssh2 Jun 22 06:03:51 ns382633 sshd\[29768\]: Invalid user jenkins from 51.161.34.239 port 46062 Jun 22 06:03:51 ns382633 sshd\[29768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.34.239 Jun 22 06:03:53 ns382633 sshd\[29768\]: Failed password for invalid user jenkins from 51.161.34.239 port 46062 ssh2 |
2020-06-22 12:45:27 |
| 209.126.124.203 | attackbotsspam | ssh brute force |
2020-06-22 13:07:13 |
| 112.65.127.154 | attack | Jun 22 06:56:55 ns382633 sshd\[7653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.127.154 user=root Jun 22 06:56:57 ns382633 sshd\[7653\]: Failed password for root from 112.65.127.154 port 10873 ssh2 Jun 22 07:10:05 ns382633 sshd\[9826\]: Invalid user pdx from 112.65.127.154 port 56481 Jun 22 07:10:05 ns382633 sshd\[9826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.65.127.154 Jun 22 07:10:08 ns382633 sshd\[9826\]: Failed password for invalid user pdx from 112.65.127.154 port 56481 ssh2 |
2020-06-22 13:12:17 |
| 109.115.187.31 | attackspam | 2020-06-21T23:33:20.0104691495-001 sshd[50157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.115.187.31 user=root 2020-06-21T23:33:22.2977571495-001 sshd[50157]: Failed password for root from 109.115.187.31 port 40646 ssh2 2020-06-21T23:35:40.5102161495-001 sshd[50278]: Invalid user jason from 109.115.187.31 port 50330 2020-06-21T23:35:40.5142071495-001 sshd[50278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.115.187.31 2020-06-21T23:35:40.5102161495-001 sshd[50278]: Invalid user jason from 109.115.187.31 port 50330 2020-06-21T23:35:42.8218641495-001 sshd[50278]: Failed password for invalid user jason from 109.115.187.31 port 50330 ssh2 ... |
2020-06-22 12:56:04 |
| 49.233.26.75 | attackbotsspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-06-22 12:28:36 |
| 180.249.247.197 | attackspam | 1592798087 - 06/22/2020 05:54:47 Host: 180.249.247.197/180.249.247.197 Port: 445 TCP Blocked |
2020-06-22 13:11:20 |
| 61.164.246.45 | attack | " " |
2020-06-22 12:39:04 |
| 117.50.107.165 | attackspambots | SSH Brute-Forcing (server2) |
2020-06-22 12:43:47 |
| 152.170.251.21 | attackbotsspam | 20/6/21@23:55:16: FAIL: IoT-Telnet address from=152.170.251.21 ... |
2020-06-22 12:35:21 |
| 107.173.40.211 | attackbots | 2020-06-21T21:54:48.049436linuxbox-skyline auth[77967]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=tech rhost=107.173.40.211 ... |
2020-06-22 13:10:24 |
| 45.95.168.176 | attackbots | Jun 22 05:55:07 sd-69548 sshd[2341667]: Unable to negotiate with 45.95.168.176 port 33858: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Jun 22 05:55:18 sd-69548 sshd[2341681]: Unable to negotiate with 45.95.168.176 port 51178: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2020-06-22 12:35:02 |