城市(city): Taichung
省份(region): Taichung
国家(country): Taiwan, China
运营商(isp): Taiwan Mobile
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.217.42.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;49.217.42.3. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025042301 1800 900 604800 86400
;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 24 05:41:57 CST 2025
;; MSG SIZE rcvd: 104
Host 3.42.217.49.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 3.42.217.49.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 123.160.220.36 | attack | Aug 1 05:19:58 mail kernel: \[1890838.484982\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=123.160.220.36 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=3880 DF PROTO=TCP SPT=58675 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 Aug 1 05:20:01 mail kernel: \[1890841.573183\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=123.160.220.36 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=9006 DF PROTO=TCP SPT=58675 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 Aug 1 05:20:07 mail kernel: \[1890847.578966\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=123.160.220.36 DST=91.205.173.180 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=13437 DF PROTO=TCP SPT=58675 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 |
2019-08-01 20:25:03 |
| 35.196.106.197 | attackbotsspam | Wordpress Admin Login attack |
2019-08-01 20:28:46 |
| 187.162.225.142 | attackbotsspam | 19/7/31@23:18:17: FAIL: Alarm-Intrusion address from=187.162.225.142 ... |
2019-08-01 21:26:55 |
| 77.222.187.166 | attackbotsspam | DATE:2019-08-01 05:18:48, IP:77.222.187.166, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-08-01 21:13:41 |
| 120.92.133.21 | attack | Jul 29 15:52:49 typhoon sshd[17552]: Failed password for invalid user malcom from 120.92.133.21 port 43692 ssh2 Jul 29 15:52:49 typhoon sshd[17552]: Received disconnect from 120.92.133.21: 11: Bye Bye [preauth] Jul 29 16:01:08 typhoon sshd[17569]: Failed password for invalid user spotlight from 120.92.133.21 port 20780 ssh2 Jul 29 16:01:08 typhoon sshd[17569]: Received disconnect from 120.92.133.21: 11: Bye Bye [preauth] Jul 29 16:05:37 typhoon sshd[17579]: Failed password for invalid user stalin from 120.92.133.21 port 52128 ssh2 Jul 29 16:05:38 typhoon sshd[17579]: Received disconnect from 120.92.133.21: 11: Bye Bye [preauth] Jul 29 16:08:46 typhoon sshd[17585]: Failed password for invalid user deployment from 120.92.133.21 port 18962 ssh2 Jul 29 16:08:46 typhoon sshd[17585]: Received disconnect from 120.92.133.21: 11: Bye Bye [preauth] Jul 29 16:12:02 typhoon sshd[17596]: Failed password for invalid user pych from 120.92.133.21 port 50306 ssh2 Jul 29 16:12:02 typhoon........ ------------------------------- |
2019-08-01 20:42:04 |
| 188.131.154.248 | attackspam | Invalid user servercsgo from 188.131.154.248 port 35048 |
2019-08-01 21:09:29 |
| 46.105.227.206 | attackspam | [Aegis] @ 2019-05-24 01:26:31 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-08-01 20:54:10 |
| 175.143.96.177 | attackspambots | 175.143.96.177 - - [01/Aug/2019:05:18:56 +0200] "GET /wp-login.php HTTP/1.1" 302 573 ... |
2019-08-01 21:10:33 |
| 180.126.239.159 | attackspam | port scan and connect, tcp 22 (ssh) |
2019-08-01 21:09:51 |
| 159.65.14.198 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2019-08-01 20:34:56 |
| 177.130.163.209 | attackbots | libpam_shield report: forced login attempt |
2019-08-01 20:39:43 |
| 123.57.34.176 | attackbotsspam | Brute force SMTP login attempts. |
2019-08-01 21:13:07 |
| 187.44.113.33 | attack | Aug 1 03:20:03 unicornsoft sshd\[17516\]: Invalid user user from 187.44.113.33 Aug 1 03:20:03 unicornsoft sshd\[17516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.44.113.33 Aug 1 03:20:05 unicornsoft sshd\[17516\]: Failed password for invalid user user from 187.44.113.33 port 48662 ssh2 |
2019-08-01 20:26:16 |
| 191.180.225.191 | attackspambots | Aug 1 15:06:32 ns41 sshd[1963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.180.225.191 Aug 1 15:06:34 ns41 sshd[1963]: Failed password for invalid user slj from 191.180.225.191 port 60500 ssh2 Aug 1 15:12:17 ns41 sshd[2279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.180.225.191 |
2019-08-01 21:24:00 |
| 120.52.152.15 | attack | 01.08.2019 12:55:20 Connection to port 49155 blocked by firewall |
2019-08-01 21:17:21 |