城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.102.112.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53971
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.102.112.93. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019052600 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 26 14:27:50 CST 2019
;; MSG SIZE rcvd: 117
Host 93.112.102.52.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 93.112.102.52.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 52.35.136.194 | attackspam | 11/26/2019-18:16:02.795981 52.35.136.194 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-11-27 01:16:11 |
| 142.44.184.79 | attackspam | Nov 26 07:05:28 php1 sshd\[13022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.79 user=root Nov 26 07:05:31 php1 sshd\[13022\]: Failed password for root from 142.44.184.79 port 49812 ssh2 Nov 26 07:11:51 php1 sshd\[13644\]: Invalid user lena from 142.44.184.79 Nov 26 07:11:51 php1 sshd\[13644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.79 Nov 26 07:11:53 php1 sshd\[13644\]: Failed password for invalid user lena from 142.44.184.79 port 59178 ssh2 |
2019-11-27 01:51:31 |
| 175.204.91.168 | attackspam | 2019-11-26T17:57:37.514762tmaserv sshd\[5577\]: Failed password for root from 175.204.91.168 port 43366 ssh2 2019-11-26T18:57:40.426349tmaserv sshd\[8381\]: Invalid user squid from 175.204.91.168 port 45798 2019-11-26T18:57:40.431262tmaserv sshd\[8381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.204.91.168 2019-11-26T18:57:42.466755tmaserv sshd\[8381\]: Failed password for invalid user squid from 175.204.91.168 port 45798 ssh2 2019-11-26T19:04:53.181769tmaserv sshd\[8712\]: Invalid user dieplinger from 175.204.91.168 port 53148 2019-11-26T19:04:53.190611tmaserv sshd\[8712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.204.91.168 ... |
2019-11-27 01:28:56 |
| 103.122.168.134 | attack | Telnet Server BruteForce Attack |
2019-11-27 01:42:28 |
| 151.52.255.132 | attack | 3389BruteforceFW21 |
2019-11-27 01:15:54 |
| 222.186.180.41 | attack | Nov 26 18:48:10 dedicated sshd[13613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41 user=root Nov 26 18:48:12 dedicated sshd[13613]: Failed password for root from 222.186.180.41 port 30850 ssh2 |
2019-11-27 01:50:22 |
| 154.205.181.150 | attackspam | Nov 26 15:28:42 mxgate1 postfix/postscreen[6065]: CONNECT from [154.205.181.150]:54622 to [176.31.12.44]:25 Nov 26 15:28:42 mxgate1 postfix/dnsblog[6431]: addr 154.205.181.150 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 26 15:28:42 mxgate1 postfix/dnsblog[6422]: addr 154.205.181.150 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 26 15:28:48 mxgate1 postfix/postscreen[6065]: DNSBL rank 3 for [154.205.181.150]:54622 Nov x@x Nov 26 15:28:49 mxgate1 postfix/postscreen[6065]: DISCONNECT [154.205.181.150]:54622 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=154.205.181.150 |
2019-11-27 01:39:16 |
| 180.124.236.194 | attackspam | Nov 26 15:35:05 mxgate1 postfix/postscreen[7222]: CONNECT from [180.124.236.194]:4613 to [176.31.12.44]:25 Nov 26 15:35:06 mxgate1 postfix/dnsblog[7226]: addr 180.124.236.194 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 26 15:35:06 mxgate1 postfix/dnsblog[7226]: addr 180.124.236.194 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 26 15:35:06 mxgate1 postfix/dnsblog[7227]: addr 180.124.236.194 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 26 15:35:06 mxgate1 postfix/dnsblog[7224]: addr 180.124.236.194 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 26 15:35:11 mxgate1 postfix/postscreen[7222]: DNSBL rank 4 for [180.124.236.194]:4613 Nov x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=180.124.236.194 |
2019-11-27 01:51:05 |
| 110.34.28.99 | attack | Unauthorised access (Nov 26) SRC=110.34.28.99 LEN=40 PREC=0x20 TTL=240 ID=18407 DF TCP DPT=23 WINDOW=14600 SYN |
2019-11-27 01:34:57 |
| 89.110.0.251 | attackbots | Countless attempt to break FTP password. |
2019-11-27 01:29:59 |
| 218.94.144.101 | attack | Port 1433 Scan |
2019-11-27 01:28:05 |
| 180.164.100.170 | attack | Nov 26 09:28:14 eola postfix/smtpd[10040]: connect from unknown[180.164.100.170] Nov 26 09:28:14 eola postfix/smtpd[10040]: lost connection after AUTH from unknown[180.164.100.170] Nov 26 09:28:14 eola postfix/smtpd[10040]: disconnect from unknown[180.164.100.170] ehlo=1 auth=0/1 commands=1/2 Nov 26 09:28:15 eola postfix/smtpd[10040]: connect from unknown[180.164.100.170] Nov 26 09:28:15 eola postfix/smtpd[10040]: lost connection after AUTH from unknown[180.164.100.170] Nov 26 09:28:15 eola postfix/smtpd[10040]: disconnect from unknown[180.164.100.170] ehlo=1 auth=0/1 commands=1/2 Nov 26 09:28:16 eola postfix/smtpd[10040]: connect from unknown[180.164.100.170] Nov 26 09:28:17 eola postfix/smtpd[10040]: lost connection after AUTH from unknown[180.164.100.170] Nov 26 09:28:17 eola postfix/smtpd[10040]: disconnect from unknown[180.164.100.170] ehlo=1 auth=0/1 commands=1/2 Nov 26 09:28:17 eola postfix/smtpd[10040]: connect from unknown[180.164.100.170] Nov 26 09:28:18 eola ........ ------------------------------- |
2019-11-27 01:35:16 |
| 193.31.24.113 | attack | 11/26/2019-18:00:51.689659 193.31.24.113 Protocol: 6 ET GAMES MINECRAFT Server response outbound |
2019-11-27 01:11:02 |
| 220.92.16.78 | attack | Nov 26 17:11:14 marvibiene sshd[23355]: Invalid user postgres from 220.92.16.78 port 43634 Nov 26 17:11:14 marvibiene sshd[23355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.92.16.78 Nov 26 17:11:14 marvibiene sshd[23355]: Invalid user postgres from 220.92.16.78 port 43634 Nov 26 17:11:16 marvibiene sshd[23355]: Failed password for invalid user postgres from 220.92.16.78 port 43634 ssh2 ... |
2019-11-27 01:43:22 |
| 121.168.115.36 | attack | Invalid user seamark from 121.168.115.36 port 42788 |
2019-11-27 01:51:54 |