城市(city): unknown
省份(region): unknown
国家(country): Ireland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.142.81.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.142.81.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 12 19:06:06 CST 2025
;; MSG SIZE rcvd: 106
Host 104.81.142.52.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.81.142.52.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
167.99.7.178 | attackspambots | Sep 23 15:52:16 vtv3 sshd\[6242\]: Invalid user oracle from 167.99.7.178 port 57041 Sep 23 15:52:16 vtv3 sshd\[6242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.7.178 Sep 23 15:52:18 vtv3 sshd\[6242\]: Failed password for invalid user oracle from 167.99.7.178 port 57041 ssh2 Sep 23 15:56:07 vtv3 sshd\[8403\]: Invalid user admin from 167.99.7.178 port 50550 Sep 23 15:56:07 vtv3 sshd\[8403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.7.178 Sep 23 16:06:33 vtv3 sshd\[13539\]: Invalid user kaden from 167.99.7.178 port 54564 Sep 23 16:06:33 vtv3 sshd\[13539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.7.178 Sep 23 16:06:35 vtv3 sshd\[13539\]: Failed password for invalid user kaden from 167.99.7.178 port 54564 ssh2 Sep 23 16:10:06 vtv3 sshd\[15175\]: Invalid user service from 167.99.7.178 port 46492 Sep 23 16:10:06 vtv3 sshd\[15175\]: pam_unix\(sshd: |
2019-09-24 00:45:09 |
104.140.183.186 | attackspambots | 104.140.183.186 - - [23/Sep/2019:08:17:14 -0400] "GET /?page=products&action=view&manufacturerID=1&productID=%2fetc%2fpasswd%00&linkID=3128 HTTP/1.1" 302 - "https://baldwinbrasshardware.com/?page=products&action=view&manufacturerID=1&productID=%2fetc%2fpasswd%00&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-09-24 01:19:36 |
91.194.211.40 | attackspam | Sep 23 14:37:28 srv206 sshd[22422]: Invalid user d from 91.194.211.40 Sep 23 14:37:28 srv206 sshd[22422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.194.211.40 Sep 23 14:37:28 srv206 sshd[22422]: Invalid user d from 91.194.211.40 Sep 23 14:37:30 srv206 sshd[22422]: Failed password for invalid user d from 91.194.211.40 port 38774 ssh2 ... |
2019-09-24 00:49:33 |
116.203.71.239 | attackspambots | Sep 23 06:21:12 hpm sshd\[14626\]: Invalid user zabbix from 116.203.71.239 Sep 23 06:21:12 hpm sshd\[14626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.239.71.203.116.clients.your-server.de Sep 23 06:21:14 hpm sshd\[14626\]: Failed password for invalid user zabbix from 116.203.71.239 port 47144 ssh2 Sep 23 06:25:26 hpm sshd\[15759\]: Invalid user akima from 116.203.71.239 Sep 23 06:25:26 hpm sshd\[15759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.239.71.203.116.clients.your-server.de |
2019-09-24 00:33:55 |
120.205.45.252 | attackbots | Sep 23 15:57:11 ns315508 sshd[15562]: User root from 120.205.45.252 not allowed because not listed in AllowUsers Sep 23 15:57:14 ns315508 sshd[15564]: User root from 120.205.45.252 not allowed because not listed in AllowUsers Sep 23 15:57:16 ns315508 sshd[15566]: User root from 120.205.45.252 not allowed because not listed in AllowUsers ... |
2019-09-24 00:37:03 |
203.160.91.226 | attackbots | Sep 23 15:26:53 ArkNodeAT sshd\[28241\]: Invalid user test from 203.160.91.226 Sep 23 15:26:53 ArkNodeAT sshd\[28241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.91.226 Sep 23 15:26:55 ArkNodeAT sshd\[28241\]: Failed password for invalid user test from 203.160.91.226 port 44316 ssh2 |
2019-09-24 00:48:51 |
23.129.64.211 | attack | Sep 23 14:37:48 rotator sshd\[24174\]: Invalid user admin from 23.129.64.211Sep 23 14:37:51 rotator sshd\[24174\]: Failed password for invalid user admin from 23.129.64.211 port 34332 ssh2Sep 23 14:37:54 rotator sshd\[24174\]: Failed password for invalid user admin from 23.129.64.211 port 34332 ssh2Sep 23 14:37:57 rotator sshd\[24174\]: Failed password for invalid user admin from 23.129.64.211 port 34332 ssh2Sep 23 14:38:00 rotator sshd\[24174\]: Failed password for invalid user admin from 23.129.64.211 port 34332 ssh2Sep 23 14:38:02 rotator sshd\[24174\]: Failed password for invalid user admin from 23.129.64.211 port 34332 ssh2 ... |
2019-09-24 00:27:49 |
185.175.93.105 | attackspambots | 09/23/2019-12:05:16.816258 185.175.93.105 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-09-24 00:46:31 |
148.69.71.241 | attackspambots | Autoban 148.69.71.241 AUTH/CONNECT |
2019-09-24 00:31:36 |
138.219.228.96 | attackbotsspam | Sep 23 16:29:55 mail1 sshd\[6349\]: Invalid user achey from 138.219.228.96 port 40848 Sep 23 16:29:55 mail1 sshd\[6349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.228.96 Sep 23 16:29:57 mail1 sshd\[6349\]: Failed password for invalid user achey from 138.219.228.96 port 40848 ssh2 Sep 23 16:52:11 mail1 sshd\[16405\]: Invalid user cary from 138.219.228.96 port 32896 Sep 23 16:52:11 mail1 sshd\[16405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.219.228.96 ... |
2019-09-24 01:13:35 |
59.124.104.157 | attack | Sep 23 18:15:39 saschabauer sshd[14328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.104.157 Sep 23 18:15:41 saschabauer sshd[14328]: Failed password for invalid user raspberry from 59.124.104.157 port 37249 ssh2 |
2019-09-24 00:33:27 |
218.92.0.193 | attackspambots | SSH Brute-Force reported by Fail2Ban |
2019-09-24 01:18:16 |
191.23.110.20 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/191.23.110.20/ BR - 1H : (770) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN27699 IP : 191.23.110.20 CIDR : 191.23.0.0/17 PREFIX COUNT : 267 UNIQUE IP COUNT : 6569728 WYKRYTE ATAKI Z ASN27699 : 1H - 16 3H - 44 6H - 72 12H - 92 24H - 102 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-09-24 01:09:10 |
178.93.8.47 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/178.93.8.47/ UA - 1H : (213) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : UA NAME ASN : ASN6849 IP : 178.93.8.47 CIDR : 178.93.0.0/18 PREFIX COUNT : 1366 UNIQUE IP COUNT : 1315840 WYKRYTE ATAKI Z ASN6849 : 1H - 2 3H - 16 6H - 24 12H - 36 24H - 43 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-09-24 01:14:50 |
23.19.32.40 | attack | 23.19.32.40 - - [23/Sep/2019:08:17:24 -0400] "GET /?page=products&action=view&manufacturerID=1&productID=../etc/passwd&linkID=3128 HTTP/1.1" 302 - "https://baldwinbrasshardware.com/?page=products&action=view&manufacturerID=1&productID=../etc/passwd&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0" ... |
2019-09-24 01:14:20 |