城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.50.40.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8194
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.50.40.48. IN A
;; AUTHORITY SECTION:
. 519 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023041800 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 18 15:24:58 CST 2023
;; MSG SIZE rcvd: 104
Host 48.40.50.54.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 48.40.50.54.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.65.241.42 | attack | Attempted Brute Force (dovecot) |
2020-08-10 15:12:25 |
| 178.128.123.155 | attackbots | Automatic report - Banned IP Access |
2020-08-10 15:08:19 |
| 42.236.10.72 | attackspambots | Automatic report - Banned IP Access |
2020-08-10 15:02:27 |
| 14.21.36.84 | attackspambots | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-10 15:06:28 |
| 109.123.117.243 | attack | Sent packet to closed port: 7000 |
2020-08-10 15:03:33 |
| 177.140.76.164 | attackspambots | Automatic report - Banned IP Access |
2020-08-10 15:12:05 |
| 178.32.123.99 | attackbotsspam | Aug 10 05:53:43 buvik sshd[8012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.123.99 Aug 10 05:53:45 buvik sshd[8012]: Failed password for invalid user admin from 178.32.123.99 port 50310 ssh2 Aug 10 05:53:45 buvik sshd[8014]: Invalid user admin from 178.32.123.99 ... |
2020-08-10 14:50:18 |
| 39.100.90.147 | attackspambots | Bruteforce detected by fail2ban |
2020-08-10 15:04:00 |
| 122.53.156.194 | attackbotsspam | Port probing on unauthorized port 445 |
2020-08-10 14:42:52 |
| 77.107.53.238 | attackspam | SSH break in attempt ... |
2020-08-10 14:38:07 |
| 60.212.191.66 | attackspambots | Lines containing failures of 60.212.191.66 Aug 9 18:07:39 penfold sshd[24810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.212.191.66 user=r.r Aug 9 18:07:40 penfold sshd[24810]: Failed password for r.r from 60.212.191.66 port 36025 ssh2 Aug 9 18:07:41 penfold sshd[24810]: Received disconnect from 60.212.191.66 port 36025:11: Bye Bye [preauth] Aug 9 18:07:41 penfold sshd[24810]: Disconnected from authenticating user r.r 60.212.191.66 port 36025 [preauth] Aug 9 18:13:49 penfold sshd[25318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.212.191.66 user=r.r Aug 9 18:13:51 penfold sshd[25318]: Failed password for r.r from 60.212.191.66 port 58568 ssh2 Aug 9 18:13:52 penfold sshd[25318]: Received disconnect from 60.212.191.66 port 58568:11: Bye Bye [preauth] Aug 9 18:13:52 penfold sshd[25318]: Disconnected from authenticating user r.r 60.212.191.66 port 58568 [preauth] Aug 9........ ------------------------------ |
2020-08-10 14:54:02 |
| 122.140.102.56 | attack | Unauthorised access (Aug 10) SRC=122.140.102.56 LEN=40 TTL=46 ID=34353 TCP DPT=8080 WINDOW=12637 SYN Unauthorised access (Aug 9) SRC=122.140.102.56 LEN=40 TTL=46 ID=39607 TCP DPT=8080 WINDOW=50357 SYN |
2020-08-10 14:53:32 |
| 43.243.214.42 | attackspambots | Aug 10 05:42:26 myvps sshd[12392]: Failed password for root from 43.243.214.42 port 44342 ssh2 Aug 10 05:50:29 myvps sshd[17391]: Failed password for root from 43.243.214.42 port 34188 ssh2 ... |
2020-08-10 14:33:01 |
| 222.186.15.158 | attackspambots | $f2bV_matches |
2020-08-10 14:39:12 |
| 171.100.61.178 | attackspam | 1597031640 - 08/10/2020 05:54:00 Host: 171.100.61.178/171.100.61.178 Port: 445 TCP Blocked |
2020-08-10 14:42:35 |