城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.7.57.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63013
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.7.57.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 21:47:10 CST 2025
;; MSG SIZE rcvd: 103
Host 40.57.7.54.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 40.57.7.54.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 165.227.129.37 | attack | xmlrpc attack |
2020-10-04 13:47:42 |
| 85.209.0.99 | attackspambots |
|
2020-10-04 13:34:29 |
| 172.58.188.73 | attackbots | Multiport scan : 6 ports scanned 80(x8) 443 465(x8) 3074(x3) 3478(x9) 8080(x3) |
2020-10-04 13:59:46 |
| 184.154.189.94 | attackspambots |
|
2020-10-04 13:54:55 |
| 112.85.42.81 | attackspambots | Failed password for root from 112.85.42.81 port 22064 ssh2 Failed password for root from 112.85.42.81 port 22064 ssh2 Failed password for root from 112.85.42.81 port 22064 ssh2 Failed password for root from 112.85.42.81 port 22064 ssh2 |
2020-10-04 13:27:43 |
| 140.143.193.52 | attackspambots | SSH Brute-Force attacks |
2020-10-04 13:57:35 |
| 196.52.43.123 | attackbots | 6363/tcp 9042/tcp 9000/tcp... [2020-08-04/10-03]65pkt,50pt.(tcp),2pt.(udp) |
2020-10-04 13:45:38 |
| 104.248.231.200 | attackspam | fail2ban/Oct 4 06:21:48 h1962932 sshd[14673]: Invalid user administrator from 104.248.231.200 port 34896 Oct 4 06:21:48 h1962932 sshd[14673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.231.200 Oct 4 06:21:48 h1962932 sshd[14673]: Invalid user administrator from 104.248.231.200 port 34896 Oct 4 06:21:50 h1962932 sshd[14673]: Failed password for invalid user administrator from 104.248.231.200 port 34896 ssh2 Oct 4 06:25:11 h1962932 sshd[14966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.231.200 user=root Oct 4 06:25:13 h1962932 sshd[14966]: Failed password for root from 104.248.231.200 port 43236 ssh2 |
2020-10-04 13:25:55 |
| 51.77.34.214 | attackspambots | 1601789658 - 10/04/2020 12:34:18 Host: ip214.ip-51-77-34.eu/51.77.34.214 Port: 23 TCP Blocked ... |
2020-10-04 13:54:32 |
| 222.186.15.62 | attackspam | Oct 4 05:42:47 localhost sshd[6205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root Oct 4 05:42:50 localhost sshd[6205]: Failed password for root from 222.186.15.62 port 17617 ssh2 Oct 4 05:42:51 localhost sshd[6205]: Failed password for root from 222.186.15.62 port 17617 ssh2 Oct 4 05:42:47 localhost sshd[6205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root Oct 4 05:42:50 localhost sshd[6205]: Failed password for root from 222.186.15.62 port 17617 ssh2 Oct 4 05:42:51 localhost sshd[6205]: Failed password for root from 222.186.15.62 port 17617 ssh2 Oct 4 05:42:47 localhost sshd[6205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root Oct 4 05:42:50 localhost sshd[6205]: Failed password for root from 222.186.15.62 port 17617 ssh2 Oct 4 05:42:51 localhost sshd[6205]: Failed password for ... |
2020-10-04 13:43:32 |
| 45.142.120.121 | attackspambots | Oct 4 06:18:17 mail.srvfarm.net postfix/smtpd[735772]: warning: unknown[45.142.120.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 06:18:24 mail.srvfarm.net postfix/smtpd[737246]: warning: unknown[45.142.120.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 06:18:26 mail.srvfarm.net postfix/smtpd[735492]: warning: unknown[45.142.120.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 4 06:18:28 mail.srvfarm.net postfix/smtpd[737249]: warning: unknown[45.142.120.121]: SASL LOGIN authentication failed: VXNlcm5hbWU6 Oct 4 06:18:35 mail.srvfarm.net postfix/smtpd[734060]: warning: unknown[45.142.120.121]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-10-04 13:21:58 |
| 102.165.30.45 | attackbots | 5901/tcp 5060/udp 2087/tcp... [2020-08-18/10-03]64pkt,42pt.(tcp),3pt.(udp) |
2020-10-04 13:52:09 |
| 122.194.229.59 | attack | Oct 4 06:22:46 mavik sshd[15164]: Failed password for root from 122.194.229.59 port 55352 ssh2 Oct 4 06:22:49 mavik sshd[15164]: Failed password for root from 122.194.229.59 port 55352 ssh2 Oct 4 06:22:52 mavik sshd[15164]: Failed password for root from 122.194.229.59 port 55352 ssh2 Oct 4 06:22:55 mavik sshd[15164]: Failed password for root from 122.194.229.59 port 55352 ssh2 Oct 4 06:22:59 mavik sshd[15164]: Failed password for root from 122.194.229.59 port 55352 ssh2 ... |
2020-10-04 13:35:36 |
| 165.232.97.209 | attackspambots | 20 attempts against mh-ssh on soil |
2020-10-04 13:55:25 |
| 139.180.175.134 | attackspambots | 139.180.175.134 - - [04/Oct/2020:05:11:04 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.180.175.134 - - [04/Oct/2020:05:11:07 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.180.175.134 - - [04/Oct/2020:05:11:09 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-10-04 13:47:13 |