城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.203.96.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32840
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;58.203.96.105. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 17:35:21 CST 2025
;; MSG SIZE rcvd: 106
Host 105.96.203.58.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 105.96.203.58.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 152.136.165.226 | attack | ... |
2020-04-22 21:12:26 |
| 14.63.168.66 | attack | Apr 22 18:58:47 itv-usvr-02 sshd[2271]: Invalid user admin from 14.63.168.66 port 60282 Apr 22 18:58:47 itv-usvr-02 sshd[2271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.168.66 Apr 22 18:58:47 itv-usvr-02 sshd[2271]: Invalid user admin from 14.63.168.66 port 60282 Apr 22 18:58:49 itv-usvr-02 sshd[2271]: Failed password for invalid user admin from 14.63.168.66 port 60282 ssh2 Apr 22 19:04:04 itv-usvr-02 sshd[2407]: Invalid user ao from 14.63.168.66 port 51472 |
2020-04-22 21:20:02 |
| 42.191.67.68 | attack | Honeypot attack, port: 4567, PTR: PTR record not found |
2020-04-22 21:39:00 |
| 45.55.219.114 | attack | Found by fail2ban |
2020-04-22 21:34:33 |
| 106.12.209.117 | attack | Apr 22 15:20:41 hosting sshd[11224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.117 user=root Apr 22 15:20:43 hosting sshd[11224]: Failed password for root from 106.12.209.117 port 47710 ssh2 Apr 22 15:28:59 hosting sshd[11886]: Invalid user test from 106.12.209.117 port 58680 ... |
2020-04-22 21:06:20 |
| 188.191.28.175 | attack | Honeypot attack, port: 5555, PTR: host-188.191.28.175.ardinvest.net. |
2020-04-22 21:09:32 |
| 182.189.32.150 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-04-22 21:12:07 |
| 50.104.13.15 | spambotsattackproxy | This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them...they are blocking this from coming to u......also they edit the logs so PULL ever single one ther |
2020-04-22 21:31:15 |
| 194.152.206.93 | attackbotsspam | leo_www |
2020-04-22 21:17:21 |
| 122.152.204.104 | attack | Apr 22 13:13:21 nxxxxxxx sshd[3742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.204.104 user=r.r Apr 22 13:13:23 nxxxxxxx sshd[3742]: Failed password for r.r from 122.152.204.104 port 55372 ssh2 Apr 22 13:13:24 nxxxxxxx sshd[3742]: Received disconnect from 122.152.204.104: 11: Bye Bye [preauth] Apr 22 13:18:10 nxxxxxxx sshd[4160]: Invalid user aj from 122.152.204.104 Apr 22 13:18:10 nxxxxxxx sshd[4160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.204.104 Apr 22 13:18:12 nxxxxxxx sshd[4160]: Failed password for invalid user aj from 122.152.204.104 port 49382 ssh2 Apr 22 13:18:12 nxxxxxxx sshd[4160]: Received disconnect from 122.152.204.104: 11: Bye Bye [preauth] Apr 22 13:21:04 nxxxxxxx sshd[4514]: Invalid user joomla from 122.152.204.104 Apr 22 13:21:04 nxxxxxxx sshd[4514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122......... ------------------------------- |
2020-04-22 21:08:05 |
| 222.186.42.155 | attackspam | Apr 22 14:06:27 cat5e sshd[21426]: Failed password for root from 222.186.42.155 port 53629 ssh2 |
2020-04-22 21:14:24 |
| 50.104.13.15 | spambotsattack | This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them |
2020-04-22 21:28:07 |
| 197.2.80.168 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-22 21:21:41 |
| 50.104.13.15 | spambotsattack | This is 1 of several ip addresses stalking and hard my kids and me on internet for 2 in a half years. They have my credit card info all my passwords stole 7 email ACCTS that r still active and used with different names. They edit right on the screen everything even legal documents. My ip is 192.168.254.254 please look into this issue and block these psycho paths. Also they have my apps cloned so they can run them |
2020-04-22 21:28:10 |
| 217.138.76.69 | attack | SSH Brute-Forcing (server1) |
2020-04-22 21:19:34 |