城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.92.143.110
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.92.143.110. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:21:42 CST 2025
;; MSG SIZE rcvd: 106
110.143.92.66.in-addr.arpa domain name pointer dsl092-143-110.chi1.dsl.speakeasy.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
110.143.92.66.in-addr.arpa name = dsl092-143-110.chi1.dsl.speakeasy.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.142.158.245 | attack | Unauthorised access (Dec 8) SRC=185.142.158.245 LEN=40 TOS=0x10 PREC=0x40 TTL=240 ID=33507 TCP DPT=3389 WINDOW=1024 SYN Unauthorised access (Dec 3) SRC=185.142.158.245 LEN=40 TTL=243 ID=3497 TCP DPT=3389 WINDOW=1024 SYN |
2019-12-08 07:50:56 |
| 36.71.160.214 | attackspambots | [Sun Dec 08 06:30:28.445777 2019] [:error] [pid 28327:tid 139906326849280] [client 36.71.160.214:11349] [client 36.71.160.214] ModSecurity: Access denied with code 403 (phase 4). Pattern match "^5\\\\d{2}$" at RESPONSE_STATUS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/RESPONSE-950-DATA-LEAKAGES.conf"] [line "118"] [id "950100"] [msg "The Application Returned a 500-Level Status Code"] [data "Matched Data: 500 found within RESPONSE_STATUS: 500"] [severity "ERROR"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-disclosure"] [tag "WASCTC/WASC-13"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.6"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/informasi-iklim/infografis-iklim/infografis-bulanan"] [unique_id "Xew2E3Sr2qxoiTIoM8I6YAAAANE"], referer: https://karangploso.jatim.bmkg.go.id/
... |
2019-12-08 08:21:18 |
| 49.88.112.68 | attackspam | Dec 8 02:08:00 sauna sshd[224687]: Failed password for root from 49.88.112.68 port 15912 ssh2 ... |
2019-12-08 08:10:06 |
| 185.2.140.155 | attackspambots | Dec 7 23:56:51 game-panel sshd[12168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.140.155 Dec 7 23:56:53 game-panel sshd[12168]: Failed password for invalid user q11qw22w from 185.2.140.155 port 59464 ssh2 Dec 8 00:02:19 game-panel sshd[12438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.2.140.155 |
2019-12-08 08:14:35 |
| 68.183.48.172 | attackspambots | 20 attempts against mh-ssh on echoip.magehost.pro |
2019-12-08 07:52:40 |
| 218.92.0.175 | attackbotsspam | Fail2Ban - SSH Bruteforce Attempt |
2019-12-08 07:53:07 |
| 51.38.238.87 | attackspam | Dec 8 01:09:23 vpn01 sshd[11420]: Failed password for root from 51.38.238.87 port 47240 ssh2 ... |
2019-12-08 08:22:37 |
| 51.89.151.214 | attackspam | Dec 8 02:01:51 sauna sshd[224211]: Failed password for root from 51.89.151.214 port 35686 ssh2 Dec 8 02:07:10 sauna sshd[224626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.151.214 ... |
2019-12-08 08:17:40 |
| 152.195.143.193 | attackbotsspam | LGS,WP GET /wp-login.php |
2019-12-08 08:20:21 |
| 222.186.175.155 | attackbots | SSH-BruteForce |
2019-12-08 07:46:03 |
| 111.230.211.183 | attack | SSH brute-force: detected 37 distinct usernames within a 24-hour window. |
2019-12-08 07:54:54 |
| 203.148.53.227 | attackbots | SSH brute-force: detected 6 distinct usernames within a 24-hour window. |
2019-12-08 07:48:23 |
| 61.1.232.57 | attack | Unauthorized connection attempt from IP address 61.1.232.57 on Port 445(SMB) |
2019-12-08 08:02:55 |
| 62.234.105.16 | attackbots | Dec 7 13:25:05 tdfoods sshd\[12696\]: Invalid user sybase from 62.234.105.16 Dec 7 13:25:05 tdfoods sshd\[12696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.105.16 Dec 7 13:25:07 tdfoods sshd\[12696\]: Failed password for invalid user sybase from 62.234.105.16 port 56078 ssh2 Dec 7 13:30:52 tdfoods sshd\[13282\]: Invalid user wwwrun from 62.234.105.16 Dec 7 13:30:52 tdfoods sshd\[13282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.105.16 |
2019-12-08 07:45:27 |
| 186.46.43.125 | attack | Dec 7 13:43:20 kapalua sshd\[13146\]: Invalid user tomotaka from 186.46.43.125 Dec 7 13:43:20 kapalua sshd\[13146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.saraguro.gob.ec Dec 7 13:43:22 kapalua sshd\[13146\]: Failed password for invalid user tomotaka from 186.46.43.125 port 56334 ssh2 Dec 7 13:49:34 kapalua sshd\[13737\]: Invalid user lindsey from 186.46.43.125 Dec 7 13:49:34 kapalua sshd\[13737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.saraguro.gob.ec |
2019-12-08 08:03:33 |