城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.98.198.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42056
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;67.98.198.140. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 08:30:12 CST 2025
;; MSG SIZE rcvd: 106
Host 140.198.98.67.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 140.198.98.67.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 36.62.4.12 | attackbots | 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x 2019-07-03 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=36.62.4.12 |
2019-07-04 00:54:11 |
| 91.134.231.96 | attack | C1,DEF GET /wp-login.php |
2019-07-04 01:09:17 |
| 41.60.236.239 | attackbots | Jul 3 08:59:35 mxgate1 postfix/postscreen[8529]: CONNECT from [41.60.236.239]:40657 to [176.31.12.44]:25 Jul 3 08:59:35 mxgate1 postfix/dnsblog[8530]: addr 41.60.236.239 listed by domain zen.spamhaus.org as 127.0.0.4 Jul 3 08:59:35 mxgate1 postfix/dnsblog[8530]: addr 41.60.236.239 listed by domain zen.spamhaus.org as 127.0.0.11 Jul 3 08:59:35 mxgate1 postfix/dnsblog[8530]: addr 41.60.236.239 listed by domain zen.spamhaus.org as 127.0.0.3 Jul 3 08:59:35 mxgate1 postfix/dnsblog[8784]: addr 41.60.236.239 listed by domain cbl.abuseat.org as 127.0.0.2 Jul 3 08:59:35 mxgate1 postfix/dnsblog[8531]: addr 41.60.236.239 listed by domain bl.spamcop.net as 127.0.0.2 Jul 3 08:59:35 mxgate1 postfix/dnsblog[8534]: addr 41.60.236.239 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jul 3 08:59:35 mxgate1 postfix/dnsblog[8532]: addr 41.60.236.239 listed by domain b.barracudacentral.org as 127.0.0.2 Jul 3 08:59:36 mxgate1 postfix/postscreen[8529]: PREGREET 39 after 0.44 from [4........ ------------------------------- |
2019-07-04 00:38:44 |
| 91.121.132.116 | attack | Jul 3 12:12:12 localhost sshd[18100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.132.116 Jul 3 12:12:14 localhost sshd[18100]: Failed password for invalid user odoo from 91.121.132.116 port 50270 ssh2 Jul 3 12:14:54 localhost sshd[18128]: Failed password for root from 91.121.132.116 port 53992 ssh2 Jul 3 12:17:03 localhost sshd[18142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.132.116 ... |
2019-07-04 00:44:31 |
| 54.39.145.59 | attackspambots | Automated report - ssh fail2ban: Jul 3 15:52:28 authentication failure Jul 3 15:52:29 wrong password, user=alexandra, port=56328, ssh2 |
2019-07-04 01:06:54 |
| 105.225.13.116 | attack | 2019-07-03 15:03:07 unexpected disconnection while reading SMTP command from (105-225-148-162.east.dsl.telkomsa.net) [105.225.13.116]:11320 I=[10.100.18.20]:25 (error: Connection reset by peer) 2019-07-03 15:03:43 unexpected disconnection while reading SMTP command from (105-225-148-162.east.dsl.telkomsa.net) [105.225.13.116]:36750 I=[10.100.18.20]:25 (error: Connection reset by peer) 2019-07-03 15:04:25 unexpected disconnection while reading SMTP command from (105-225-148-162.east.dsl.telkomsa.net) [105.225.13.116]:1247 I=[10.100.18.20]:25 (error: Connection reset by peer) ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=105.225.13.116 |
2019-07-04 00:48:12 |
| 103.17.244.27 | attackspambots | Jul 3 15:04:47 MAKserver06 sshd[2741]: Did not receive identification string from 103.17.244.27 port 56891 Jul 3 15:06:13 MAKserver06 sshd[2834]: Invalid user user1 from 103.17.244.27 port 49244 Jul 3 15:06:19 MAKserver06 sshd[2834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.244.27 Jul 3 15:06:21 MAKserver06 sshd[2834]: Failed password for invalid user user1 from 103.17.244.27 port 49244 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=103.17.244.27 |
2019-07-04 00:49:55 |
| 46.176.132.52 | attackspambots | Telnet Server BruteForce Attack |
2019-07-04 00:40:12 |
| 31.206.222.24 | attackbots | 2019-07-03 15:14:03 H=([31.206.222.24]) [31.206.222.24]:24543 I=[10.100.18.22]:25 sender verify fail for |
2019-07-04 01:21:52 |
| 189.124.85.12 | attackspambots | 2019-07-03 14:12:22 H=(12.85.124.189.assim.net) [189.124.85.12]:45685 I=[10.100.18.20]:25 F= |
2019-07-04 01:01:00 |
| 177.23.90.10 | attack | Jul 3 16:41:42 dedicated sshd[19858]: Invalid user vagrant from 177.23.90.10 port 42562 |
2019-07-04 00:43:49 |
| 42.116.118.167 | attackbots | 2019-07-03 15:11:03 unexpected disconnection while reading SMTP command from ([42.116.118.167]) [42.116.118.167]:21266 I=[10.100.18.23]:25 (error: Connection reset by peer) 2019-07-03 15:13:25 unexpected disconnection while reading SMTP command from ([42.116.118.167]) [42.116.118.167]:9354 I=[10.100.18.23]:25 (error: Connection reset by peer) 2019-07-03 15:14:14 unexpected disconnection while reading SMTP command from ([42.116.118.167]) [42.116.118.167]:35670 I=[10.100.18.23]:25 (error: Connection reset by peer) ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=42.116.118.167 |
2019-07-04 01:25:27 |
| 188.165.220.213 | attackbots | Jul 3 15:21:48 vpn01 sshd\[10536\]: Invalid user server from 188.165.220.213 Jul 3 15:21:48 vpn01 sshd\[10536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.220.213 Jul 3 15:21:50 vpn01 sshd\[10536\]: Failed password for invalid user server from 188.165.220.213 port 58842 ssh2 |
2019-07-04 01:25:46 |
| 153.36.242.114 | attackbotsspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.114 user=root Failed password for root from 153.36.242.114 port 35790 ssh2 Failed password for root from 153.36.242.114 port 35790 ssh2 Failed password for root from 153.36.242.114 port 35790 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.114 user=root |
2019-07-04 01:13:46 |
| 90.188.16.246 | attackbotsspam | proto=tcp . spt=46274 . dpt=25 . (listed on Blocklist de Jul 02) (736) |
2019-07-04 00:39:37 |