城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.106.253.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;71.106.253.13. IN A
;; AUTHORITY SECTION:
. 28 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 10:56:17 CST 2025
;; MSG SIZE rcvd: 106
Host 13.253.106.71.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 13.253.106.71.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.233.139.218 | attackbots | Jul 10 09:11:10 sso sshd[8102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.139.218 Jul 10 09:11:13 sso sshd[8102]: Failed password for invalid user admin from 49.233.139.218 port 50826 ssh2 ... |
2020-07-10 15:55:40 |
| 77.247.181.163 | attackbotsspam | Unauthorized connection attempt detected from IP address 77.247.181.163 to port 2379 |
2020-07-10 16:13:29 |
| 58.228.159.253 | attackspambots |
|
2020-07-10 15:43:00 |
| 118.24.158.42 | attack | Failed password for invalid user vern from 118.24.158.42 port 43608 ssh2 |
2020-07-10 15:52:19 |
| 79.166.98.73 | attackspambots | Automatic report - Port Scan Attack |
2020-07-10 16:08:50 |
| 206.189.198.237 | attackspam | $f2bV_matches |
2020-07-10 16:02:11 |
| 203.196.142.228 | attackspam | Jul 10 05:40:02 Ubuntu-1404-trusty-64-minimal sshd\[4172\]: Invalid user hdfs from 203.196.142.228 Jul 10 05:40:02 Ubuntu-1404-trusty-64-minimal sshd\[4172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.196.142.228 Jul 10 05:40:05 Ubuntu-1404-trusty-64-minimal sshd\[4172\]: Failed password for invalid user hdfs from 203.196.142.228 port 47951 ssh2 Jul 10 05:59:52 Ubuntu-1404-trusty-64-minimal sshd\[13914\]: Invalid user naoki from 203.196.142.228 Jul 10 05:59:52 Ubuntu-1404-trusty-64-minimal sshd\[13914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.196.142.228 |
2020-07-10 16:18:29 |
| 218.92.0.175 | attackbots | (sshd) Failed SSH login from 218.92.0.175 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 10 09:36:53 amsweb01 sshd[27462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175 user=root Jul 10 09:36:54 amsweb01 sshd[27462]: Failed password for root from 218.92.0.175 port 14847 ssh2 Jul 10 09:36:57 amsweb01 sshd[27465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175 user=root Jul 10 09:36:58 amsweb01 sshd[27462]: Failed password for root from 218.92.0.175 port 14847 ssh2 Jul 10 09:36:59 amsweb01 sshd[27465]: Failed password for root from 218.92.0.175 port 56142 ssh2 |
2020-07-10 15:46:08 |
| 37.49.224.168 | attackspam | firewall-block, port(s): 80/tcp |
2020-07-10 15:48:09 |
| 121.160.139.118 | attackspambots | Jul 10 08:39:32 hosting sshd[9101]: Invalid user centos from 121.160.139.118 port 36926 ... |
2020-07-10 15:55:14 |
| 80.211.97.251 | attackspam | Invalid user at from 80.211.97.251 port 43872 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.97.251 Invalid user at from 80.211.97.251 port 43872 Failed password for invalid user at from 80.211.97.251 port 43872 ssh2 Invalid user liushuang from 80.211.97.251 port 41068 |
2020-07-10 15:44:49 |
| 106.53.219.82 | attackbots | Jul 10 08:21:22 web-main sshd[434958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.219.82 Jul 10 08:21:22 web-main sshd[434958]: Invalid user upload from 106.53.219.82 port 52444 Jul 10 08:21:24 web-main sshd[434958]: Failed password for invalid user upload from 106.53.219.82 port 52444 ssh2 |
2020-07-10 16:01:05 |
| 79.137.72.121 | attack | Jul 10 06:50:32 plex-server sshd[1170942]: Invalid user dorms from 79.137.72.121 port 54084 Jul 10 06:50:32 plex-server sshd[1170942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121 Jul 10 06:50:32 plex-server sshd[1170942]: Invalid user dorms from 79.137.72.121 port 54084 Jul 10 06:50:34 plex-server sshd[1170942]: Failed password for invalid user dorms from 79.137.72.121 port 54084 ssh2 Jul 10 06:53:52 plex-server sshd[1171271]: Invalid user giuliana from 79.137.72.121 port 50468 ... |
2020-07-10 16:06:55 |
| 190.129.47.148 | attackbotsspam | Icarus honeypot on github |
2020-07-10 15:46:29 |
| 45.61.142.140 | attackspam | SYN FLOOD ATTACK SINCE YESTERDAY 07/10/2020-10:50:06.783825 [**] [1:2210023:2] SURICATA STREAM ESTABLISHED SYNACK resend with different ACK [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} *****:80 -> 45.61.142.140:9978
07/10/2020-10:50:10.816101 [**] [1:2210023:2] SURICATA STREAM ESTABLISHED SYNACK resend with different ACK [**] [Classification: Generic Protocol Command Decode] [Priority: 3] {TCP} *****:80 -> 45.61.142.140:9978 |
2020-07-10 15:58:49 |