城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.163.193.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4977
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;72.163.193.130. IN A
;; AUTHORITY SECTION:
. 448 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 05:43:35 CST 2022
;; MSG SIZE rcvd: 107
Host 130.193.163.72.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 130.193.163.72.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.91.129.60 | attackspambots | Apr619:55:41server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=51.91.129.60DST=136.243.224.55LEN=40TOS=0x00PREC=0x00TTL=243ID=45162PROTO=TCPSPT=49410DPT=33390WINDOW=1024RES=0x00SYNURGP=0Apr619:55:41server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=51.91.129.60DST=136.243.224.53LEN=40TOS=0x00PREC=0x00TTL=243ID=10626PROTO=TCPSPT=49410DPT=33390WINDOW=1024RES=0x00SYNURGP=0Apr619:55:45server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=51.91.129.60DST=136.243.224.54LEN=40TOS=0x00PREC=0x00TTL=243ID=41953PROTO=TCPSPT=49410DPT=33390WINDOW=1024RES=0x00SYNURGP=0Apr619:55:58server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=51.91.129.60DST=136.243.224.53LEN=40TOS=0x00PREC=0x00TTL=243ID=12520PROTO=TCPSPT=49410DPT=3396WINDOW=1024RES=0x00SYNURGP=0Apr619:55:59server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43: |
2020-04-07 07:18:59 |
| 60.53.167.237 | attackbotsspam | Triggered: repeated knocking on closed ports. |
2020-04-07 07:14:27 |
| 125.162.225.80 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 06-04-2020 16:30:13. |
2020-04-07 07:04:06 |
| 183.88.217.43 | attackspam | (imapd) Failed IMAP login from 183.88.217.43 (TH/Thailand/mx-ll-183.88.217-43.dynamic.3bb.in.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 6 20:00:11 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user= |
2020-04-07 06:55:24 |
| 113.162.197.22 | attackspam | scan z |
2020-04-07 07:23:51 |
| 111.229.128.9 | attackspambots | (sshd) Failed SSH login from 111.229.128.9 (CN/China/-): 5 in the last 3600 secs |
2020-04-07 07:05:57 |
| 183.88.75.130 | attackspam | Unauthorized connection attempt from IP address 183.88.75.130 on Port 445(SMB) |
2020-04-07 06:50:22 |
| 123.58.5.243 | attackspambots | Apr 7 00:53:48 eventyay sshd[665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.5.243 Apr 7 00:53:50 eventyay sshd[665]: Failed password for invalid user yhz from 123.58.5.243 port 55599 ssh2 Apr 7 00:58:04 eventyay sshd[805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.5.243 ... |
2020-04-07 06:58:12 |
| 14.160.95.114 | attack | (imapd) Failed IMAP login from 14.160.95.114 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 6 20:00:16 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user= |
2020-04-07 06:46:54 |
| 141.98.31.106 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 06-04-2020 16:30:14. |
2020-04-07 07:02:00 |
| 14.251.175.34 | attackbotsspam | Unauthorized connection attempt from IP address 14.251.175.34 on Port 445(SMB) |
2020-04-07 07:19:46 |
| 37.114.145.67 | attackbots | Apr 6 17:23:56 mail.srvfarm.net postfix/smtpd[511934]: lost connection after CONNECT from unknown[37.114.145.67] Apr 6 17:26:45 mail.srvfarm.net postfix/smtps/smtpd[492679]: warning: unknown[37.114.145.67]: SASL PLAIN authentication failed: Apr 6 17:26:45 mail.srvfarm.net postfix/smtps/smtpd[492679]: lost connection after AUTH from unknown[37.114.145.67] Apr 6 17:27:57 mail.srvfarm.net postfix/smtpd[513889]: warning: unknown[37.114.145.67]: SASL PLAIN authentication failed: Apr 6 17:27:57 mail.srvfarm.net postfix/smtpd[513889]: lost connection after AUTH from unknown[37.114.145.67] |
2020-04-07 06:44:41 |
| 222.186.31.135 | attackspam | Bruteforce detected by fail2ban |
2020-04-07 06:52:21 |
| 12.188.20.242 | attackbots | Automatic report - Port Scan Attack |
2020-04-07 07:15:10 |
| 92.118.37.95 | attack | firewall-block, port(s): 13048/tcp, 13063/tcp, 13202/tcp, 13360/tcp, 13508/tcp, 13786/tcp, 14198/tcp, 14204/tcp, 14429/tcp, 14568/tcp, 14623/tcp, 14706/tcp, 14867/tcp, 14934/tcp, 14980/tcp, 15257/tcp, 15272/tcp, 15528/tcp, 15691/tcp, 15713/tcp, 15831/tcp, 15862/tcp, 15895/tcp, 15920/tcp, 15935/tcp, 16057/tcp, 16063/tcp, 16078/tcp, 16197/tcp, 16209/tcp, 16215/tcp, 16822/tcp, 16962/tcp, 17086/tcp, 17094/tcp, 17401/tcp, 17538/tcp, 17684/tcp, 17836/tcp, 17845/tcp, 17988/tcp, 18119/tcp, 18259/tcp, 18317/tcp, 18323/tcp, 18332/tcp, 18459/tcp, 18478/tcp, 18479/tcp, 18603/tcp, 18606/tcp, 18609/tcp, 18618/tcp, 18728/tcp, 18731/tcp, 18852/tcp, 18874/tcp, 18883/tcp, 18886/tcp, 19070/tcp, 19091/tcp, 19138/tcp, 19228/tcp, 19237/tcp, 19240/tcp, 19248/tcp, 19380/tcp, 19494/tcp, 19883/tcp, 19992/tcp |
2020-04-07 07:06:22 |