城市(city): unknown
省份(region): unknown
国家(country): Russian Federation
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.106.42.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43845
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;77.106.42.142. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072800 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 28 13:55:56 CST 2019
;; MSG SIZE rcvd: 117
142.42.106.77.in-addr.arpa domain name pointer vlg-77-106-42-142.vologda.ru.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
142.42.106.77.in-addr.arpa name = vlg-77-106-42-142.vologda.ru.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 197.44.94.127 | attackspam | failed_logins |
2019-11-12 01:52:52 |
| 113.88.164.95 | attack | Nov 11 15:30:30 mxgate1 postfix/postscreen[21735]: CONNECT from [113.88.164.95]:57618 to [176.31.12.44]:25 Nov 11 15:30:30 mxgate1 postfix/dnsblog[22084]: addr 113.88.164.95 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 11 15:30:30 mxgate1 postfix/dnsblog[22093]: addr 113.88.164.95 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 11 15:30:30 mxgate1 postfix/dnsblog[22093]: addr 113.88.164.95 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 11 15:30:30 mxgate1 postfix/dnsblog[22093]: addr 113.88.164.95 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 11 15:30:30 mxgate1 postfix/dnsblog[22087]: addr 113.88.164.95 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 11 15:30:36 mxgate1 postfix/postscreen[21735]: DNSBL rank 4 for [113.88.164.95]:57618 Nov x@x Nov 11 15:30:39 mxgate1 postfix/postscreen[21735]: DISCONNECT [113.88.164.95]:57618 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=113.88.164.95 |
2019-11-12 02:05:30 |
| 194.182.65.100 | attack | User [root] from [194.182.65.100] failed to log in via [SSH] due to authorization failure. |
2019-11-12 01:46:24 |
| 103.236.134.13 | attack | Nov 11 07:53:26 sachi sshd\[27393\]: Invalid user asplund from 103.236.134.13 Nov 11 07:53:26 sachi sshd\[27393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.134.13 Nov 11 07:53:27 sachi sshd\[27393\]: Failed password for invalid user asplund from 103.236.134.13 port 50560 ssh2 Nov 11 07:57:55 sachi sshd\[27760\]: Invalid user wpuser from 103.236.134.13 Nov 11 07:57:55 sachi sshd\[27760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.134.13 |
2019-11-12 02:05:47 |
| 86.105.195.71 | attackspambots | Fail2Ban Ban Triggered |
2019-11-12 01:49:30 |
| 34.89.246.62 | attackbotsspam | 2019-11-11T17:44:18.948848abusebot-7.cloudsearch.cf sshd\[18804\]: Invalid user visitor from 34.89.246.62 port 55044 |
2019-11-12 02:05:09 |
| 140.210.9.80 | attack | Nov 11 10:05:15 dallas01 sshd[8923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.9.80 Nov 11 10:05:17 dallas01 sshd[8923]: Failed password for invalid user jonatas from 140.210.9.80 port 37242 ssh2 Nov 11 10:12:38 dallas01 sshd[10319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.9.80 |
2019-11-12 01:47:05 |
| 201.217.146.114 | attackbotsspam | Brute force SMTP login attempted. ... |
2019-11-12 01:33:40 |
| 217.56.124.218 | attackspambots | Nov 12 02:51:46 our-server-hostname postfix/smtpd[22289]: connect from unknown[217.56.124.218] Nov x@x Nov 12 02:51:47 our-server-hostname postfix/smtpd[22289]: lost connection after DATA from unknown[217.56.124.218] Nov 12 02:51:47 our-server-hostname postfix/smtpd[22289]: disconnect from unknown[217.56.124.218] Nov 12 02:51:51 our-server-hostname postfix/smtpd[22550]: connect from unknown[217.56.124.218] Nov x@x Nov 12 02:51:52 our-server-hostname postfix/smtpd[22550]: lost connection after DATA from unknown[217.56.124.218] Nov 12 02:51:52 our-server-hostname postfix/smtpd[22550]: disconnect from unknown[217.56.124.218] Nov 12 02:52:03 our-server-hostname postfix/smtpd[22550]: connect from unknown[217.56.124.218] Nov x@x Nov x@x Nov 12 02:52:04 our-server-hostname postfix/smtpd[22550]: lost connection after DATA from unknown[217.56.124.218] Nov 12 02:52:04 our-server-hostname postfix/smtpd[22550]: disconnect from unknown[217.56.124.218] Nov 12 02:52:16 our-server-host........ ------------------------------- |
2019-11-12 02:04:16 |
| 109.87.187.240 | attack | Fail2Ban Ban Triggered |
2019-11-12 01:35:41 |
| 201.150.5.14 | attackspam | Nov 11 17:51:11 cavern sshd[25561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.150.5.14 |
2019-11-12 01:50:51 |
| 49.235.33.73 | attackbotsspam | Nov 11 14:05:12 firewall sshd[8686]: Invalid user xantipa from 49.235.33.73 Nov 11 14:05:14 firewall sshd[8686]: Failed password for invalid user xantipa from 49.235.33.73 port 43544 ssh2 Nov 11 14:09:10 firewall sshd[8769]: Invalid user mysql from 49.235.33.73 ... |
2019-11-12 02:07:01 |
| 209.61.195.214 | attack | Nov 11 15:33:13 mxgate1 postfix/postscreen[21735]: CONNECT from [209.61.195.214]:57530 to [176.31.12.44]:25 Nov 11 15:33:13 mxgate1 postfix/dnsblog[22086]: addr 209.61.195.214 listed by domain zen.spamhaus.org as 127.0.0.2 Nov 11 15:33:13 mxgate1 postfix/dnsblog[22084]: addr 209.61.195.214 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 11 15:33:19 mxgate1 postfix/postscreen[21735]: DNSBL rank 3 for [209.61.195.214]:57530 Nov x@x Nov 11 15:33:20 mxgate1 postfix/postscreen[21735]: DISCONNECT [209.61.195.214]:57530 .... truncated .... Nov 11 15:33:13 mxgate1 postfix/postscreen[21735]: CONNECT from [209.61.195.214]:57530 to [176.31.12.44]:25 Nov 11 15:33:13 mxgate1 postfix/dnsblog[22086]: addr 209.61.195.214 listed by domain zen.spamhaus.org as 127.0.0.2 Nov 11 15:33:13 mxgate1 postfix/dnsblog[22084]: addr 209.61.195.214 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 11 15:33:19 mxgate1 postfix/postscreen[21735]: DNSBL rank 3 for [209.61.195.214]:57........ ------------------------------- |
2019-11-12 02:08:57 |
| 81.22.45.116 | attack | 2019-11-11T18:47:09.431840+01:00 lumpi kernel: [3316807.323132] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.116 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=55824 PROTO=TCP SPT=45400 DPT=60494 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-12 02:01:30 |
| 92.119.160.40 | attack | Unauthorized connection attempt from IP address 92.119.160.40 on Port 3389(RDP) |
2019-11-12 02:09:53 |