城市(city): unknown
省份(region): unknown
国家(country): Serbia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 79.101.42.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;79.101.42.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:10:21 CST 2025
;; MSG SIZE rcvd: 105
Host 42.42.101.79.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.42.101.79.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 140.143.59.171 | attack | Oct 21 06:48:13 bouncer sshd\[2977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.59.171 user=root Oct 21 06:48:15 bouncer sshd\[2977\]: Failed password for root from 140.143.59.171 port 19089 ssh2 Oct 21 06:53:15 bouncer sshd\[3000\]: Invalid user central from 140.143.59.171 port 56407 ... |
2019-10-21 17:30:53 |
| 41.76.209.14 | attack | Oct 21 05:47:12 dedicated sshd[15604]: Invalid user surabaya1 from 41.76.209.14 port 56368 |
2019-10-21 17:08:03 |
| 150.242.213.189 | attack | SSH Bruteforce attempt |
2019-10-21 17:36:04 |
| 81.22.45.48 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-10-21 17:13:10 |
| 109.102.226.187 | attack | 109.102.226.187 - - [21/Oct/2019:03:26:43 +0200] "GET /main/wissen/broschueren/arbehostnamenehmerueberlassung.html?no_cache=1 HTTP/1.1" 301 371 "-" "Mozilla/5.0 (compatible& Googlebot/2.1& +hxxp://www.google.com/bot.html)" ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=109.102.226.187 |
2019-10-21 17:08:30 |
| 75.140.135.178 | attackbots | Oct 21 13:10:01 our-server-hostname postfix/smtpd[10274]: connect from unknown[75.140.135.178] Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x Oct 21 13:10:09 our-server-hostname postfix/smtpd[10274]: lost connection after RCPT from unknown[75.140.135.178] Oct 21 13:10:09 our-server-hostname postfix/smtpd[10274]: disconnect from unknown[75.140.135.178] Oct 21 13:14:27 our-server-hostname postfix/smtpd[10441]: connect from unknown[75.140.135.178] Oct x@x Oct x@x Oct x@x Oct x@x Oct x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=75.140.135.178 |
2019-10-21 17:16:34 |
| 91.121.110.97 | attackbotsspam | Oct 21 10:08:07 rotator sshd\[21369\]: Invalid user ts3 from 91.121.110.97Oct 21 10:08:08 rotator sshd\[21369\]: Failed password for invalid user ts3 from 91.121.110.97 port 58938 ssh2Oct 21 10:12:06 rotator sshd\[22251\]: Invalid user service from 91.121.110.97Oct 21 10:12:08 rotator sshd\[22251\]: Failed password for invalid user service from 91.121.110.97 port 41714 ssh2Oct 21 10:16:05 rotator sshd\[23091\]: Invalid user hack from 91.121.110.97Oct 21 10:16:06 rotator sshd\[23091\]: Failed password for invalid user hack from 91.121.110.97 port 52722 ssh2 ... |
2019-10-21 17:19:35 |
| 82.76.44.175 | attack | port scan and connect, tcp 119 (nntp) |
2019-10-21 17:14:17 |
| 185.9.3.48 | attack | 5x Failed Password |
2019-10-21 17:21:10 |
| 40.73.25.111 | attackbots | Oct 21 09:26:15 sauna sshd[106033]: Failed password for root from 40.73.25.111 port 59490 ssh2 ... |
2019-10-21 17:20:00 |
| 167.86.118.159 | attackspambots | Oct 19 11:39:38 server6 sshd[32153]: Failed password for r.r from 167.86.118.159 port 53574 ssh2 Oct 19 11:39:38 server6 sshd[32154]: Failed password for r.r from 167.86.118.159 port 37368 ssh2 Oct 19 11:39:38 server6 sshd[32157]: Failed password for r.r from 167.86.118.159 port 34364 ssh2 Oct 19 11:39:38 server6 sshd[32153]: Received disconnect from 167.86.118.159: 11: Normal Shutdown, Thank you for playing [preauth] Oct 19 11:39:38 server6 sshd[32154]: Received disconnect from 167.86.118.159: 11: Normal Shutdown, Thank you for playing [preauth] Oct 19 11:39:38 server6 sshd[32157]: Received disconnect from 167.86.118.159: 11: Normal Shutdown, Thank you for playing [preauth] Oct 19 11:39:52 server6 sshd[32250]: Failed password for r.r from 167.86.118.159 port 36806 ssh2 Oct 19 11:39:52 server6 sshd[32249]: Failed password for r.r from 167.86.118.159 port 48832 ssh2 Oct 19 11:39:52 server6 sshd[32252]: Failed password for r.r from 167.86.118.159 port 45828 ssh2 Oct 19 11........ ------------------------------- |
2019-10-21 17:30:28 |
| 112.85.42.178 | attack | Oct 21 02:56:17 lamijardin sshd[8996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178 user=r.r Oct 21 02:56:19 lamijardin sshd[8996]: Failed password for r.r from 112.85.42.178 port 43718 ssh2 Oct 21 02:56:34 lamijardin sshd[8996]: message repeated 5 serveres: [ Failed password for r.r from 112.85.42.178 port 43718 ssh2] Oct 21 02:56:34 lamijardin sshd[8996]: error: maximum authentication attempts exceeded for r.r from 112.85.42.178 port 43718 ssh2 [preauth] Oct 21 02:56:34 lamijardin sshd[8996]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178 user=r.r Oct 21 02:56:37 lamijardin sshd[8998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178 user=r.r Oct 21 02:56:40 lamijardin sshd[8998]: Failed password for r.r from 112.85.42.178 port 4293 ssh2 Oct 21 02:56:54 lamijardin sshd[8998]: message repeated 5 serveres: [ Faile........ ------------------------------- |
2019-10-21 17:26:28 |
| 222.186.173.238 | attackbotsspam | 2019-10-21T16:33:38.408549enmeeting.mahidol.ac.th sshd\[23612\]: User root from 222.186.173.238 not allowed because not listed in AllowUsers 2019-10-21T16:33:39.641835enmeeting.mahidol.ac.th sshd\[23612\]: Failed none for invalid user root from 222.186.173.238 port 24426 ssh2 2019-10-21T16:33:40.984829enmeeting.mahidol.ac.th sshd\[23612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238 user=root ... |
2019-10-21 17:33:53 |
| 124.161.8.252 | attackspambots | $f2bV_matches |
2019-10-21 17:40:31 |
| 154.118.141.90 | attackbotsspam | Oct 21 05:38:19 [host] sshd[3213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.118.141.90 user=root Oct 21 05:38:21 [host] sshd[3213]: Failed password for root from 154.118.141.90 port 42093 ssh2 Oct 21 05:45:46 [host] sshd[3495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.118.141.90 user=root |
2019-10-21 17:45:32 |