城市(city): unknown
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.162.21.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;8.162.21.141. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:31:15 CST 2025
;; MSG SIZE rcvd: 105
Host 141.21.162.8.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 141.21.162.8.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.199.142.148 | attackspambots | IP blocked |
2019-12-28 17:21:26 |
| 43.241.146.238 | attack | Dec 28 10:16:46 [snip] sshd[12124]: Invalid user fberloff from 43.241.146.238 port 9063 Dec 28 10:16:46 [snip] sshd[12124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.241.146.238 Dec 28 10:16:49 [snip] sshd[12124]: Failed password for invalid user fberloff from 43.241.146.238 port 9063 ssh2[...] |
2019-12-28 17:48:36 |
| 178.128.144.227 | attack | Dec 28 07:25:39 mail kernel: [2534081.634374] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=178.128.144.227 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=183 DF PROTO=TCP SPT=59774 DPT=130 WINDOW=29200 RES=0x00 SYN URGP=0 Dec 28 07:25:40 mail kernel: [2534082.630483] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=178.128.144.227 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=184 DF PROTO=TCP SPT=59774 DPT=130 WINDOW=29200 RES=0x00 SYN URGP=0 Dec 28 07:25:42 mail kernel: [2534084.634559] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=178.128.144.227 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=185 DF PROTO=TCP SPT=59774 DPT=130 WINDOW=29200 RES=0x00 SYN URGP=0 |
2019-12-28 17:56:04 |
| 92.118.37.53 | attackspam | 12/28/2019-02:27:31.603354 92.118.37.53 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-12-28 17:31:53 |
| 175.158.36.57 | attack | $f2bV_matches |
2019-12-28 17:34:02 |
| 46.38.144.57 | attackbots | Dec 28 10:11:37 relay postfix/smtpd\[7726\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 28 10:12:50 relay postfix/smtpd\[20586\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 28 10:13:09 relay postfix/smtpd\[14692\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 28 10:14:16 relay postfix/smtpd\[18807\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 28 10:14:33 relay postfix/smtpd\[12209\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-28 17:21:12 |
| 83.233.136.24 | attackspambots | Honeypot attack, port: 23, PTR: 83-233-136-24.cust.bredband2.com. |
2019-12-28 17:50:56 |
| 178.128.72.117 | attack | 178.128.72.117 - - [28/Dec/2019:06:42:53 +0000] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.128.72.117 - - [28/Dec/2019:06:42:54 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-12-28 17:28:45 |
| 222.186.175.155 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155 user=root Failed password for root from 222.186.175.155 port 38266 ssh2 Failed password for root from 222.186.175.155 port 38266 ssh2 Failed password for root from 222.186.175.155 port 38266 ssh2 Failed password for root from 222.186.175.155 port 38266 ssh2 |
2019-12-28 17:18:44 |
| 91.192.56.7 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-28 17:22:44 |
| 118.32.223.61 | attack | Dec 28 07:26:08 v22018086721571380 sshd[17003]: Failed password for invalid user test from 118.32.223.61 port 50550 ssh2 Dec 28 08:26:32 v22018086721571380 sshd[19784]: Failed password for invalid user api123 from 118.32.223.61 port 57860 ssh2 |
2019-12-28 17:26:30 |
| 91.196.222.58 | attack | Honeypot attack, port: 389, PTR: PTR record not found |
2019-12-28 17:23:34 |
| 150.95.110.90 | attackspam | Dec 28 08:46:23 lnxweb61 sshd[22125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.110.90 |
2019-12-28 17:29:18 |
| 69.162.79.242 | attackspambots | $f2bV_matches |
2019-12-28 17:58:29 |
| 137.226.113.9 | attackspambots | Unauthorized connection attempt detected from IP address 137.226.113.9 to port 443 |
2019-12-28 17:42:45 |