城市(city): unknown
省份(region): unknown
国家(country): Austria
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.64.139.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6876
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;80.64.139.101. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020101 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 05:57:52 CST 2025
;; MSG SIZE rcvd: 106
Host 101.139.64.80.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 101.139.64.80.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
123.207.92.254 | attackspam | Nov 26 07:29:39 lnxweb61 sshd[8048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.92.254 |
2019-11-26 15:19:33 |
51.83.73.160 | attackbots | Nov 26 07:22:03 Invalid user admin from 51.83.73.160 port 42794 |
2019-11-26 15:06:38 |
112.85.42.180 | attackbots | Nov 26 12:10:47 gw1 sshd[10707]: Failed password for root from 112.85.42.180 port 29778 ssh2 Nov 26 12:11:00 gw1 sshd[10707]: error: maximum authentication attempts exceeded for root from 112.85.42.180 port 29778 ssh2 [preauth] ... |
2019-11-26 15:26:26 |
46.166.151.47 | attack | \[2019-11-26 01:53:22\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-26T01:53:22.761-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="002146462607501",SessionID="0x7f26c4715dc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/50525",ACLName="no_extension_match" \[2019-11-26 01:54:45\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-26T01:54:45.055-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0002146462607501",SessionID="0x7f26c4715dc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/56782",ACLName="no_extension_match" \[2019-11-26 01:56:02\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-26T01:56:02.946-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00146462607501",SessionID="0x7f26c46b9ac8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/54930",ACLName="no_ext |
2019-11-26 15:19:13 |
77.77.149.170 | attackbots | Detected by ModSecurity. Request URI: /.well-known/pki-validation/760F43E49E84AD0F9CD57D5AFEAE61DC.txt |
2019-11-26 15:35:44 |
61.153.189.140 | attack | Nov 26 01:47:35 linuxvps sshd\[62706\]: Invalid user plastina from 61.153.189.140 Nov 26 01:47:35 linuxvps sshd\[62706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.153.189.140 Nov 26 01:47:36 linuxvps sshd\[62706\]: Failed password for invalid user plastina from 61.153.189.140 port 43676 ssh2 Nov 26 01:55:01 linuxvps sshd\[1949\]: Invalid user mozek from 61.153.189.140 Nov 26 01:55:01 linuxvps sshd\[1949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.153.189.140 |
2019-11-26 15:01:54 |
212.64.91.66 | attackspam | Nov 26 07:08:06 hcbbdb sshd\[24821\]: Invalid user kathryn123 from 212.64.91.66 Nov 26 07:08:06 hcbbdb sshd\[24821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.91.66 Nov 26 07:08:08 hcbbdb sshd\[24821\]: Failed password for invalid user kathryn123 from 212.64.91.66 port 46650 ssh2 Nov 26 07:15:24 hcbbdb sshd\[25589\]: Invalid user copper from 212.64.91.66 Nov 26 07:15:24 hcbbdb sshd\[25589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.91.66 |
2019-11-26 15:27:28 |
66.70.149.101 | attackspambots | Time: Tue Nov 26 03:26:03 2019 -0300 IP: 66.70.149.101 (CA/Canada/-) Failures: 15 (smtpauth) Interval: 3600 seconds Blocked: Permanent Block |
2019-11-26 15:01:01 |
14.225.5.229 | attack | firewall-block, port(s): 3389/tcp |
2019-11-26 15:07:27 |
201.93.196.241 | attack | 2019-11-26T06:29:14.608189abusebot-7.cloudsearch.cf sshd\[20804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201-93-196-241.dsl.telesp.net.br user=root |
2019-11-26 15:37:33 |
218.92.0.164 | attackbots | Nov 26 10:07:20 hosting sshd[3584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.164 user=root Nov 26 10:07:22 hosting sshd[3584]: Failed password for root from 218.92.0.164 port 9511 ssh2 ... |
2019-11-26 15:16:09 |
45.136.108.85 | attackspambots | SSH bruteforce (Triggered fail2ban) Nov 26 08:27:52 dev1 sshd[145566]: Disconnecting invalid user 0 45.136.108.85 port 63478: Change of username or service not allowed: (0,ssh-connection) -> (22,ssh-connection) [preauth] |
2019-11-26 15:35:13 |
201.231.215.188 | attack | TCP Port Scanning |
2019-11-26 15:15:56 |
45.85.213.167 | attackbots | Fail2Ban Ban Triggered |
2019-11-26 15:15:07 |
61.177.172.128 | attack | Nov 26 08:30:45 [host] sshd[16943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128 user=root Nov 26 08:30:47 [host] sshd[16943]: Failed password for root from 61.177.172.128 port 59861 ssh2 Nov 26 08:31:06 [host] sshd[16945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128 user=root |
2019-11-26 15:34:14 |