城市(city): unknown
省份(region): unknown
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.42.153.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.42.153.81. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:52:41 CST 2025
;; MSG SIZE rcvd: 105
81.153.42.93.in-addr.arpa domain name pointer 93-42-153-81.ip87.fastwebnet.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
81.153.42.93.in-addr.arpa name = 93-42-153-81.ip87.fastwebnet.it.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.235.81.116 | attackbots | Brute-force attempt banned |
2020-04-18 02:39:55 |
| 49.234.207.124 | attackbots | SSH brute-force attempt |
2020-04-18 02:41:22 |
| 182.61.184.155 | attackbotsspam | Apr 17 12:13:15 *** sshd[13081]: Invalid user tester from 182.61.184.155 |
2020-04-18 02:43:31 |
| 150.109.147.145 | attack | Apr 17 20:16:20 plex sshd[16757]: Failed password for invalid user admin from 150.109.147.145 port 48358 ssh2 Apr 17 20:16:18 plex sshd[16757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.147.145 Apr 17 20:16:18 plex sshd[16757]: Invalid user admin from 150.109.147.145 port 48358 Apr 17 20:16:20 plex sshd[16757]: Failed password for invalid user admin from 150.109.147.145 port 48358 ssh2 Apr 17 20:19:16 plex sshd[16853]: Invalid user sz from 150.109.147.145 port 55732 |
2020-04-18 02:52:37 |
| 206.189.157.45 | attack | Invalid user ak from 206.189.157.45 port 18615 |
2020-04-18 02:34:04 |
| 209.97.161.46 | attackspambots | Apr 17 20:28:00 mail sshd[28262]: Invalid user hadoop from 209.97.161.46 ... |
2020-04-18 03:05:49 |
| 167.99.70.191 | attack | 167.99.70.191 - - \[16/Apr/2020:05:21:14 +0000\] "POST /wp-login.php HTTP/1.1" 200 1791 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 167.99.70.191 - - \[16/Apr/2020:05:21:18 +0000\] "POST /wp-login.php HTTP/1.1" 200 1775 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2020-04-18 02:36:11 |
| 118.36.139.75 | attack | Unauthorized SSH login attempts |
2020-04-18 02:32:15 |
| 185.176.27.14 | attackspambots | 04/17/2020-15:02:22.292564 185.176.27.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-04-18 03:08:24 |
| 192.99.34.142 | attackspambots | 192.99.34.142 - - \[17/Apr/2020:18:26:03 +0000\] "POST /wp-login.php HTTP/1.1" 200 3778 "-" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/46.0.2490.80 Safari/537.36" "-"192.99.34.142 - - \[17/Apr/2020:18:26:48 +0000\] "POST /wp-login.php HTTP/1.1" 200 3778 "-" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/46.0.2490.80 Safari/537.36" "-"192.99.34.142 - - \[17/Apr/2020:18:27:34 +0000\] "POST /wp-login.php HTTP/1.1" 200 3778 "-" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/46.0.2490.80 Safari/537.36" "-"192.99.34.142 - - \[17/Apr/2020:18:28:18 +0000\] "POST /wp-login.php HTTP/1.1" 200 3778 "-" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/46.0.2490.80 Safari/537.36" "-"192.99.34.142 - - \[17/Apr/2020:18:29:00 +0000\] "POST /wp-login.php HTTP/1.1" 200 3778 "-" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Ch |
2020-04-18 02:40:55 |
| 46.148.20.25 | attackspambots | firewall-block, port(s): 8822/tcp |
2020-04-18 02:41:35 |
| 113.118.249.93 | attackspambots | Lines containing failures of 113.118.249.93 Apr 17 15:41:56 expertgeeks postfix/smtpd[25069]: connect from unknown[113.118.249.93] Apr x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=113.118.249.93 |
2020-04-18 02:50:18 |
| 49.81.226.119 | attack | Email rejected due to spam filtering |
2020-04-18 02:40:25 |
| 222.186.180.142 | attack | Apr 17 20:48:36 * sshd[26163]: Failed password for root from 222.186.180.142 port 40796 ssh2 |
2020-04-18 02:59:38 |
| 188.146.225.108 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/188.146.225.108/ PL - 1H : (75) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : PL NAME ASN : ASN12912 IP : 188.146.225.108 CIDR : 188.146.0.0/15 PREFIX COUNT : 11 UNIQUE IP COUNT : 651264 ATTACKS DETECTED ASN12912 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2020-04-17 12:52:08 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN - data recovery |
2020-04-18 02:48:10 |