城市(city): Tríkala
省份(region): Thessalia
国家(country): Greece
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.67.193.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.67.193.212. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:24:28 CST 2025
;; MSG SIZE rcvd: 106
212.193.67.94.in-addr.arpa domain name pointer ppp-94-67-193-212.home.otenet.gr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
212.193.67.94.in-addr.arpa name = ppp-94-67-193-212.home.otenet.gr.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 94.183.119.9 | attack | DATE:2020-03-31 23:30:47, IP:94.183.119.9, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-04-01 06:43:10 |
| 50.58.85.142 | attackbots | Unauthorized connection attempt from IP address 50.58.85.142 on Port 445(SMB) |
2020-04-01 06:36:08 |
| 139.99.105.138 | attack | Invalid user jktest from 139.99.105.138 port 50762 |
2020-04-01 06:51:31 |
| 91.134.153.204 | attackbots | Apr 1 00:35:45 vps647732 sshd[23805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.153.204 Apr 1 00:35:47 vps647732 sshd[23805]: Failed password for invalid user amssys from 91.134.153.204 port 60278 ssh2 ... |
2020-04-01 06:53:49 |
| 46.191.140.52 | attackbotsspam | Unauthorized connection attempt from IP address 46.191.140.52 on Port 445(SMB) |
2020-04-01 06:56:55 |
| 188.80.30.245 | attackbotsspam | Apr 1 04:30:57 itv-usvr-01 sshd[16668]: Invalid user pi from 188.80.30.245 Apr 1 04:30:57 itv-usvr-01 sshd[16670]: Invalid user pi from 188.80.30.245 Apr 1 04:30:57 itv-usvr-01 sshd[16668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.80.30.245 Apr 1 04:30:57 itv-usvr-01 sshd[16668]: Invalid user pi from 188.80.30.245 Apr 1 04:30:59 itv-usvr-01 sshd[16668]: Failed password for invalid user pi from 188.80.30.245 port 55680 ssh2 Apr 1 04:30:57 itv-usvr-01 sshd[16670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.80.30.245 Apr 1 04:30:57 itv-usvr-01 sshd[16670]: Invalid user pi from 188.80.30.245 Apr 1 04:30:59 itv-usvr-01 sshd[16670]: Failed password for invalid user pi from 188.80.30.245 port 59798 ssh2 |
2020-04-01 06:26:48 |
| 185.118.50.218 | attackspam | Mar 31 15:53:24 server1 sshd\[14936\]: Failed password for invalid user mariama from 185.118.50.218 port 43778 ssh2 Mar 31 15:57:54 server1 sshd\[16628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.118.50.218 user=root Mar 31 15:57:56 server1 sshd\[16628\]: Failed password for root from 185.118.50.218 port 58498 ssh2 Mar 31 16:02:26 server1 sshd\[17957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.118.50.218 user=root Mar 31 16:02:28 server1 sshd\[17957\]: Failed password for root from 185.118.50.218 port 45002 ssh2 ... |
2020-04-01 06:34:21 |
| 51.158.104.101 | attackbotsspam | web-1 [ssh] SSH Attack |
2020-04-01 06:50:34 |
| 111.229.134.68 | attackbots | Brute force SMTP login attempted. ... |
2020-04-01 06:22:34 |
| 111.203.152.87 | attackbotsspam | Brute force SMTP login attempted. ... |
2020-04-01 06:52:00 |
| 116.255.174.165 | attackbots | Mar 31 04:52:50 saengerschafter sshd[18474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.174.165 user=r.r Mar 31 04:52:52 saengerschafter sshd[18474]: Failed password for r.r from 116.255.174.165 port 45105 ssh2 Mar 31 04:52:53 saengerschafter sshd[18474]: Received disconnect from 116.255.174.165: 11: Bye Bye [preauth] Mar 31 05:02:13 saengerschafter sshd[19359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.174.165 user=r.r Mar 31 05:02:15 saengerschafter sshd[19359]: Failed password for r.r from 116.255.174.165 port 34714 ssh2 Mar 31 05:02:15 saengerschafter sshd[19359]: Received disconnect from 116.255.174.165: 11: Bye Bye [preauth] Mar 31 05:05:30 saengerschafter sshd[19737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.174.165 user=r.r Mar 31 05:05:32 saengerschafter sshd[19737]: Failed password for r.r from 116........ ------------------------------- |
2020-04-01 06:36:32 |
| 173.252.127.31 | attackspambots | [Wed Apr 01 04:30:44.265844 2020] [:error] [pid 20361:tid 140247690061568] [client 173.252.127.31:59850] [client 173.252.127.31] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/templates/protostar/favicon.ico"] [unique_id "XoO2hLFPZ-2JTpeNU@LYywAAAAE"] ... |
2020-04-01 06:46:28 |
| 62.210.100.192 | attackbotsspam | 62.210.100.192 - - \[31/Mar/2020:22:16:29 +0200\] "POST /wp-login.php HTTP/1.1" 200 9691 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 62.210.100.192 - - \[31/Mar/2020:23:30:48 +0200\] "POST /wp-login.php HTTP/1.1" 200 9691 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2020-04-01 06:41:10 |
| 93.174.93.5 | attackspam | [MK-Root1] Blocked by UFW |
2020-04-01 06:45:09 |
| 173.252.127.41 | attackbotsspam | [Wed Apr 01 04:30:35.810336 2020] [:error] [pid 20361:tid 140247698454272] [client 173.252.127.41:42494] [client 173.252.127.41] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/image-loader-worker-v1.js"] [unique_id "XoO2e7FPZ-2JTpeNU@LYuQAAAAE"] ... |
2020-04-01 06:54:38 |