城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.92.142.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35095
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;100.92.142.249. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:49:36 CST 2025
;; MSG SIZE rcvd: 107
Host 249.142.92.100.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 249.142.92.100.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.82.66.181 | attack | Apr 11 10:40:47 gw1 sshd[7166]: Failed password for root from 192.82.66.181 port 57643 ssh2 ... |
2020-04-11 15:51:12 |
| 112.133.195.55 | attack | SSH Brute-Forcing (server2) |
2020-04-11 15:52:51 |
| 120.70.100.215 | attackspambots | Apr 11 05:45:52 ns382633 sshd\[5413\]: Invalid user srvadmin from 120.70.100.215 port 38370 Apr 11 05:45:52 ns382633 sshd\[5413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.215 Apr 11 05:45:54 ns382633 sshd\[5413\]: Failed password for invalid user srvadmin from 120.70.100.215 port 38370 ssh2 Apr 11 05:52:08 ns382633 sshd\[6404\]: Invalid user system from 120.70.100.215 port 45967 Apr 11 05:52:08 ns382633 sshd\[6404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.215 |
2020-04-11 15:30:50 |
| 157.100.58.254 | attackspam | (sshd) Failed SSH login from 157.100.58.254 (EC/Ecuador/Provincia de Pichincha/-/host-157-100-58-254.nedetel.net/[AS264668 NEDETEL S.A.]): 1 in the last 3600 secs |
2020-04-11 15:22:17 |
| 105.229.52.149 | attackbotsspam | Invalid user musicbot from 105.229.52.149 port 51626 |
2020-04-11 15:19:53 |
| 51.15.108.244 | attackbots | Apr 11 08:24:05 DAAP sshd[14183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.108.244 user=root Apr 11 08:24:08 DAAP sshd[14183]: Failed password for root from 51.15.108.244 port 60606 ssh2 Apr 11 08:29:19 DAAP sshd[14252]: Invalid user pro from 51.15.108.244 port 57044 Apr 11 08:29:19 DAAP sshd[14252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.108.244 Apr 11 08:29:19 DAAP sshd[14252]: Invalid user pro from 51.15.108.244 port 57044 Apr 11 08:29:20 DAAP sshd[14252]: Failed password for invalid user pro from 51.15.108.244 port 57044 ssh2 ... |
2020-04-11 15:45:16 |
| 62.210.206.78 | attackbotsspam | Apr 11 08:27:56 plex sshd[25451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.206.78 user=root Apr 11 08:27:58 plex sshd[25451]: Failed password for root from 62.210.206.78 port 49174 ssh2 |
2020-04-11 15:44:37 |
| 75.130.124.90 | attack | Invalid user admin from 75.130.124.90 port 39690 |
2020-04-11 15:39:38 |
| 51.158.120.255 | attackbots | SSH login attempts. |
2020-04-11 15:11:51 |
| 154.221.29.184 | attackspam | SSH Brute-Force reported by Fail2Ban |
2020-04-11 15:50:04 |
| 222.186.175.84 | attack | Apr 11 06:44:26 server2 sshd\[24477\]: User root from 222.186.175.84 not allowed because not listed in AllowUsers Apr 11 06:46:26 server2 sshd\[24701\]: User root from 222.186.175.84 not allowed because not listed in AllowUsers Apr 11 06:47:34 server2 sshd\[24756\]: Invalid user ntps from 222.186.175.84 Apr 11 06:49:20 server2 sshd\[24820\]: User root from 222.186.175.84 not allowed because not listed in AllowUsers Apr 11 06:50:39 server2 sshd\[25032\]: User root from 222.186.175.84 not allowed because not listed in AllowUsers Apr 11 06:52:23 server2 sshd\[25103\]: User root from 222.186.175.84 not allowed because not listed in AllowUsers |
2020-04-11 15:23:28 |
| 222.186.175.140 | attackbotsspam | port scan and connect, tcp 22 (ssh) |
2020-04-11 15:31:40 |
| 94.199.198.137 | attackspam | Apr 11 08:09:29 sigma sshd\[14377\]: Failed password for root from 94.199.198.137 port 37562 ssh2Apr 11 08:12:25 sigma sshd\[14549\]: Invalid user zxin10 from 94.199.198.137 ... |
2020-04-11 15:33:35 |
| 189.112.40.45 | attack | 1586577103 - 04/11/2020 05:51:43 Host: 189.112.40.45/189.112.40.45 Port: 445 TCP Blocked |
2020-04-11 15:49:04 |
| 163.44.159.123 | attack | Apr 11 02:54:40 ny01 sshd[20820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.159.123 Apr 11 02:54:43 ny01 sshd[20820]: Failed password for invalid user webmaster from 163.44.159.123 port 35794 ssh2 Apr 11 02:58:19 ny01 sshd[21745]: Failed password for root from 163.44.159.123 port 38090 ssh2 |
2020-04-11 15:14:18 |