城市(city): unknown
省份(region): unknown
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.134.181.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45213
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;102.134.181.94. IN A
;; AUTHORITY SECTION:
. 449 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 22:39:06 CST 2022
;; MSG SIZE rcvd: 107
Host 94.181.134.102.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 94.181.134.102.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 194.26.25.40 | attackbotsspam | Port scan on 12 port(s): 4192 4234 4343 4449 4891 4937 5484 5609 5719 5827 5845 5977 |
2020-08-23 20:24:27 |
| 61.95.233.61 | attackspam | Invalid user jacob from 61.95.233.61 port 59504 |
2020-08-23 20:16:59 |
| 51.255.35.41 | attack | Aug 23 12:20:25 scw-focused-cartwright sshd[15189]: Failed password for root from 51.255.35.41 port 41573 ssh2 Aug 23 12:25:30 scw-focused-cartwright sshd[15261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.41 |
2020-08-23 20:33:06 |
| 34.105.191.238 | attackspambots | Lines containing failures of 34.105.191.238 Aug 20 21:38:51 mc sshd[26653]: Invalid user bao from 34.105.191.238 port 42280 Aug 20 21:38:51 mc sshd[26653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.105.191.238 Aug 20 21:38:52 mc sshd[26653]: Failed password for invalid user bao from 34.105.191.238 port 42280 ssh2 Aug 20 21:38:53 mc sshd[26653]: Received disconnect from 34.105.191.238 port 42280:11: Bye Bye [preauth] Aug 20 21:38:53 mc sshd[26653]: Disconnected from invalid user bao 34.105.191.238 port 42280 [preauth] Aug 20 21:44:42 mc sshd[26750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.105.191.238 user=r.r Aug 20 21:44:43 mc sshd[26750]: Failed password for r.r from 34.105.191.238 port 46158 ssh2 Aug 20 21:44:45 mc sshd[26750]: Received disconnect from 34.105.191.238 port 46158:11: Bye Bye [preauth] Aug 20 21:44:45 mc sshd[26750]: Disconnected from authenticating user r........ ------------------------------ |
2020-08-23 20:31:39 |
| 222.186.173.154 | attackspam | Aug 23 14:31:26 cosmoit sshd[7996]: Failed password for root from 222.186.173.154 port 15140 ssh2 |
2020-08-23 20:32:15 |
| 186.96.100.50 | attackspam | IP 186.96.100.50 attacked honeypot on port: 8080 at 8/23/2020 5:24:11 AM |
2020-08-23 20:57:14 |
| 212.70.149.68 | attack | Aug 22 07:06:23 web01.agentur-b-2.de postfix/smtps/smtpd[2843074]: lost connection after CONNECT from unknown[212.70.149.68] Aug 22 07:07:42 web01.agentur-b-2.de postfix/smtps/smtpd[2843074]: lost connection after CONNECT from unknown[212.70.149.68] Aug 22 07:10:09 web01.agentur-b-2.de postfix/smtps/smtpd[2844305]: lost connection after CONNECT from unknown[212.70.149.68] Aug 22 07:13:02 web01.agentur-b-2.de postfix/smtps/smtpd[2844829]: lost connection after CONNECT from unknown[212.70.149.68] Aug 22 07:14:30 web01.agentur-b-2.de postfix/smtps/smtpd[2844829]: lost connection after CONNECT from unknown[212.70.149.68] |
2020-08-23 20:53:04 |
| 93.104.213.105 | attackbotsspam | Aug 23 06:14:06 Host-KLAX-C sshd[22823]: Invalid user clive from 93.104.213.105 port 49008 ... |
2020-08-23 20:20:29 |
| 68.183.150.201 | attackbotsspam | *Port Scan* detected from 68.183.150.201 (US/United States/New Jersey/Clifton/-). 4 hits in the last 120 seconds |
2020-08-23 20:44:48 |
| 122.14.47.18 | attackbotsspam | Aug 23 08:25:00 Tower sshd[37778]: Connection from 122.14.47.18 port 39177 on 192.168.10.220 port 22 rdomain "" Aug 23 08:25:02 Tower sshd[37778]: Invalid user fernanda from 122.14.47.18 port 39177 Aug 23 08:25:02 Tower sshd[37778]: error: Could not get shadow information for NOUSER Aug 23 08:25:02 Tower sshd[37778]: Failed password for invalid user fernanda from 122.14.47.18 port 39177 ssh2 Aug 23 08:25:02 Tower sshd[37778]: Received disconnect from 122.14.47.18 port 39177:11: Bye Bye [preauth] Aug 23 08:25:02 Tower sshd[37778]: Disconnected from invalid user fernanda 122.14.47.18 port 39177 [preauth] |
2020-08-23 20:58:54 |
| 181.29.74.195 | attackspambots | Aug 21 05:05:37 our-server-hostname sshd[8853]: reveeclipse mapping checking getaddrinfo for 195-74-29-181.fibertel.com.ar [181.29.74.195] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 21 05:05:37 our-server-hostname sshd[8853]: Invalid user deployer from 181.29.74.195 Aug 21 05:05:37 our-server-hostname sshd[8853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.29.74.195 Aug 21 05:05:40 our-server-hostname sshd[8853]: Failed password for invalid user deployer from 181.29.74.195 port 44084 ssh2 Aug 21 05:13:09 our-server-hostname sshd[10164]: reveeclipse mapping checking getaddrinfo for 195-74-29-181.fibertel.com.ar [181.29.74.195] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 21 05:13:09 our-server-hostname sshd[10164]: Invalid user pentaho from 181.29.74.195 Aug 21 05:13:09 our-server-hostname sshd[10164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.29.74.195 ........ ----------------------------------------------- https:// |
2020-08-23 20:30:10 |
| 51.83.131.123 | attackspam | Aug 23 14:25:27 cosmoit sshd[7523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.131.123 |
2020-08-23 20:36:48 |
| 190.21.56.179 | attackbots | 2020-08-23T12:41:13.844376shield sshd\[21227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190-21-56-179.baf.movistar.cl user=root 2020-08-23T12:41:15.840119shield sshd\[21227\]: Failed password for root from 190.21.56.179 port 39286 ssh2 2020-08-23T12:45:31.880137shield sshd\[22541\]: Invalid user front from 190.21.56.179 port 39338 2020-08-23T12:45:31.889199shield sshd\[22541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190-21-56-179.baf.movistar.cl 2020-08-23T12:45:34.337195shield sshd\[22541\]: Failed password for invalid user front from 190.21.56.179 port 39338 ssh2 |
2020-08-23 20:56:40 |
| 154.204.30.164 | attackspam | Aug 20 23:58:45 HOST sshd[22333]: Failed password for invalid user aiz from 154.204.30.164 port 52824 ssh2 Aug 20 23:58:45 HOST sshd[22333]: Received disconnect from 154.204.30.164: 11: Bye Bye [preauth] Aug 21 00:06:56 HOST sshd[22558]: Failed password for invalid user wq from 154.204.30.164 port 48583 ssh2 Aug 21 00:06:57 HOST sshd[22558]: Received disconnect from 154.204.30.164: 11: Bye Bye [preauth] Aug 21 00:09:17 HOST sshd[22674]: Failed password for invalid user cent from 154.204.30.164 port 42253 ssh2 Aug 21 00:09:18 HOST sshd[22674]: Received disconnect from 154.204.30.164: 11: Bye Bye [preauth] Aug 21 00:11:41 HOST sshd[22768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.204.30.164 user=r.r Aug 21 00:11:43 HOST sshd[22768]: Failed password for r.r from 154.204.30.164 port 35924 ssh2 Aug 21 00:11:43 HOST sshd[22768]: Received disconnect from 154.204.30.164: 11: Bye Bye [preauth] Aug 21 00:14:09 HOST sshd[22780]: ........ ------------------------------- |
2020-08-23 20:44:13 |
| 114.67.85.74 | attackspambots | Aug 23 14:20:24 home sshd[3716598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.85.74 Aug 23 14:20:24 home sshd[3716598]: Invalid user debian from 114.67.85.74 port 60212 Aug 23 14:20:26 home sshd[3716598]: Failed password for invalid user debian from 114.67.85.74 port 60212 ssh2 Aug 23 14:25:12 home sshd[3718563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.85.74 user=root Aug 23 14:25:14 home sshd[3718563]: Failed password for root from 114.67.85.74 port 33718 ssh2 ... |
2020-08-23 20:51:33 |