城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.131.50.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.131.50.75. IN A
;; AUTHORITY SECTION:
. 247 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030300 1800 900 604800 86400
;; Query time: 133 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 03 23:56:03 CST 2022
;; MSG SIZE rcvd: 106
75.50.131.103.in-addr.arpa domain name pointer host.131.50.75.colo.co.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
75.50.131.103.in-addr.arpa name = host.131.50.75.colo.co.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 193.194.91.56 | attackbots | Aug 24 05:39:47 amida sshd[610674]: Invalid user director from 193.194.91.56 Aug 24 05:39:47 amida sshd[610674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.91.56 Aug 24 05:39:49 amida sshd[610674]: Failed password for invalid user director from 193.194.91.56 port 38284 ssh2 Aug 24 05:39:49 amida sshd[610674]: Received disconnect from 193.194.91.56: 11: Bye Bye [preauth] Aug 24 05:45:56 amida sshd[612713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.91.56 user=r.r Aug 24 05:45:59 amida sshd[612713]: Failed password for r.r from 193.194.91.56 port 48482 ssh2 Aug 24 05:45:59 amida sshd[612713]: Received disconnect from 193.194.91.56: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=193.194.91.56 |
2019-08-25 05:23:12 |
| 193.70.32.148 | attackbotsspam | Aug 24 21:02:02 ip-172-31-1-72 sshd\[25912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.32.148 user=ubuntu Aug 24 21:02:04 ip-172-31-1-72 sshd\[25912\]: Failed password for ubuntu from 193.70.32.148 port 51548 ssh2 Aug 24 21:05:53 ip-172-31-1-72 sshd\[25988\]: Invalid user admin from 193.70.32.148 Aug 24 21:05:53 ip-172-31-1-72 sshd\[25988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.32.148 Aug 24 21:05:55 ip-172-31-1-72 sshd\[25988\]: Failed password for invalid user admin from 193.70.32.148 port 37412 ssh2 |
2019-08-25 05:24:09 |
| 14.143.245.11 | attack | Aug 24 22:09:16 vserver sshd\[28465\]: Invalid user git1 from 14.143.245.11Aug 24 22:09:18 vserver sshd\[28465\]: Failed password for invalid user git1 from 14.143.245.11 port 17363 ssh2Aug 24 22:14:29 vserver sshd\[28480\]: Invalid user send from 14.143.245.11Aug 24 22:14:31 vserver sshd\[28480\]: Failed password for invalid user send from 14.143.245.11 port 4105 ssh2 ... |
2019-08-25 05:42:54 |
| 165.227.60.103 | attackbotsspam | Aug 24 23:39:40 meumeu sshd[20501]: Failed password for invalid user vpopmail from 165.227.60.103 port 58902 ssh2 Aug 24 23:43:55 meumeu sshd[21159]: Failed password for invalid user hive from 165.227.60.103 port 47434 ssh2 Aug 24 23:48:07 meumeu sshd[21619]: Failed password for invalid user marylyn from 165.227.60.103 port 35970 ssh2 ... |
2019-08-25 05:49:19 |
| 5.39.89.155 | attackspam | Aug 24 11:44:16 php2 sshd\[16879\]: Invalid user vpn from 5.39.89.155 Aug 24 11:44:16 php2 sshd\[16879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3276677.ip-5-39-89.eu Aug 24 11:44:18 php2 sshd\[16879\]: Failed password for invalid user vpn from 5.39.89.155 port 37150 ssh2 Aug 24 11:48:02 php2 sshd\[17198\]: Invalid user gitlab from 5.39.89.155 Aug 24 11:48:02 php2 sshd\[17198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3276677.ip-5-39-89.eu |
2019-08-25 05:52:48 |
| 181.49.117.136 | attackspam | Multiple SSH auth failures recorded by fail2ban |
2019-08-25 05:28:17 |
| 41.211.107.34 | attackspambots | Telnet/23 MH Probe, BF, Hack - |
2019-08-25 05:57:27 |
| 189.38.173.209 | attackspambots | Aug 24 21:38:41 www sshd\[126615\]: Invalid user sk from 189.38.173.209 Aug 24 21:38:41 www sshd\[126615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.38.173.209 Aug 24 21:38:42 www sshd\[126615\]: Failed password for invalid user sk from 189.38.173.209 port 54236 ssh2 ... |
2019-08-25 05:34:57 |
| 222.186.42.117 | attackspambots | 19/8/24@17:50:57: FAIL: IoT-SSH address from=222.186.42.117 ... |
2019-08-25 06:01:05 |
| 51.75.126.28 | attackspambots | Aug 24 14:19:31 minden010 sshd[27935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.126.28 Aug 24 14:19:33 minden010 sshd[27935]: Failed password for invalid user azman from 51.75.126.28 port 52510 ssh2 Aug 24 14:23:30 minden010 sshd[29412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.126.28 ... |
2019-08-25 05:43:59 |
| 165.22.61.82 | attack | Aug 24 16:14:55 aat-srv002 sshd[27930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.82 Aug 24 16:14:58 aat-srv002 sshd[27930]: Failed password for invalid user bertram from 165.22.61.82 port 43782 ssh2 Aug 24 16:19:31 aat-srv002 sshd[28045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.82 Aug 24 16:19:33 aat-srv002 sshd[28045]: Failed password for invalid user lilycity from 165.22.61.82 port 60848 ssh2 ... |
2019-08-25 05:44:16 |
| 128.199.177.224 | attack | 2019-08-24T21:16:09.443124abusebot-2.cloudsearch.cf sshd\[1910\]: Invalid user ingres from 128.199.177.224 port 37780 |
2019-08-25 05:37:45 |
| 192.144.186.77 | attack | Aug 24 04:04:23 web1 sshd\[28478\]: Invalid user compnf from 192.144.186.77 Aug 24 04:04:23 web1 sshd\[28478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.186.77 Aug 24 04:04:25 web1 sshd\[28478\]: Failed password for invalid user compnf from 192.144.186.77 port 45126 ssh2 Aug 24 04:09:05 web1 sshd\[28933\]: Invalid user harley from 192.144.186.77 Aug 24 04:09:05 web1 sshd\[28933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.186.77 |
2019-08-25 05:32:41 |
| 222.186.15.160 | attack | Aug 24 11:20:11 debian sshd[19040]: Unable to negotiate with 222.186.15.160 port 23796: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Aug 24 17:48:48 debian sshd[5871]: Unable to negotiate with 222.186.15.160 port 33426: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2019-08-25 05:55:46 |
| 104.248.117.10 | attackbots | ssh failed login |
2019-08-25 05:42:37 |