城市(city): unknown
省份(region): unknown
国家(country): Indonesia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.140.55.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30955
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.140.55.222. IN A
;; AUTHORITY SECTION:
. 430 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023021100 1800 900 604800 86400
;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 11 22:22:57 CST 2023
;; MSG SIZE rcvd: 107
Host 222.55.140.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 222.55.140.103.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.175.202 | attackbots | Oct 7 22:29:19 MK-Soft-VM7 sshd[21285]: Failed password for root from 222.186.175.202 port 62872 ssh2 Oct 7 22:29:24 MK-Soft-VM7 sshd[21285]: Failed password for root from 222.186.175.202 port 62872 ssh2 ... |
2019-10-08 04:34:54 |
| 182.61.166.148 | attackspambots | Oct 7 09:32:50 srv05 sshd[20525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.148 user=r.r Oct 7 09:32:51 srv05 sshd[20525]: Failed password for r.r from 182.61.166.148 port 57038 ssh2 Oct 7 09:32:52 srv05 sshd[20525]: Received disconnect from 182.61.166.148: 11: Bye Bye [preauth] Oct 7 09:55:34 srv05 sshd[21834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.148 user=r.r Oct 7 09:55:35 srv05 sshd[21834]: Failed password for r.r from 182.61.166.148 port 55422 ssh2 Oct 7 09:55:36 srv05 sshd[21834]: Received disconnect from 182.61.166.148: 11: Bye Bye [preauth] Oct 7 09:59:53 srv05 sshd[22017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.148 user=r.r Oct 7 09:59:55 srv05 sshd[22017]: Failed password for r.r from 182.61.166.148 port 40102 ssh2 Oct 7 09:59:55 srv05 sshd[22017]: Received disconnect from........ ------------------------------- |
2019-10-08 04:22:31 |
| 168.121.43.233 | attackspam | Automatic report - Port Scan Attack |
2019-10-08 04:00:25 |
| 165.227.45.246 | attackspambots | 2019-10-07T20:24:19.050250abusebot-7.cloudsearch.cf sshd\[12213\]: Invalid user Caramel!23 from 165.227.45.246 port 44698 |
2019-10-08 04:24:55 |
| 196.41.17.62 | attackbots | 2019-10-07 14:53:09 H=(luxexcess.it) [196.41.17.62]:49554 I=[192.147.25.65]:25 F= |
2019-10-08 04:32:38 |
| 14.189.75.169 | attackbots | Lines containing failures of 14.189.75.169 Oct 7 02:38:16 shared11 sshd[14036]: Invalid user admin from 14.189.75.169 port 32868 Oct 7 02:38:16 shared11 sshd[14036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.189.75.169 Oct 7 02:38:18 shared11 sshd[14036]: Failed password for invalid user admin from 14.189.75.169 port 32868 ssh2 Oct 7 02:38:19 shared11 sshd[14036]: Connection closed by invalid user admin 14.189.75.169 port 32868 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=14.189.75.169 |
2019-10-08 04:06:44 |
| 198.199.72.42 | attackbots | Oct 7 06:58:49 HOST sshd[25715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.72.42 user=r.r Oct 7 06:58:51 HOST sshd[25715]: Failed password for r.r from 198.199.72.42 port 55830 ssh2 Oct 7 06:58:51 HOST sshd[25715]: Connection closed by 198.199.72.42 [preauth] Oct 7 06:58:52 HOST sshd[25717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.72.42 user=r.r Oct 7 06:58:54 HOST sshd[25717]: Failed password for r.r from 198.199.72.42 port 56210 ssh2 Oct 7 06:58:54 HOST sshd[25717]: Connection closed by 198.199.72.42 [preauth] Oct 7 06:58:55 HOST sshd[25719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.72.42 user=r.r Oct 7 06:58:58 HOST sshd[25719]: Failed password for r.r from 198.199.72.42 port 56720 ssh2 Oct 7 06:58:58 HOST sshd[25719]: Connection closed by 198.199.72.42 [preauth] Oct 7 06:58:58 HOST sshd[2572........ ------------------------------- |
2019-10-08 04:35:18 |
| 222.186.175.212 | attack | Oct 7 16:01:01 debian sshd\[16618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212 user=root Oct 7 16:01:03 debian sshd\[16618\]: Failed password for root from 222.186.175.212 port 33628 ssh2 Oct 7 16:01:07 debian sshd\[16618\]: Failed password for root from 222.186.175.212 port 33628 ssh2 ... |
2019-10-08 04:05:25 |
| 45.40.194.129 | attack | 2019-10-07T15:54:45.4570361495-001 sshd\[62408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.194.129 user=root 2019-10-07T15:54:47.0272921495-001 sshd\[62408\]: Failed password for root from 45.40.194.129 port 46714 ssh2 2019-10-07T15:58:15.6804551495-001 sshd\[62715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.194.129 user=root 2019-10-07T15:58:17.4119881495-001 sshd\[62715\]: Failed password for root from 45.40.194.129 port 51556 ssh2 2019-10-07T16:01:53.7422141495-001 sshd\[63057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.194.129 user=root 2019-10-07T16:01:56.0702311495-001 sshd\[63057\]: Failed password for root from 45.40.194.129 port 56402 ssh2 ... |
2019-10-08 04:28:19 |
| 14.29.162.139 | attack | 2019-10-07T23:03:47.608175tmaserv sshd\[15912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=root 2019-10-07T23:03:49.252991tmaserv sshd\[15912\]: Failed password for root from 14.29.162.139 port 49903 ssh2 2019-10-07T23:07:27.640622tmaserv sshd\[16076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=root 2019-10-07T23:07:29.486004tmaserv sshd\[16076\]: Failed password for root from 14.29.162.139 port 26240 ssh2 2019-10-07T23:11:15.928499tmaserv sshd\[16255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.162.139 user=root 2019-10-07T23:11:18.411608tmaserv sshd\[16255\]: Failed password for root from 14.29.162.139 port 59088 ssh2 ... |
2019-10-08 04:26:44 |
| 82.131.160.70 | attackspam | Automatic report - XMLRPC Attack |
2019-10-08 04:12:59 |
| 103.92.84.102 | attack | Oct 7 16:28:44 plusreed sshd[11369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.84.102 user=root Oct 7 16:28:46 plusreed sshd[11369]: Failed password for root from 103.92.84.102 port 48730 ssh2 ... |
2019-10-08 04:34:06 |
| 185.50.25.16 | attackspambots | loopsrockreggae.com 185.50.25.16 \[07/Oct/2019:21:53:51 +0200\] "POST /wp-login.php HTTP/1.1" 200 5615 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" loopsrockreggae.com 185.50.25.16 \[07/Oct/2019:21:53:52 +0200\] "POST /wp-login.php HTTP/1.1" 200 5583 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-08 04:07:05 |
| 89.46.78.147 | attackspam | 10/07/2019-21:54:03.601871 89.46.78.147 Protocol: 17 ET SCAN Sipvicious Scan |
2019-10-08 03:59:20 |
| 69.85.70.98 | attackspam | Oct 7 20:22:19 game-panel sshd[24827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.85.70.98 Oct 7 20:22:20 game-panel sshd[24827]: Failed password for invalid user Carla@2017 from 69.85.70.98 port 41100 ssh2 Oct 7 20:26:35 game-panel sshd[25004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.85.70.98 |
2019-10-08 04:34:27 |