城市(city): unknown
省份(region): unknown
国家(country): Hong Kong
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.75.45.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4295
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.75.45.134. IN A
;; AUTHORITY SECTION:
. 231 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 18:37:42 CST 2022
;; MSG SIZE rcvd: 106
Host 134.45.75.103.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.45.75.103.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.226.131.171 | attackbots | Aug 7 11:03:52 ovpn sshd\[24078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.131.171 user=root Aug 7 11:03:54 ovpn sshd\[24078\]: Failed password for root from 188.226.131.171 port 41656 ssh2 Aug 7 11:18:38 ovpn sshd\[30018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.131.171 user=root Aug 7 11:18:41 ovpn sshd\[30018\]: Failed password for root from 188.226.131.171 port 43672 ssh2 Aug 7 11:20:30 ovpn sshd\[30758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.131.171 user=root |
2020-08-07 17:36:02 |
| 180.27.180.11 | attackspam | 20/8/6@23:51:17: FAIL: Alarm-Network address from=180.27.180.11 20/8/6@23:51:17: FAIL: Alarm-Network address from=180.27.180.11 ... |
2020-08-07 17:41:52 |
| 54.36.241.186 | attack | Aug 7 08:17:19 piServer sshd[1088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.241.186 Aug 7 08:17:21 piServer sshd[1088]: Failed password for invalid user 123qweQWE# from 54.36.241.186 port 57834 ssh2 Aug 7 08:21:43 piServer sshd[1809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.241.186 ... |
2020-08-07 17:29:05 |
| 203.210.84.117 | attackspam | 20/8/6@23:52:06: FAIL: Alarm-Network address from=203.210.84.117 ... |
2020-08-07 17:14:57 |
| 120.92.10.24 | attack | Aug 7 04:29:27 plex-server sshd[599449]: Failed password for root from 120.92.10.24 port 16756 ssh2 Aug 7 04:31:53 plex-server sshd[600489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.10.24 user=root Aug 7 04:31:55 plex-server sshd[600489]: Failed password for root from 120.92.10.24 port 46566 ssh2 Aug 7 04:34:35 plex-server sshd[601496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.10.24 user=root Aug 7 04:34:36 plex-server sshd[601496]: Failed password for root from 120.92.10.24 port 11870 ssh2 ... |
2020-08-07 17:21:19 |
| 177.200.64.116 | attackspam | Aug 7 04:58:22 mail.srvfarm.net postfix/smtps/smtpd[3172999]: warning: 177-200-64-116.static.skysever.com.br[177.200.64.116]: SASL PLAIN authentication failed: Aug 7 04:58:22 mail.srvfarm.net postfix/smtps/smtpd[3172999]: lost connection after AUTH from 177-200-64-116.static.skysever.com.br[177.200.64.116] Aug 7 05:00:17 mail.srvfarm.net postfix/smtps/smtpd[3171856]: warning: 177-200-64-116.static.skysever.com.br[177.200.64.116]: SASL PLAIN authentication failed: Aug 7 05:00:17 mail.srvfarm.net postfix/smtps/smtpd[3171856]: lost connection after AUTH from 177-200-64-116.static.skysever.com.br[177.200.64.116] Aug 7 05:06:57 mail.srvfarm.net postfix/smtpd[3188832]: warning: 177-200-64-116.static.skysever.com.br[177.200.64.116]: SASL PLAIN authentication failed: |
2020-08-07 17:08:02 |
| 35.233.73.146 | attack | xmlrpc attack |
2020-08-07 17:34:17 |
| 163.172.122.161 | attackbotsspam | k+ssh-bruteforce |
2020-08-07 17:35:38 |
| 114.67.100.239 | attackspambots | Port Scan ... |
2020-08-07 17:37:26 |
| 84.1.30.70 | attackspambots | Aug 6 09:07:16 Tower sshd[21750]: refused connect from 120.92.209.229 (120.92.209.229) Aug 7 00:26:26 Tower sshd[21750]: Connection from 84.1.30.70 port 51560 on 192.168.10.220 port 22 rdomain "" Aug 7 00:26:39 Tower sshd[21750]: Failed password for root from 84.1.30.70 port 51560 ssh2 Aug 7 00:26:39 Tower sshd[21750]: Received disconnect from 84.1.30.70 port 51560:11: Bye Bye [preauth] Aug 7 00:26:39 Tower sshd[21750]: Disconnected from authenticating user root 84.1.30.70 port 51560 [preauth] |
2020-08-07 17:43:16 |
| 62.234.74.245 | attack | Lines containing failures of 62.234.74.245 Aug 3 08:22:41 neon sshd[6100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.74.245 user=r.r Aug 3 08:22:44 neon sshd[6100]: Failed password for r.r from 62.234.74.245 port 38858 ssh2 Aug 3 08:22:46 neon sshd[6100]: Received disconnect from 62.234.74.245 port 38858:11: Bye Bye [preauth] Aug 3 08:22:46 neon sshd[6100]: Disconnected from authenticating user r.r 62.234.74.245 port 38858 [preauth] Aug 3 09:24:21 neon sshd[23829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.74.245 user=r.r Aug 3 09:24:22 neon sshd[23829]: Failed password for r.r from 62.234.74.245 port 36726 ssh2 Aug 3 09:24:23 neon sshd[23829]: Received disconnect from 62.234.74.245 port 36726:11: Bye Bye [preauth] Aug 3 09:24:23 neon sshd[23829]: Disconnected from authenticating user r.r 62.234.74.245 port 36726 [preauth] Aug 3 09:30:04 neon sshd[25524]: ........ ------------------------------ |
2020-08-07 17:25:04 |
| 182.61.43.154 | attack | Aug 7 08:17:52 ovpn sshd\[801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.154 user=root Aug 7 08:17:54 ovpn sshd\[801\]: Failed password for root from 182.61.43.154 port 59136 ssh2 Aug 7 08:36:08 ovpn sshd\[25608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.154 user=root Aug 7 08:36:10 ovpn sshd\[25608\]: Failed password for root from 182.61.43.154 port 52666 ssh2 Aug 7 08:38:40 ovpn sshd\[26640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.154 user=root |
2020-08-07 17:20:07 |
| 182.253.117.99 | attack | 2020-08-07T08:54:27.084543amanda2.illicoweb.com sshd\[37045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.117.99 user=root 2020-08-07T08:54:28.993818amanda2.illicoweb.com sshd\[37045\]: Failed password for root from 182.253.117.99 port 38866 ssh2 2020-08-07T08:56:53.411192amanda2.illicoweb.com sshd\[37536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.117.99 user=root 2020-08-07T08:56:55.696819amanda2.illicoweb.com sshd\[37536\]: Failed password for root from 182.253.117.99 port 52906 ssh2 2020-08-07T09:01:25.753833amanda2.illicoweb.com sshd\[38260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.117.99 user=root ... |
2020-08-07 17:15:12 |
| 170.83.188.254 | attackbotsspam | Aug 7 05:17:28 mail.srvfarm.net postfix/smtps/smtpd[3189133]: warning: unknown[170.83.188.254]: SASL PLAIN authentication failed: Aug 7 05:17:28 mail.srvfarm.net postfix/smtps/smtpd[3189133]: lost connection after AUTH from unknown[170.83.188.254] Aug 7 05:17:48 mail.srvfarm.net postfix/smtpd[3188833]: warning: unknown[170.83.188.254]: SASL PLAIN authentication failed: Aug 7 05:17:49 mail.srvfarm.net postfix/smtpd[3188833]: lost connection after AUTH from unknown[170.83.188.254] Aug 7 05:19:24 mail.srvfarm.net postfix/smtpd[3188838]: warning: unknown[170.83.188.254]: SASL PLAIN authentication failed: |
2020-08-07 17:09:51 |
| 123.207.121.169 | attack | Aug 7 08:58:51 ip40 sshd[25769]: Failed password for root from 123.207.121.169 port 58736 ssh2 ... |
2020-08-07 17:29:37 |