城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.144.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.144.144.50. IN A
;; AUTHORITY SECTION:
. 408 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:21:54 CST 2022
;; MSG SIZE rcvd: 107
50.144.144.104.in-addr.arpa domain name pointer 50.144.144.104.in-addr.arpa.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
50.144.144.104.in-addr.arpa name = 50.144.144.104.in-addr.arpa.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 115.59.24.200 | attackspam | Jun 22 12:21:23 w sshd[28320]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [115.59.24.200] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 22 12:21:23 w sshd[28320]: Invalid user usuario from 115.59.24.200 Jun 22 12:21:23 w sshd[28320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.59.24.200 Jun 22 12:21:25 w sshd[28320]: Failed password for invalid user usuario from 115.59.24.200 port 40236 ssh2 Jun 22 12:21:28 w sshd[28320]: Failed password for invalid user usuario from 115.59.24.200 port 40236 ssh2 Jun 22 12:21:30 w sshd[28320]: Failed password for invalid user usuario from 115.59.24.200 port 40236 ssh2 Jun 22 12:21:32 w sshd[28320]: Failed password for invalid user usuario from 115.59.24.200 port 40236 ssh2 Jun 22 12:21:35 w sshd[28320]: Failed password for invalid user usuario from 115.59.24.200 port 40236 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=115.59.24.200 |
2019-06-22 17:49:24 |
| 115.135.139.117 | attackspambots | Jun 19 21:58:52 ntop sshd[7772]: Invalid user ts3server from 115.135.139.117 port 51815 Jun 19 21:58:54 ntop sshd[7772]: Failed password for invalid user ts3server from 115.135.139.117 port 51815 ssh2 Jun 19 21:58:54 ntop sshd[7772]: Received disconnect from 115.135.139.117 port 51815:11: Bye Bye [preauth] Jun 19 21:58:54 ntop sshd[7772]: Disconnected from 115.135.139.117 port 51815 [preauth] Jun 19 22:01:02 ntop sshd[9403]: Invalid user qi from 115.135.139.117 port 33459 Jun 19 22:01:04 ntop sshd[9403]: Failed password for invalid user qi from 115.135.139.117 port 33459 ssh2 Jun 19 22:01:04 ntop sshd[9403]: Received disconnect from 115.135.139.117 port 33459:11: Bye Bye [preauth] Jun 19 22:01:04 ntop sshd[9403]: Disconnected from 115.135.139.117 port 33459 [preauth] Jun 19 22:02:22 ntop sshd[15719]: Invalid user test from 115.135.139.117 port 40005 Jun 19 22:02:24 ntop sshd[15719]: Failed password for invalid user test from 115.135.139.117 port 40005 ssh2 Jun 19 22:02:........ ------------------------------- |
2019-06-22 18:02:48 |
| 103.94.130.4 | attackspambots | Invalid user cube from 103.94.130.4 port 41059 |
2019-06-22 18:05:33 |
| 89.103.27.45 | attack | Jun 22 02:11:48 plusreed sshd[32320]: Invalid user marketing from 89.103.27.45 ... |
2019-06-22 17:56:48 |
| 191.53.249.136 | attack | SMTP-sasl brute force ... |
2019-06-22 17:21:16 |
| 125.99.43.6 | attackbots | Jun 22 04:28:02 MK-Soft-VM5 sshd\[29126\]: Invalid user user9 from 125.99.43.6 port 49504 Jun 22 04:28:02 MK-Soft-VM5 sshd\[29126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.99.43.6 Jun 22 04:28:04 MK-Soft-VM5 sshd\[29126\]: Failed password for invalid user user9 from 125.99.43.6 port 49504 ssh2 ... |
2019-06-22 17:36:32 |
| 125.136.181.85 | attackspambots | Autoban 125.136.181.85 AUTH/CONNECT |
2019-06-22 18:12:05 |
| 192.160.102.168 | attackspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.160.102.168 user=root Failed password for root from 192.160.102.168 port 45411 ssh2 Failed password for root from 192.160.102.168 port 45411 ssh2 Failed password for root from 192.160.102.168 port 45411 ssh2 Failed password for root from 192.160.102.168 port 45411 ssh2 |
2019-06-22 17:37:33 |
| 190.166.155.161 | attackspambots | SSH-bruteforce attempts |
2019-06-22 17:21:36 |
| 188.166.178.121 | attackspam | Jun 22 06:29:23 ns3110291 sshd\[26852\]: Failed password for root from 188.166.178.121 port 56566 ssh2 Jun 22 06:29:27 ns3110291 sshd\[26855\]: Failed password for root from 188.166.178.121 port 56690 ssh2 Jun 22 06:29:32 ns3110291 sshd\[26921\]: Failed password for root from 188.166.178.121 port 56815 ssh2 Jun 22 06:29:35 ns3110291 sshd\[26927\]: Invalid user stanley from 188.166.178.121 Jun 22 06:29:37 ns3110291 sshd\[26927\]: Failed password for invalid user stanley from 188.166.178.121 port 56945 ssh2 ... |
2019-06-22 17:08:47 |
| 193.32.161.150 | attackbots | Jun 22 05:39:24 TCP Attack: SRC=193.32.161.150 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=244 PROTO=TCP SPT=41826 DPT=33923 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-06-22 17:29:34 |
| 158.69.192.35 | attackspam | Jun 19 02:22:19 shared10 sshd[25012]: Invalid user wwwrun from 158.69.192.35 Jun 19 02:22:19 shared10 sshd[25012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.35 Jun 19 02:22:21 shared10 sshd[25012]: Failed password for invalid user wwwrun from 158.69.192.35 port 35008 ssh2 Jun 19 02:22:21 shared10 sshd[25012]: Received disconnect from 158.69.192.35 port 35008:11: Bye Bye [preauth] Jun 19 02:22:21 shared10 sshd[25012]: Disconnected from 158.69.192.35 port 35008 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=158.69.192.35 |
2019-06-22 17:31:47 |
| 92.246.76.123 | attackbotsspam | port scan and connect, tcp 5631 (pcanywheredata) |
2019-06-22 17:23:14 |
| 218.69.91.84 | attack | Jun 22 05:26:23 MK-Soft-VM7 sshd\[28203\]: Invalid user postgres from 218.69.91.84 port 46231 Jun 22 05:26:23 MK-Soft-VM7 sshd\[28203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.91.84 Jun 22 05:26:25 MK-Soft-VM7 sshd\[28203\]: Failed password for invalid user postgres from 218.69.91.84 port 46231 ssh2 ... |
2019-06-22 18:07:15 |
| 27.118.20.236 | attackbots | Automatic report - Web App Attack |
2019-06-22 17:39:05 |