城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.14.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.18.14.82. IN A
;; AUTHORITY SECTION:
. 229 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 13:52:24 CST 2022
;; MSG SIZE rcvd: 105
Host 82.14.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 82.14.18.104.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.42.116.15 | attackspambots | 2019-08-31T01:39:50.921308abusebot.cloudsearch.cf sshd\[4235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=this-is-a-tor-exit-node-hviv115.hviv.nl user=root |
2019-08-31 09:45:58 |
| 173.236.72.146 | attackspambots | xmlrpc attack |
2019-08-31 09:31:59 |
| 36.156.24.43 | attackbots | Aug 30 15:39:11 lcprod sshd\[1245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.43 user=root Aug 30 15:39:13 lcprod sshd\[1245\]: Failed password for root from 36.156.24.43 port 49162 ssh2 Aug 30 15:39:24 lcprod sshd\[1268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.43 user=root Aug 30 15:39:27 lcprod sshd\[1268\]: Failed password for root from 36.156.24.43 port 55154 ssh2 Aug 30 15:39:37 lcprod sshd\[1285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.43 user=root |
2019-08-31 09:55:32 |
| 5.23.52.172 | attackbots | 2019-08-31T01:39:37.437466abusebot-3.cloudsearch.cf sshd\[13427\]: Invalid user melinda from 5.23.52.172 port 58054 |
2019-08-31 09:56:22 |
| 124.149.253.83 | attackspambots | Aug 31 01:29:47 web8 sshd\[701\]: Invalid user santosh from 124.149.253.83 Aug 31 01:29:47 web8 sshd\[701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.149.253.83 Aug 31 01:29:49 web8 sshd\[701\]: Failed password for invalid user santosh from 124.149.253.83 port 59314 ssh2 Aug 31 01:35:07 web8 sshd\[3783\]: Invalid user service from 124.149.253.83 Aug 31 01:35:07 web8 sshd\[3783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.149.253.83 |
2019-08-31 09:39:15 |
| 112.170.78.118 | attackspambots | Aug 31 02:35:23 icinga sshd[1238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118 Aug 31 02:35:24 icinga sshd[1238]: Failed password for invalid user dan from 112.170.78.118 port 58174 ssh2 ... |
2019-08-31 09:28:07 |
| 117.102.68.188 | attackbots | Aug 30 19:21:22 vps01 sshd[21759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.68.188 Aug 30 19:21:24 vps01 sshd[21759]: Failed password for invalid user git from 117.102.68.188 port 47372 ssh2 |
2019-08-31 09:27:44 |
| 123.7.178.136 | attackspam | Aug 31 01:28:59 OPSO sshd\[8957\]: Invalid user antonio from 123.7.178.136 port 57470 Aug 31 01:28:59 OPSO sshd\[8957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.7.178.136 Aug 31 01:29:01 OPSO sshd\[8957\]: Failed password for invalid user antonio from 123.7.178.136 port 57470 ssh2 Aug 31 01:34:15 OPSO sshd\[9690\]: Invalid user prueba from 123.7.178.136 port 49913 Aug 31 01:34:15 OPSO sshd\[9690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.7.178.136 |
2019-08-31 09:19:57 |
| 104.131.113.106 | attackbotsspam | Invalid user rpcuser from 104.131.113.106 port 36972 |
2019-08-31 09:16:26 |
| 151.80.144.255 | attackspambots | Invalid user linux from 151.80.144.255 port 36278 |
2019-08-31 09:18:28 |
| 111.6.76.80 | attackspam | 2019-08-10T15:14:05.823779wiz-ks3 sshd[6153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.6.76.80 user=root 2019-08-10T15:14:07.639668wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2 2019-08-10T15:14:10.073376wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2 2019-08-10T15:14:05.823779wiz-ks3 sshd[6153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.6.76.80 user=root 2019-08-10T15:14:07.639668wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2 2019-08-10T15:14:10.073376wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2 2019-08-10T15:14:05.823779wiz-ks3 sshd[6153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.6.76.80 user=root 2019-08-10T15:14:07.639668wiz-ks3 sshd[6153]: Failed password for root from 111.6.76.80 port 54793 ssh2 2019-08-10T15:14:10.073376wiz-ks3 |
2019-08-31 09:57:45 |
| 45.55.233.213 | attack | Aug 31 00:04:26 xeon sshd[62263]: Failed password for invalid user teste from 45.55.233.213 port 39348 ssh2 |
2019-08-31 09:36:20 |
| 139.59.45.98 | attackbots | Aug 31 00:23:05 h2177944 sshd\[15481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.45.98 Aug 31 00:23:07 h2177944 sshd\[15481\]: Failed password for invalid user loop from 139.59.45.98 port 56746 ssh2 Aug 31 01:24:06 h2177944 sshd\[18187\]: Invalid user valter from 139.59.45.98 port 41722 Aug 31 01:24:06 h2177944 sshd\[18187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.45.98 ... |
2019-08-31 09:32:31 |
| 181.114.212.130 | attackspam | Aug 31 03:34:23 ns3110291 sshd\[20646\]: Invalid user duckie from 181.114.212.130 Aug 31 03:34:23 ns3110291 sshd\[20646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.114.212.130 Aug 31 03:34:25 ns3110291 sshd\[20646\]: Failed password for invalid user duckie from 181.114.212.130 port 33994 ssh2 Aug 31 03:39:38 ns3110291 sshd\[21120\]: Invalid user search from 181.114.212.130 Aug 31 03:39:38 ns3110291 sshd\[21120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.114.212.130 ... |
2019-08-31 09:54:54 |
| 124.156.170.94 | attack | Aug 30 09:52:21 tdfoods sshd\[5363\]: Invalid user yunmen from 124.156.170.94 Aug 30 09:52:21 tdfoods sshd\[5363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.170.94 Aug 30 09:52:23 tdfoods sshd\[5363\]: Failed password for invalid user yunmen from 124.156.170.94 port 34076 ssh2 Aug 30 09:57:04 tdfoods sshd\[5775\]: Invalid user camila from 124.156.170.94 Aug 30 09:57:04 tdfoods sshd\[5775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.170.94 |
2019-08-31 09:23:41 |