城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.216.55.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.216.55.138. IN A
;; AUTHORITY SECTION:
. 145 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 18:52:08 CST 2022
;; MSG SIZE rcvd: 107
138.55.216.104.in-addr.arpa domain name pointer unassigned.psychz.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.55.216.104.in-addr.arpa name = unassigned.psychz.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.59.40.159 | attackspam | 139.59.40.159 - - [09/Jul/2020:05:05:41 +0100] "POST /wp-login.php HTTP/1.1" 200 1967 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.40.159 - - [09/Jul/2020:05:05:43 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.40.159 - - [09/Jul/2020:05:05:43 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-09 13:57:35 |
| 45.178.141.20 | attackbotsspam | Jul 9 06:58:40 server sshd[1971]: Failed password for invalid user fletcher from 45.178.141.20 port 52376 ssh2 Jul 9 07:02:21 server sshd[6243]: Failed password for invalid user kate from 45.178.141.20 port 49762 ssh2 Jul 9 07:06:07 server sshd[10862]: Failed password for invalid user gavrila from 45.178.141.20 port 47138 ssh2 |
2020-07-09 13:18:58 |
| 65.31.127.80 | attackbotsspam | Jul 9 06:59:39 vps639187 sshd\[15316\]: Invalid user clint from 65.31.127.80 port 40998 Jul 9 06:59:39 vps639187 sshd\[15316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.31.127.80 Jul 9 06:59:41 vps639187 sshd\[15316\]: Failed password for invalid user clint from 65.31.127.80 port 40998 ssh2 ... |
2020-07-09 13:55:03 |
| 182.53.176.79 | attack | Honeypot attack, port: 445, PTR: node-ytr.pool-182-53.dynamic.totinternet.net. |
2020-07-09 13:50:33 |
| 106.55.161.202 | attack | Jul 8 23:06:24 server1 sshd\[22770\]: Failed password for invalid user admin from 106.55.161.202 port 56422 ssh2 Jul 8 23:09:54 server1 sshd\[23892\]: Invalid user tanya from 106.55.161.202 Jul 8 23:09:54 server1 sshd\[23892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.161.202 Jul 8 23:09:56 server1 sshd\[23892\]: Failed password for invalid user tanya from 106.55.161.202 port 38150 ssh2 Jul 8 23:13:24 server1 sshd\[24873\]: Invalid user virtue from 106.55.161.202 Jul 8 23:13:24 server1 sshd\[24873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.55.161.202 ... |
2020-07-09 13:17:45 |
| 85.72.182.253 | attackbots | Honeypot attack, port: 81, PTR: athedsl-339807.home.otenet.gr. |
2020-07-09 14:04:05 |
| 42.61.99.155 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-07-09 13:48:48 |
| 222.73.201.96 | attackbots | Jul 9 00:56:26 ws22vmsma01 sshd[130383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.73.201.96 Jul 9 00:56:28 ws22vmsma01 sshd[130383]: Failed password for invalid user gitlab-psql from 222.73.201.96 port 50915 ssh2 ... |
2020-07-09 13:58:55 |
| 42.189.130.89 | attackbotsspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-07-09 13:25:14 |
| 36.82.106.238 | attackspam | Jul 9 06:07:48 vps sshd[793674]: Failed password for invalid user splunk from 36.82.106.238 port 58878 ssh2 Jul 9 06:11:12 vps sshd[813602]: Invalid user natalie from 36.82.106.238 port 43624 Jul 9 06:11:12 vps sshd[813602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.82.106.238 Jul 9 06:11:13 vps sshd[813602]: Failed password for invalid user natalie from 36.82.106.238 port 43624 ssh2 Jul 9 06:14:47 vps sshd[828949]: Invalid user desiderio from 36.82.106.238 port 56608 ... |
2020-07-09 13:16:57 |
| 219.117.223.93 | attackspam | Jul 9 07:07:43 mail1 sshd[24046]: Invalid user wzmao from 219.117.223.93 port 43756 Jul 9 07:07:43 mail1 sshd[24046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.117.223.93 Jul 9 07:07:45 mail1 sshd[24046]: Failed password for invalid user wzmao from 219.117.223.93 port 43756 ssh2 Jul 9 07:07:45 mail1 sshd[24046]: Received disconnect from 219.117.223.93 port 43756:11: Bye Bye [preauth] Jul 9 07:07:45 mail1 sshd[24046]: Disconnected from 219.117.223.93 port 43756 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=219.117.223.93 |
2020-07-09 14:05:16 |
| 201.184.68.58 | attack | Jul 9 01:48:45 NPSTNNYC01T sshd[9850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.68.58 Jul 9 01:48:47 NPSTNNYC01T sshd[9850]: Failed password for invalid user graham from 201.184.68.58 port 38706 ssh2 Jul 9 01:52:55 NPSTNNYC01T sshd[10333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.68.58 ... |
2020-07-09 14:00:16 |
| 123.108.35.186 | attackbotsspam | 2020-07-09T04:01:30.465552abusebot-5.cloudsearch.cf sshd[19229]: Invalid user demetrio from 123.108.35.186 port 42434 2020-07-09T04:01:30.471799abusebot-5.cloudsearch.cf sshd[19229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186 2020-07-09T04:01:30.465552abusebot-5.cloudsearch.cf sshd[19229]: Invalid user demetrio from 123.108.35.186 port 42434 2020-07-09T04:01:32.227571abusebot-5.cloudsearch.cf sshd[19229]: Failed password for invalid user demetrio from 123.108.35.186 port 42434 ssh2 2020-07-09T04:04:52.609520abusebot-5.cloudsearch.cf sshd[19231]: Invalid user qwaszx from 123.108.35.186 port 40650 2020-07-09T04:04:52.614946abusebot-5.cloudsearch.cf sshd[19231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186 2020-07-09T04:04:52.609520abusebot-5.cloudsearch.cf sshd[19231]: Invalid user qwaszx from 123.108.35.186 port 40650 2020-07-09T04:04:54.765643abusebot-5.cloudsearch.cf s ... |
2020-07-09 13:26:34 |
| 218.92.0.223 | attackbots | Jul 9 07:20:23 OPSO sshd\[1539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223 user=root Jul 9 07:20:25 OPSO sshd\[1539\]: Failed password for root from 218.92.0.223 port 30634 ssh2 Jul 9 07:20:28 OPSO sshd\[1539\]: Failed password for root from 218.92.0.223 port 30634 ssh2 Jul 9 07:20:31 OPSO sshd\[1539\]: Failed password for root from 218.92.0.223 port 30634 ssh2 Jul 9 07:20:36 OPSO sshd\[1539\]: Failed password for root from 218.92.0.223 port 30634 ssh2 |
2020-07-09 13:20:40 |
| 220.134.117.138 | attack | Honeypot attack, port: 81, PTR: 220-134-117-138.HINET-IP.hinet.net. |
2020-07-09 13:40:05 |