城市(city): unknown
省份(region): unknown
国家(country): Republic of China (ROC)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.104.122.46 | attackspambots | Unauthorized connection attempt detected from IP address 106.104.122.46 to port 445 [J] |
2020-01-05 02:43:21 |
| 106.104.12.180 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-08 17:45:23 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.104.12.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.104.12.140. IN A
;; AUTHORITY SECTION:
. 358 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:09:56 CST 2022
;; MSG SIZE rcvd: 107
140.12.104.106.in-addr.arpa domain name pointer 106-104-12-140.adsl.dynamic.seed.net.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.12.104.106.in-addr.arpa name = 106-104-12-140.adsl.dynamic.seed.net.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 181.169.252.31 | attackspam | 2019-12-14T10:15:56.157207 sshd[19396]: Invalid user gama from 181.169.252.31 port 51376 2019-12-14T10:15:56.171938 sshd[19396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.169.252.31 2019-12-14T10:15:56.157207 sshd[19396]: Invalid user gama from 181.169.252.31 port 51376 2019-12-14T10:15:57.804962 sshd[19396]: Failed password for invalid user gama from 181.169.252.31 port 51376 ssh2 2019-12-14T10:38:22.372208 sshd[19899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.169.252.31 user=root 2019-12-14T10:38:24.120525 sshd[19899]: Failed password for root from 181.169.252.31 port 34171 ssh2 ... |
2019-12-14 18:59:00 |
| 192.144.132.172 | attackspambots | Dec 14 11:36:38 vps647732 sshd[3633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.132.172 Dec 14 11:36:40 vps647732 sshd[3633]: Failed password for invalid user cavnar from 192.144.132.172 port 44076 ssh2 ... |
2019-12-14 19:05:20 |
| 94.23.25.77 | attackspam | Dec 14 11:11:20 marvibiene sshd[25834]: Invalid user saleem from 94.23.25.77 port 48300 Dec 14 11:11:20 marvibiene sshd[25834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.25.77 Dec 14 11:11:20 marvibiene sshd[25834]: Invalid user saleem from 94.23.25.77 port 48300 Dec 14 11:11:22 marvibiene sshd[25834]: Failed password for invalid user saleem from 94.23.25.77 port 48300 ssh2 ... |
2019-12-14 19:17:23 |
| 92.42.47.63 | attack | $f2bV_matches |
2019-12-14 18:57:45 |
| 218.92.0.155 | attackspam | Dec 14 11:45:24 MK-Soft-VM5 sshd[13404]: Failed password for root from 218.92.0.155 port 22275 ssh2 Dec 14 11:45:28 MK-Soft-VM5 sshd[13404]: Failed password for root from 218.92.0.155 port 22275 ssh2 ... |
2019-12-14 19:00:57 |
| 212.3.142.89 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 14-12-2019 06:25:11. |
2019-12-14 19:07:40 |
| 37.159.137.186 | attack | 400 BAD REQUEST |
2019-12-14 19:02:42 |
| 116.96.243.213 | attackbotsspam | Unauthorized connection attempt detected from IP address 116.96.243.213 to port 445 |
2019-12-14 18:51:35 |
| 139.59.17.116 | attackbotsspam | xmlrpc attack |
2019-12-14 19:09:46 |
| 200.87.178.137 | attack | $f2bV_matches |
2019-12-14 19:15:48 |
| 182.23.15.226 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 14-12-2019 06:25:10. |
2019-12-14 19:08:56 |
| 149.202.214.11 | attackbots | $f2bV_matches |
2019-12-14 18:50:05 |
| 118.179.10.101 | attackspam | Unauthorized connection attempt detected from IP address 118.179.10.101 to port 445 |
2019-12-14 19:18:34 |
| 86.132.184.91 | attackbots | Dec 14 11:49:15 Ubuntu-1404-trusty-64-minimal sshd\[2278\]: Invalid user esme from 86.132.184.91 Dec 14 11:49:15 Ubuntu-1404-trusty-64-minimal sshd\[2278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.132.184.91 Dec 14 11:49:17 Ubuntu-1404-trusty-64-minimal sshd\[2278\]: Failed password for invalid user esme from 86.132.184.91 port 36918 ssh2 Dec 14 11:59:32 Ubuntu-1404-trusty-64-minimal sshd\[8043\]: Invalid user parmaksezian from 86.132.184.91 Dec 14 11:59:32 Ubuntu-1404-trusty-64-minimal sshd\[8043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.132.184.91 |
2019-12-14 19:12:32 |
| 62.56.251.204 | attackspam | Unauthorized connection attempt detected from IP address 62.56.251.204 to port 445 |
2019-12-14 19:11:27 |