城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.67.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.14.67.42. IN A
;; AUTHORITY SECTION:
. 490 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 223 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:33:13 CST 2022
;; MSG SIZE rcvd: 105
Host 42.67.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.67.14.106.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 124.95.132.154 | attackbotsspam | 09/26/2019-23:53:53.124760 124.95.132.154 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-09-27 14:11:11 |
| 123.108.200.150 | attackspam | 2019-09-27T06:04:16.776841hub.schaetter.us sshd\[29792\]: Invalid user qomo from 123.108.200.150 port 36210 2019-09-27T06:04:16.788915hub.schaetter.us sshd\[29792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.200.150 2019-09-27T06:04:18.552135hub.schaetter.us sshd\[29792\]: Failed password for invalid user qomo from 123.108.200.150 port 36210 ssh2 2019-09-27T06:08:52.505370hub.schaetter.us sshd\[29832\]: Invalid user aeneas from 123.108.200.150 port 48532 2019-09-27T06:08:52.525154hub.schaetter.us sshd\[29832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.200.150 ... |
2019-09-27 14:08:59 |
| 47.40.20.138 | attackspam | Sep 26 19:48:02 friendsofhawaii sshd\[21912\]: Invalid user manager from 47.40.20.138 Sep 26 19:48:02 friendsofhawaii sshd\[21912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-40-20-138.dhcp.stls.mo.charter.com Sep 26 19:48:05 friendsofhawaii sshd\[21912\]: Failed password for invalid user manager from 47.40.20.138 port 41626 ssh2 Sep 26 19:52:25 friendsofhawaii sshd\[22273\]: Invalid user db2inst1 from 47.40.20.138 Sep 26 19:52:25 friendsofhawaii sshd\[22273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-40-20-138.dhcp.stls.mo.charter.com |
2019-09-27 14:04:16 |
| 91.106.193.72 | attack | Sep 27 07:16:24 ns41 sshd[27784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.106.193.72 |
2019-09-27 13:59:01 |
| 213.138.73.250 | attackbotsspam | Sep 27 07:51:54 vps647732 sshd[6359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.138.73.250 Sep 27 07:51:57 vps647732 sshd[6359]: Failed password for invalid user admin from 213.138.73.250 port 47304 ssh2 ... |
2019-09-27 14:13:29 |
| 123.130.206.201 | attackbotsspam | Unauthorised access (Sep 27) SRC=123.130.206.201 LEN=40 TTL=50 ID=7298 TCP DPT=23 WINDOW=50745 SYN |
2019-09-27 14:10:01 |
| 51.254.134.18 | attackbots | Sep 27 07:09:12 taivassalofi sshd[192053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.134.18 Sep 27 07:09:14 taivassalofi sshd[192053]: Failed password for invalid user gmodserver2 from 51.254.134.18 port 57002 ssh2 ... |
2019-09-27 14:23:25 |
| 122.55.90.45 | attack | Sep 27 10:48:43 itv-usvr-02 sshd[22942]: Invalid user sybase from 122.55.90.45 port 38565 Sep 27 10:48:43 itv-usvr-02 sshd[22942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.55.90.45 Sep 27 10:48:43 itv-usvr-02 sshd[22942]: Invalid user sybase from 122.55.90.45 port 38565 Sep 27 10:48:45 itv-usvr-02 sshd[22942]: Failed password for invalid user sybase from 122.55.90.45 port 38565 ssh2 Sep 27 10:53:32 itv-usvr-02 sshd[22947]: Invalid user jason1 from 122.55.90.45 port 58826 |
2019-09-27 14:28:00 |
| 210.120.63.89 | attack | Sep 27 01:49:03 ny01 sshd[14300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.120.63.89 Sep 27 01:49:05 ny01 sshd[14300]: Failed password for invalid user appman from 210.120.63.89 port 46081 ssh2 Sep 27 01:54:17 ny01 sshd[15102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.120.63.89 |
2019-09-27 14:04:36 |
| 34.80.136.93 | attack | Sep 27 08:41:58 www2 sshd\[2862\]: Invalid user test from 34.80.136.93Sep 27 08:42:00 www2 sshd\[2862\]: Failed password for invalid user test from 34.80.136.93 port 57506 ssh2Sep 27 08:46:31 www2 sshd\[3365\]: Invalid user connor from 34.80.136.93 ... |
2019-09-27 14:04:53 |
| 5.23.79.3 | attackspambots | Sep 26 19:46:20 hanapaa sshd\[13979\]: Invalid user hk from 5.23.79.3 Sep 26 19:46:20 hanapaa sshd\[13979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=postur.emax.is Sep 26 19:46:23 hanapaa sshd\[13979\]: Failed password for invalid user hk from 5.23.79.3 port 47875 ssh2 Sep 26 19:50:37 hanapaa sshd\[14395\]: Invalid user factorio from 5.23.79.3 Sep 26 19:50:37 hanapaa sshd\[14395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=postur.emax.is |
2019-09-27 13:56:37 |
| 93.115.150.236 | attackspambots | Sep 26 20:03:37 hcbb sshd\[3481\]: Invalid user admin from 93.115.150.236 Sep 26 20:03:37 hcbb sshd\[3481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.150.236 Sep 26 20:03:39 hcbb sshd\[3481\]: Failed password for invalid user admin from 93.115.150.236 port 36676 ssh2 Sep 26 20:07:49 hcbb sshd\[3837\]: Invalid user test from 93.115.150.236 Sep 26 20:07:49 hcbb sshd\[3837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.150.236 |
2019-09-27 14:19:45 |
| 201.251.156.11 | attackspambots | Sep 27 05:55:43 h2177944 sshd\[1332\]: Invalid user uc from 201.251.156.11 port 53126 Sep 27 05:55:43 h2177944 sshd\[1332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.251.156.11 Sep 27 05:55:46 h2177944 sshd\[1332\]: Failed password for invalid user uc from 201.251.156.11 port 53126 ssh2 Sep 27 06:01:25 h2177944 sshd\[1874\]: Invalid user kuan from 201.251.156.11 port 45443 ... |
2019-09-27 14:12:17 |
| 206.81.11.216 | attackbotsspam | Sep 26 19:46:10 php1 sshd\[7673\]: Invalid user duser from 206.81.11.216 Sep 26 19:46:10 php1 sshd\[7673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216 Sep 26 19:46:12 php1 sshd\[7673\]: Failed password for invalid user duser from 206.81.11.216 port 40424 ssh2 Sep 26 19:50:23 php1 sshd\[8030\]: Invalid user WorldDomination from 206.81.11.216 Sep 26 19:50:23 php1 sshd\[8030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216 |
2019-09-27 13:55:13 |
| 190.210.42.209 | attackspambots | Invalid user ftpuser from 190.210.42.209 port 12892 |
2019-09-27 14:26:46 |