城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.148.138.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18977
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.148.138.54. IN A
;; AUTHORITY SECTION:
. 182 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:50:41 CST 2023
;; MSG SIZE rcvd: 107
54.138.148.106.in-addr.arpa domain name pointer KD106148138054.au-net.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.138.148.106.in-addr.arpa name = KD106148138054.au-net.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 217.182.252.63 | attackbotsspam | Invalid user admin from 217.182.252.63 port 45006 |
2019-12-11 09:21:49 |
| 189.91.239.121 | attackbots | Dec 11 02:56:02 sauna sshd[150405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.91.239.121 Dec 11 02:56:04 sauna sshd[150405]: Failed password for invalid user mosier from 189.91.239.121 port 39091 ssh2 ... |
2019-12-11 09:10:44 |
| 160.19.98.74 | attack | Invalid user server from 160.19.98.74 port 35228 |
2019-12-11 09:01:31 |
| 177.22.196.87 | attackbots | Unauthorized connection attempt detected from IP address 177.22.196.87 to port 445 |
2019-12-11 09:00:55 |
| 23.238.115.210 | attack | 2019-12-10T21:59:48.145618abusebot-7.cloudsearch.cf sshd\[10902\]: Invalid user ireland1 from 23.238.115.210 port 53442 |
2019-12-11 08:45:51 |
| 112.198.194.11 | attack | 2019-12-11T01:01:25.127692vps751288.ovh.net sshd\[17838\]: Invalid user server from 112.198.194.11 port 33106 2019-12-11T01:01:25.139245vps751288.ovh.net sshd\[17838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.194.11 2019-12-11T01:01:26.597243vps751288.ovh.net sshd\[17838\]: Failed password for invalid user server from 112.198.194.11 port 33106 ssh2 2019-12-11T01:07:44.765082vps751288.ovh.net sshd\[17891\]: Invalid user rpm from 112.198.194.11 port 41510 2019-12-11T01:07:44.773320vps751288.ovh.net sshd\[17891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.194.11 |
2019-12-11 09:05:00 |
| 113.87.194.21 | attack | 2019-12-10T22:08:24.739230abusebot-8.cloudsearch.cf sshd\[2338\]: Invalid user jvnc from 113.87.194.21 port 54390 |
2019-12-11 09:14:00 |
| 216.244.66.239 | attackspam | 21 attempts against mh-misbehave-ban on flare.magehost.pro |
2019-12-11 09:00:43 |
| 107.170.249.6 | attackspam | fail2ban |
2019-12-11 08:53:24 |
| 125.22.10.130 | attackbots | Dec 10 12:47:11 *** sshd[2482]: Failed password for invalid user from 125.22.10.130 port 44008 ssh2 Dec 10 12:53:29 *** sshd[2574]: Failed password for invalid user enio from 125.22.10.130 port 52384 ssh2 Dec 10 12:59:59 *** sshd[2686]: Failed password for invalid user xxx from 125.22.10.130 port 60764 ssh2 Dec 10 13:07:05 *** sshd[2882]: Failed password for invalid user boosted from 125.22.10.130 port 40904 ssh2 Dec 10 13:13:28 *** sshd[3042]: Failed password for invalid user C3nt0s@2020 from 125.22.10.130 port 49282 ssh2 Dec 10 13:19:53 *** sshd[3151]: Failed password for invalid user chinglong from 125.22.10.130 port 57668 ssh2 Dec 10 13:26:20 *** sshd[3328]: Failed password for invalid user password555 from 125.22.10.130 port 37824 ssh2 Dec 10 13:32:43 *** sshd[3423]: Failed password for invalid user 123321 from 125.22.10.130 port 46194 ssh2 Dec 10 13:39:16 *** sshd[3563]: Failed password for invalid user admin1235 from 125.22.10.130 port 54564 ssh2 Dec 10 13:45:41 *** sshd[3734]: Failed password for inv |
2019-12-11 09:18:37 |
| 177.69.44.193 | attackspambots | Dec 10 14:26:10 wbs sshd\[30619\]: Invalid user hch from 177.69.44.193 Dec 10 14:26:10 wbs sshd\[30619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.44.193 Dec 10 14:26:12 wbs sshd\[30619\]: Failed password for invalid user hch from 177.69.44.193 port 57418 ssh2 Dec 10 14:32:35 wbs sshd\[31214\]: Invalid user sistema from 177.69.44.193 Dec 10 14:32:35 wbs sshd\[31214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.44.193 |
2019-12-11 08:57:00 |
| 221.148.45.168 | attackspam | 2019-12-11T00:37:41.792221shield sshd\[21387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.148.45.168 user=root 2019-12-11T00:37:43.646046shield sshd\[21387\]: Failed password for root from 221.148.45.168 port 37740 ssh2 2019-12-11T00:45:29.190271shield sshd\[22725\]: Invalid user Arttu from 221.148.45.168 port 42106 2019-12-11T00:45:29.196696shield sshd\[22725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.148.45.168 2019-12-11T00:45:30.965157shield sshd\[22725\]: Failed password for invalid user Arttu from 221.148.45.168 port 42106 ssh2 |
2019-12-11 08:55:08 |
| 118.67.219.101 | attack | --- report --- Dec 10 17:28:27 sshd: Connection from 118.67.219.101 port 60750 Dec 10 17:28:28 sshd: Invalid user from 118.67.219.101 Dec 10 17:28:28 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.67.219.101 Dec 10 17:28:30 sshd: Failed password for invalid user from 118.67.219.101 port 60750 ssh2 Dec 10 17:28:31 sshd: Received disconnect from 118.67.219.101: 11: Bye Bye [preauth] |
2019-12-11 09:18:50 |
| 51.255.168.127 | attack | Dec 11 00:26:37 *** sshd[24105]: Invalid user edu from 51.255.168.127 |
2019-12-11 09:12:59 |
| 41.77.129.202 | attackbotsspam | Dec 11 01:41:53 lnxmail61 sshd[28162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.129.202 |
2019-12-11 09:11:06 |