城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.85.36.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.85.36.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 15:50:41 CST 2025
;; MSG SIZE rcvd: 106
Host 142.36.85.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.36.85.106.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 190.67.116.12 | attack | Aug 1 23:33:51 mail sshd\[11616\]: Failed password for invalid user userftp from 190.67.116.12 port 56140 ssh2 Aug 1 23:57:02 mail sshd\[12091\]: Invalid user kobis from 190.67.116.12 port 56126 ... |
2019-08-02 07:03:21 |
| 185.220.100.253 | attackspambots | Aug 1 22:49:22 mail sshd\[11957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.100.253 user=root Aug 1 22:49:23 mail sshd\[11957\]: Failed password for root from 185.220.100.253 port 6838 ssh2 Aug 1 22:49:43 mail sshd\[11961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.100.253 user=administrator |
2019-08-02 07:04:11 |
| 74.92.210.138 | attackbots | Aug 2 00:32:26 localhost sshd\[16045\]: Invalid user luc123 from 74.92.210.138 port 59344 Aug 2 00:32:26 localhost sshd\[16045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.92.210.138 Aug 2 00:32:28 localhost sshd\[16045\]: Failed password for invalid user luc123 from 74.92.210.138 port 59344 ssh2 |
2019-08-02 06:44:20 |
| 200.115.32.36 | attackspam | Aug 1 21:50:05 master sshd[25089]: Failed password for invalid user teste from 200.115.32.36 port 54370 ssh2 Aug 1 22:02:26 master sshd[25403]: Failed password for invalid user wen from 200.115.32.36 port 50006 ssh2 Aug 1 22:14:50 master sshd[25411]: Failed password for invalid user ubuntu from 200.115.32.36 port 45500 ssh2 |
2019-08-02 06:21:08 |
| 5.196.69.70 | attackspam | Aug 2 00:02:23 MK-Soft-Root1 sshd\[7943\]: Invalid user cent from 5.196.69.70 port 38710 Aug 2 00:02:23 MK-Soft-Root1 sshd\[7943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.69.70 Aug 2 00:02:25 MK-Soft-Root1 sshd\[7943\]: Failed password for invalid user cent from 5.196.69.70 port 38710 ssh2 ... |
2019-08-02 06:58:27 |
| 145.102.6.55 | attack | Port scan on 1 port(s): 53 |
2019-08-02 06:55:54 |
| 88.121.72.24 | attackspambots | Aug 1 13:41:25 TORMINT sshd\[377\]: Invalid user ttest from 88.121.72.24 Aug 1 13:41:25 TORMINT sshd\[377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.121.72.24 Aug 1 13:41:27 TORMINT sshd\[377\]: Failed password for invalid user ttest from 88.121.72.24 port 56220 ssh2 ... |
2019-08-02 07:05:35 |
| 92.119.160.125 | attack | Port scan on 10 port(s): 10214 10242 10251 10262 10286 10289 10311 10353 10371 10375 |
2019-08-02 06:45:29 |
| 193.146.46.60 | attack | Aug 1 06:23:05 penfold sshd[15108]: Invalid user mdmc from 193.146.46.60 port 35429 Aug 1 06:23:05 penfold sshd[15108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.146.46.60 Aug 1 06:23:07 penfold sshd[15108]: Failed password for invalid user mdmc from 193.146.46.60 port 35429 ssh2 Aug 1 06:23:07 penfold sshd[15108]: Received disconnect from 193.146.46.60 port 35429:11: Bye Bye [preauth] Aug 1 06:23:07 penfold sshd[15108]: Disconnected from 193.146.46.60 port 35429 [preauth] Aug 1 06:34:28 penfold sshd[16095]: Invalid user adabas from 193.146.46.60 port 47786 Aug 1 06:34:28 penfold sshd[16095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.146.46.60 Aug 1 06:34:30 penfold sshd[16095]: Failed password for invalid user adabas from 193.146.46.60 port 47786 ssh2 Aug 1 06:34:30 penfold sshd[16095]: Received disconnect from 193.146.46.60 port 47786:11: Bye Bye [preauth] Au........ ------------------------------- |
2019-08-02 06:52:12 |
| 183.87.222.36 | attackspambots | Aug 1 11:08:18 xb3 sshd[24485]: reveeclipse mapping checking getaddrinfo for undefined.hostname.localhost [183.87.222.36] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 1 11:08:18 xb3 sshd[24485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.222.36 user=r.r Aug 1 11:08:20 xb3 sshd[24485]: Failed password for r.r from 183.87.222.36 port 46761 ssh2 Aug 1 11:59:33 xb3 sshd[26167]: reveeclipse mapping checking getaddrinfo for undefined.hostname.localhost [183.87.222.36] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 1 11:59:36 xb3 sshd[26167]: Failed password for invalid user abraham from 183.87.222.36 port 34171 ssh2 Aug 1 11:59:36 xb3 sshd[26167]: Received disconnect from 183.87.222.36: 11: Bye Bye [preauth] Aug 1 12:03:06 xb3 sshd[23538]: reveeclipse mapping checking getaddrinfo for undefined.hostname.localhost [183.87.222.36] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 1 12:03:07 xb3 sshd[23538]: Failed password for invalid user ........ ------------------------------- |
2019-08-02 06:38:52 |
| 52.229.171.208 | attackspambots | Aug 1 18:29:16 site1 sshd\[57399\]: Invalid user test2 from 52.229.171.208Aug 1 18:29:18 site1 sshd\[57399\]: Failed password for invalid user test2 from 52.229.171.208 port 58822 ssh2Aug 1 18:33:41 site1 sshd\[57741\]: Invalid user odoo from 52.229.171.208Aug 1 18:33:43 site1 sshd\[57741\]: Failed password for invalid user odoo from 52.229.171.208 port 15230 ssh2Aug 1 18:38:14 site1 sshd\[58128\]: Invalid user zl from 52.229.171.208Aug 1 18:38:16 site1 sshd\[58128\]: Failed password for invalid user zl from 52.229.171.208 port 26708 ssh2 ... |
2019-08-02 06:28:06 |
| 210.92.37.181 | attackspambots | Aug 2 00:49:31 SilenceServices sshd[18606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.37.181 Aug 2 00:49:33 SilenceServices sshd[18606]: Failed password for invalid user pussy from 210.92.37.181 port 43292 ssh2 Aug 2 00:54:39 SilenceServices sshd[22797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.37.181 |
2019-08-02 07:03:03 |
| 49.88.112.77 | attackbotsspam | Aug 1 15:17:00 ip-172-31-62-245 sshd\[11280\]: Failed password for root from 49.88.112.77 port 11565 ssh2\ Aug 1 15:17:03 ip-172-31-62-245 sshd\[11280\]: Failed password for root from 49.88.112.77 port 11565 ssh2\ Aug 1 15:17:06 ip-172-31-62-245 sshd\[11280\]: Failed password for root from 49.88.112.77 port 11565 ssh2\ Aug 1 15:17:19 ip-172-31-62-245 sshd\[11285\]: Failed password for root from 49.88.112.77 port 11591 ssh2\ Aug 1 15:17:39 ip-172-31-62-245 sshd\[11287\]: Failed password for root from 49.88.112.77 port 13905 ssh2\ |
2019-08-02 06:28:24 |
| 190.96.117.86 | attackspam | Automatic report - Port Scan Attack |
2019-08-02 06:32:08 |
| 104.168.147.210 | attack | Aug 2 00:33:08 localhost sshd\[16135\]: Invalid user czerda from 104.168.147.210 port 49318 Aug 2 00:33:08 localhost sshd\[16135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.147.210 Aug 2 00:33:10 localhost sshd\[16135\]: Failed password for invalid user czerda from 104.168.147.210 port 49318 ssh2 |
2019-08-02 06:40:06 |