城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.245.54.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.245.54.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 17:50:16 CST 2025
;; MSG SIZE rcvd: 106
40.54.245.108.in-addr.arpa domain name pointer 108-245-54-40.lightspeed.livnmi.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.54.245.108.in-addr.arpa name = 108-245-54-40.lightspeed.livnmi.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.82.77.33 | attack | [DoS Attack: TCP/UDP Chargen] from source: 80.82.77.33, port 29921, Saturday, August 08, 2020 20:19:37 |
2020-08-15 22:27:36 |
| 194.61.24.177 | attackbots | Aug 15 16:28:59 srv2 sshd\[21181\]: Invalid user 0 from 194.61.24.177 port 49369 Aug 15 16:29:00 srv2 sshd\[21187\]: Invalid user 22 from 194.61.24.177 port 20520 Aug 15 16:29:00 srv2 sshd\[21191\]: Invalid user 101 from 194.61.24.177 port 30283 |
2020-08-15 22:43:08 |
| 222.186.30.35 | attack | Aug 15 07:12:16 dignus sshd[20324]: Failed password for root from 222.186.30.35 port 62942 ssh2 Aug 15 07:12:19 dignus sshd[20324]: Failed password for root from 222.186.30.35 port 62942 ssh2 Aug 15 07:12:21 dignus sshd[20324]: Failed password for root from 222.186.30.35 port 62942 ssh2 Aug 15 07:12:25 dignus sshd[20333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35 user=root Aug 15 07:12:26 dignus sshd[20333]: Failed password for root from 222.186.30.35 port 20147 ssh2 ... |
2020-08-15 22:20:26 |
| 113.52.132.195 | attackbotsspam | 1597494205 - 08/15/2020 19:23:25 Host: 113-52-132-195.layerdns.cloud/113.52.132.195 Port: 21 TCP Blocked ... |
2020-08-15 22:30:42 |
| 39.89.232.137 | attackspam | Unauthorised access (Aug 15) SRC=39.89.232.137 LEN=40 TTL=46 ID=37393 TCP DPT=8080 WINDOW=14513 SYN Unauthorised access (Aug 13) SRC=39.89.232.137 LEN=40 TTL=46 ID=46792 TCP DPT=8080 WINDOW=14513 SYN Unauthorised access (Aug 12) SRC=39.89.232.137 LEN=40 TTL=46 ID=63662 TCP DPT=8080 WINDOW=3964 SYN |
2020-08-15 22:49:39 |
| 120.92.173.154 | attackspam | Aug 15 18:29:42 gw1 sshd[5927]: Failed password for root from 120.92.173.154 port 5404 ssh2 ... |
2020-08-15 22:44:20 |
| 218.92.0.184 | attackbots | SSH Brute-Force attacks |
2020-08-15 22:23:34 |
| 159.65.180.64 | attackspambots | 2020-08-15T17:41:29.338453snf-827550 sshd[19349]: Failed password for root from 159.65.180.64 port 58296 ssh2 2020-08-15T17:45:10.208634snf-827550 sshd[19386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.180.64 user=root 2020-08-15T17:45:12.447274snf-827550 sshd[19386]: Failed password for root from 159.65.180.64 port 40306 ssh2 ... |
2020-08-15 22:59:14 |
| 121.15.7.26 | attackbots | Aug 15 12:20:31 rush sshd[32241]: Failed password for root from 121.15.7.26 port 58334 ssh2 Aug 15 12:21:35 rush sshd[32260]: Failed password for root from 121.15.7.26 port 35351 ssh2 ... |
2020-08-15 23:00:45 |
| 218.92.0.148 | attackspam | SSH auth scanning - multiple failed logins |
2020-08-15 23:01:05 |
| 178.62.75.60 | attack | 2020-08-15T14:15:15.945916mail.broermann.family sshd[19175]: Failed password for root from 178.62.75.60 port 42962 ssh2 2020-08-15T14:19:14.015230mail.broermann.family sshd[19368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60 user=root 2020-08-15T14:19:16.068435mail.broermann.family sshd[19368]: Failed password for root from 178.62.75.60 port 53476 ssh2 2020-08-15T14:23:08.319823mail.broermann.family sshd[19495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.75.60 user=root 2020-08-15T14:23:10.634043mail.broermann.family sshd[19495]: Failed password for root from 178.62.75.60 port 35760 ssh2 ... |
2020-08-15 22:39:53 |
| 23.159.176.19 | attackbots | 23.159.176.19 was recorded 6 times by 2 hosts attempting to connect to the following ports: 19,1900. Incident counter (4h, 24h, all-time): 6, 6, 6 |
2020-08-15 22:32:40 |
| 190.246.153.227 | attack | Aug 15 13:08:38 localhost sshd[73135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.153.227 user=root Aug 15 13:08:40 localhost sshd[73135]: Failed password for root from 190.246.153.227 port 45256 ssh2 Aug 15 13:11:06 localhost sshd[73403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.153.227 user=root Aug 15 13:11:08 localhost sshd[73403]: Failed password for root from 190.246.153.227 port 43172 ssh2 Aug 15 13:13:34 localhost sshd[73678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.246.153.227 user=root Aug 15 13:13:36 localhost sshd[73678]: Failed password for root from 190.246.153.227 port 41090 ssh2 ... |
2020-08-15 22:25:34 |
| 45.32.60.161 | attackbotsspam | Attempted connection to port 1433. |
2020-08-15 22:54:35 |
| 192.99.244.45 | attack |
|
2020-08-15 22:20:59 |