城市(city): Guimarães
省份(region): Braga
国家(country): Portugal
运营商(isp): NOS
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.50.143.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41358
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.50.143.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:27:19 CST 2025
;; MSG SIZE rcvd: 107
134.143.50.109.in-addr.arpa domain name pointer a109-50-143-134.cpe.netcabo.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.143.50.109.in-addr.arpa name = a109-50-143-134.cpe.netcabo.pt.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.75.144.43 | attackspam | May 22 07:01:38 Tower sshd[28599]: Connection from 51.75.144.43 port 37046 on 192.168.10.220 port 22 rdomain "" May 22 07:01:39 Tower sshd[28599]: Failed password for root from 51.75.144.43 port 37046 ssh2 May 22 07:01:40 Tower sshd[28599]: Failed password for root from 51.75.144.43 port 37046 ssh2 May 22 07:01:40 Tower sshd[28599]: Failed password for root from 51.75.144.43 port 37046 ssh2 May 22 07:01:40 Tower sshd[28599]: Failed password for root from 51.75.144.43 port 37046 ssh2 May 22 07:01:40 Tower sshd[28599]: Failed password for root from 51.75.144.43 port 37046 ssh2 May 22 07:01:41 Tower sshd[28599]: Connection closed by authenticating user root 51.75.144.43 port 37046 [preauth] |
2020-05-22 19:21:09 |
| 221.143.48.143 | attackbotsspam | May 22 13:07:21 ns381471 sshd[5850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143 May 22 13:07:23 ns381471 sshd[5850]: Failed password for invalid user gogolcontent from 221.143.48.143 port 33090 ssh2 |
2020-05-22 19:32:33 |
| 104.41.128.113 | attackspam | Automatic report - Port Scan |
2020-05-22 19:36:19 |
| 87.251.74.197 | attackspambots | May 22 12:58:50 debian-2gb-nbg1-2 kernel: \[12403947.909338\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.197 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=9413 PROTO=TCP SPT=57829 DPT=16182 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-22 19:16:10 |
| 128.199.207.192 | attack | May 22 10:46:02 web8 sshd\[12161\]: Invalid user gib from 128.199.207.192 May 22 10:46:02 web8 sshd\[12161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.207.192 May 22 10:46:05 web8 sshd\[12161\]: Failed password for invalid user gib from 128.199.207.192 port 45712 ssh2 May 22 10:50:17 web8 sshd\[14466\]: Invalid user lvi from 128.199.207.192 May 22 10:50:17 web8 sshd\[14466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.207.192 |
2020-05-22 19:01:44 |
| 213.217.0.131 | attack | May 22 13:23:24 debian-2gb-nbg1-2 kernel: \[12405421.853780\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.0.131 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=17207 PROTO=TCP SPT=45934 DPT=53416 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-22 19:28:39 |
| 78.128.112.14 | attackspambots | May 22 12:54:04 debian-2gb-nbg1-2 kernel: \[12403662.311917\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=78.128.112.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=23422 PROTO=TCP SPT=48844 DPT=5570 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-22 19:18:04 |
| 139.99.84.85 | attackspambots | May 22 11:59:44 server sshd[54336]: Failed password for invalid user ykf from 139.99.84.85 port 60688 ssh2 May 22 12:12:56 server sshd[65158]: Failed password for invalid user lrl from 139.99.84.85 port 54414 ssh2 May 22 12:16:51 server sshd[3187]: Failed password for invalid user wangxm from 139.99.84.85 port 32934 ssh2 |
2020-05-22 19:22:21 |
| 123.155.154.204 | attack | $f2bV_matches |
2020-05-22 19:35:24 |
| 152.32.135.74 | attackbots | 2020-05-22T10:37:34.941308server.espacesoutien.com sshd[25372]: Invalid user mkd from 152.32.135.74 port 40376 2020-05-22T10:37:34.959859server.espacesoutien.com sshd[25372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.135.74 2020-05-22T10:37:34.941308server.espacesoutien.com sshd[25372]: Invalid user mkd from 152.32.135.74 port 40376 2020-05-22T10:37:37.100963server.espacesoutien.com sshd[25372]: Failed password for invalid user mkd from 152.32.135.74 port 40376 ssh2 ... |
2020-05-22 19:35:08 |
| 104.129.5.143 | attack | May 21 23:58:48 server1 sshd\[19050\]: Invalid user fuy from 104.129.5.143 May 21 23:58:48 server1 sshd\[19050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.143 May 21 23:58:50 server1 sshd\[19050\]: Failed password for invalid user fuy from 104.129.5.143 port 57486 ssh2 May 22 00:04:38 server1 sshd\[20863\]: Invalid user ncs from 104.129.5.143 May 22 00:04:38 server1 sshd\[20863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.129.5.143 ... |
2020-05-22 19:29:57 |
| 180.150.187.159 | attack | Invalid user ahj from 180.150.187.159 port 59078 |
2020-05-22 19:12:49 |
| 87.251.166.70 | attackspam | " " |
2020-05-22 19:31:27 |
| 113.209.194.202 | attackspambots | May 22 13:44:50 lukav-desktop sshd\[14225\]: Invalid user fmt from 113.209.194.202 May 22 13:44:50 lukav-desktop sshd\[14225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.209.194.202 May 22 13:44:51 lukav-desktop sshd\[14225\]: Failed password for invalid user fmt from 113.209.194.202 port 40274 ssh2 May 22 13:47:04 lukav-desktop sshd\[14274\]: Invalid user okl from 113.209.194.202 May 22 13:47:04 lukav-desktop sshd\[14274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.209.194.202 |
2020-05-22 19:17:21 |
| 3.0.22.213 | attack | 2020-05-22T09:57:36.886926dmca.cloudsearch.cf sshd[4691]: Invalid user Tlhua from 3.0.22.213 port 60606 2020-05-22T09:57:36.892693dmca.cloudsearch.cf sshd[4691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-0-22-213.ap-southeast-1.compute.amazonaws.com 2020-05-22T09:57:36.886926dmca.cloudsearch.cf sshd[4691]: Invalid user Tlhua from 3.0.22.213 port 60606 2020-05-22T09:57:38.499108dmca.cloudsearch.cf sshd[4691]: Failed password for invalid user Tlhua from 3.0.22.213 port 60606 ssh2 2020-05-22T10:05:41.741374dmca.cloudsearch.cf sshd[5313]: Invalid user ep from 3.0.22.213 port 45170 2020-05-22T10:05:41.747545dmca.cloudsearch.cf sshd[5313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-0-22-213.ap-southeast-1.compute.amazonaws.com 2020-05-22T10:05:41.741374dmca.cloudsearch.cf sshd[5313]: Invalid user ep from 3.0.22.213 port 45170 2020-05-22T10:05:43.606534dmca.cloudsearch.cf sshd[5313]: Failed ... |
2020-05-22 19:14:36 |