城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.68.12.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;11.68.12.77. IN A
;; AUTHORITY SECTION:
. 439 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010100 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 01 14:56:02 CST 2022
;; MSG SIZE rcvd: 104
Host 77.12.68.11.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 77.12.68.11.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 132.232.40.86 | attack | Dec 13 08:53:44 ns381471 sshd[32735]: Failed password for root from 132.232.40.86 port 50066 ssh2 |
2019-12-13 16:27:57 |
| 91.134.140.242 | attackspam | Dec 12 21:57:53 kapalua sshd\[21901\]: Invalid user kruziak from 91.134.140.242 Dec 12 21:57:53 kapalua sshd\[21901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=242.ip-91-134-140.eu Dec 12 21:57:55 kapalua sshd\[21901\]: Failed password for invalid user kruziak from 91.134.140.242 port 59088 ssh2 Dec 12 22:03:06 kapalua sshd\[22444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=242.ip-91-134-140.eu user=root Dec 12 22:03:08 kapalua sshd\[22444\]: Failed password for root from 91.134.140.242 port 38994 ssh2 |
2019-12-13 16:45:24 |
| 114.253.70.67 | attackbots | 1433/tcp [2019-12-13]1pkt |
2019-12-13 16:17:19 |
| 118.70.15.57 | attackspam | Unauthorized connection attempt from IP address 118.70.15.57 on Port 445(SMB) |
2019-12-13 16:36:15 |
| 188.254.0.182 | attackspambots | Dec 13 08:12:07 web8 sshd\[14059\]: Invalid user ftp from 188.254.0.182 Dec 13 08:12:07 web8 sshd\[14059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182 Dec 13 08:12:09 web8 sshd\[14059\]: Failed password for invalid user ftp from 188.254.0.182 port 55048 ssh2 Dec 13 08:18:24 web8 sshd\[16989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.182 user=backup Dec 13 08:18:27 web8 sshd\[16989\]: Failed password for backup from 188.254.0.182 port 33296 ssh2 |
2019-12-13 16:22:07 |
| 218.92.0.138 | attackspambots | Dec 13 10:04:56 sauna sshd[19320]: Failed password for root from 218.92.0.138 port 18381 ssh2 Dec 13 10:05:11 sauna sshd[19320]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 18381 ssh2 [preauth] ... |
2019-12-13 16:21:36 |
| 70.186.146.138 | attackspambots | Dec 13 07:47:28 zx01vmsma01 sshd[140418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.186.146.138 Dec 13 07:47:31 zx01vmsma01 sshd[140418]: Failed password for invalid user teste from 70.186.146.138 port 38172 ssh2 ... |
2019-12-13 16:24:35 |
| 123.207.171.211 | attackspambots | Dec 13 08:30:53 mail sshd[5809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.171.211 Dec 13 08:30:55 mail sshd[5809]: Failed password for invalid user biwer from 123.207.171.211 port 59618 ssh2 Dec 13 08:38:34 mail sshd[6946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.171.211 |
2019-12-13 16:29:26 |
| 183.83.140.167 | attack | 445/tcp [2019-12-13]1pkt |
2019-12-13 16:38:39 |
| 49.49.237.202 | attackspambots | 445/tcp [2019-12-13]1pkt |
2019-12-13 16:49:42 |
| 157.230.129.73 | attack | Dec 13 08:54:26 ns381471 sshd[32758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.129.73 Dec 13 08:54:28 ns381471 sshd[32758]: Failed password for invalid user soenksen from 157.230.129.73 port 35836 ssh2 |
2019-12-13 16:26:02 |
| 51.83.249.63 | attack | Dec 12 22:33:04 kapalua sshd\[25624\]: Invalid user nozomy from 51.83.249.63 Dec 12 22:33:04 kapalua sshd\[25624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.249.63 Dec 12 22:33:06 kapalua sshd\[25624\]: Failed password for invalid user nozomy from 51.83.249.63 port 50024 ssh2 Dec 12 22:38:42 kapalua sshd\[26187\]: Invalid user near from 51.83.249.63 Dec 12 22:38:42 kapalua sshd\[26187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.249.63 |
2019-12-13 16:47:50 |
| 122.168.199.42 | attackspam | 445/tcp [2019-12-13]1pkt |
2019-12-13 16:12:39 |
| 140.143.17.199 | attack | $f2bV_matches |
2019-12-13 16:48:02 |
| 77.120.32.250 | attackbots | 1433/tcp [2019-12-13]1pkt |
2019-12-13 16:42:25 |