城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.104.138.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.104.138.10. IN A
;; AUTHORITY SECTION:
. 566 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 10:55:34 CST 2022
;; MSG SIZE rcvd: 107
Host 10.138.104.114.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 10.138.104.114.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.12.52.98 | attack | Feb 3 01:22:06 legacy sshd[24975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.52.98 Feb 3 01:22:08 legacy sshd[24975]: Failed password for invalid user kelvin123 from 106.12.52.98 port 43138 ssh2 Feb 3 01:25:29 legacy sshd[25224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.52.98 ... |
2020-02-03 08:47:36 |
| 49.234.15.91 | attackspam | Unauthorized connection attempt detected from IP address 49.234.15.91 to port 2220 [J] |
2020-02-03 08:37:03 |
| 163.158.14.176 | attackspambots | Unauthorized connection attempt detected from IP address 163.158.14.176 to port 5555 |
2020-02-03 09:01:09 |
| 5.135.253.172 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 9 - port: 11714 proto: TCP cat: Misc Attack |
2020-02-03 08:38:49 |
| 121.201.33.222 | attackspambots | Unauthorized connection attempt detected from IP address 121.201.33.222 to port 1433 [J] |
2020-02-03 09:03:46 |
| 176.185.172.19 | attackbotsspam | Unauthorized connection attempt detected from IP address 176.185.172.19 to port 2220 [J] |
2020-02-03 09:07:03 |
| 142.93.39.29 | attackbotsspam | Invalid user test from 142.93.39.29 port 59604 |
2020-02-03 08:43:37 |
| 212.170.50.203 | attackbots | Feb 3 01:00:05 [host] sshd[17689]: Invalid user harman from 212.170.50.203 Feb 3 01:00:05 [host] sshd[17689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.170.50.203 Feb 3 01:00:07 [host] sshd[17689]: Failed password for invalid user harman from 212.170.50.203 port 41154 ssh2 |
2020-02-03 08:52:21 |
| 106.54.114.208 | attackbotsspam | Unauthorized connection attempt detected from IP address 106.54.114.208 to port 2220 [J] |
2020-02-03 08:47:02 |
| 14.167.206.163 | attackbots | Feb 3 00:29:18 debian-2gb-nbg1-2 kernel: \[2945411.961428\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=14.167.206.163 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=28665 DF PROTO=TCP SPT=58062 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 |
2020-02-03 09:06:15 |
| 112.85.42.189 | attackspambots | 03.02.2020 01:09:15 SSH access blocked by firewall |
2020-02-03 09:12:41 |
| 167.71.223.191 | attack | Feb 3 01:17:28 legacy sshd[24619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.223.191 Feb 3 01:17:30 legacy sshd[24619]: Failed password for invalid user lidio from 167.71.223.191 port 49516 ssh2 Feb 3 01:20:37 legacy sshd[24851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.223.191 ... |
2020-02-03 08:53:36 |
| 121.162.60.159 | attackspambots | Feb 3 01:23:58 silence02 sshd[2432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.60.159 Feb 3 01:24:00 silence02 sshd[2432]: Failed password for invalid user iq from 121.162.60.159 port 54626 ssh2 Feb 3 01:27:38 silence02 sshd[2815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.60.159 |
2020-02-03 08:51:34 |
| 149.56.89.123 | attackbotsspam | Feb 2 14:23:56 sachi sshd\[9950\]: Invalid user alessandro from 149.56.89.123 Feb 2 14:23:56 sachi sshd\[9950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123 Feb 2 14:23:58 sachi sshd\[9950\]: Failed password for invalid user alessandro from 149.56.89.123 port 59576 ssh2 Feb 2 14:27:34 sachi sshd\[9997\]: Invalid user web_admin from 149.56.89.123 Feb 2 14:27:34 sachi sshd\[9997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123 |
2020-02-03 08:54:26 |
| 27.74.163.169 | attackspam | 1580686140 - 02/03/2020 00:29:00 Host: 27.74.163.169/27.74.163.169 Port: 445 TCP Blocked |
2020-02-03 09:18:09 |