城市(city): unknown
省份(region): unknown
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.72.56.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.72.56.89. IN A
;; AUTHORITY SECTION:
. 238 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:16:25 CST 2022
;; MSG SIZE rcvd: 105
89.56.72.114.in-addr.arpa domain name pointer n114-72-56-89.meb1.vic.optusnet.com.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
89.56.72.114.in-addr.arpa name = n114-72-56-89.meb1.vic.optusnet.com.au.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 172.116.84.144 | attack | Automatic report - Port Scan Attack |
2020-10-06 12:41:27 |
| 151.253.125.136 | attackspam | Oct 6 06:17:56 vmd26974 sshd[927]: Failed password for root from 151.253.125.136 port 33132 ssh2 ... |
2020-10-06 12:40:41 |
| 112.85.42.53 | attackspambots | 2020-10-06T07:59:47.149095snf-827550 sshd[1543]: Failed password for root from 112.85.42.53 port 46676 ssh2 2020-10-06T07:59:50.638468snf-827550 sshd[1543]: Failed password for root from 112.85.42.53 port 46676 ssh2 2020-10-06T07:59:53.877859snf-827550 sshd[1543]: Failed password for root from 112.85.42.53 port 46676 ssh2 ... |
2020-10-06 13:01:32 |
| 81.71.83.135 | attackbots | Ssh brute force |
2020-10-06 13:03:41 |
| 193.169.253.128 | attack | Oct 6 03:57:44 mail postfix/smtpd\[27094\]: warning: unknown\[193.169.253.128\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 6 04:08:37 mail postfix/smtpd\[27465\]: warning: unknown\[193.169.253.128\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 6 04:19:20 mail postfix/smtpd\[27821\]: warning: unknown\[193.169.253.128\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 6 05:13:12 mail postfix/smtpd\[29575\]: warning: unknown\[193.169.253.128\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-10-06 12:46:27 |
| 106.12.141.206 | attack | Banned for a week because repeated abuses, for example SSH, but not only |
2020-10-06 12:31:56 |
| 116.85.64.100 | attack | bruteforce detected |
2020-10-06 13:10:10 |
| 203.159.249.215 | attack | Oct 6 04:31:30 server sshd[8254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.159.249.215 user=root Oct 6 04:31:31 server sshd[8254]: Failed password for invalid user root from 203.159.249.215 port 53336 ssh2 Oct 6 04:39:22 server sshd[8853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.159.249.215 user=root Oct 6 04:39:24 server sshd[8853]: Failed password for invalid user root from 203.159.249.215 port 56698 ssh2 |
2020-10-06 12:33:01 |
| 113.67.158.44 | attackbotsspam | Lines containing failures of 113.67.158.44 Oct 5 09:45:22 smtp-out sshd[25057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.67.158.44 user=r.r Oct 5 09:45:24 smtp-out sshd[25057]: Failed password for r.r from 113.67.158.44 port 1695 ssh2 Oct 5 09:45:26 smtp-out sshd[25057]: Received disconnect from 113.67.158.44 port 1695:11: Bye Bye [preauth] Oct 5 09:45:26 smtp-out sshd[25057]: Disconnected from authenticating user r.r 113.67.158.44 port 1695 [preauth] Oct 5 09:56:39 smtp-out sshd[25437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.67.158.44 user=r.r Oct 5 09:56:41 smtp-out sshd[25437]: Failed password for r.r from 113.67.158.44 port 3549 ssh2 Oct 5 09:56:42 smtp-out sshd[25437]: Received disconnect from 113.67.158.44 port 3549:11: Bye Bye [preauth] Oct 5 09:56:42 smtp-out sshd[25437]: Disconnected from authenticating user r.r 113.67.158.44 port 3549 [preauth] Oct ........ ------------------------------ |
2020-10-06 12:43:09 |
| 42.194.211.37 | attackspambots | $f2bV_matches |
2020-10-06 12:39:28 |
| 129.211.146.50 | attackspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-10-06 12:57:40 |
| 120.98.1.180 | attack | Oct 6 05:56:41 xeon sshd[46848]: Failed password for root from 120.98.1.180 port 42210 ssh2 |
2020-10-06 12:50:45 |
| 120.53.117.219 | attackspambots | Oct 5 18:29:07 kapalua sshd\[31884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.117.219 user=root Oct 5 18:29:09 kapalua sshd\[31884\]: Failed password for root from 120.53.117.219 port 43804 ssh2 Oct 5 18:34:02 kapalua sshd\[32475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.117.219 user=root Oct 5 18:34:04 kapalua sshd\[32475\]: Failed password for root from 120.53.117.219 port 38488 ssh2 Oct 5 18:38:56 kapalua sshd\[593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.117.219 user=root |
2020-10-06 12:39:06 |
| 218.92.0.173 | attack | Oct 6 06:32:11 nopemail auth.info sshd[11876]: Unable to negotiate with 218.92.0.173 port 51795: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-10-06 12:39:51 |
| 94.102.48.51 | attackbots | Oct 6 04:25:20 mail postfix/smtpd[66480]: warning: unknown[94.102.48.51]: SASL LOGIN authentication failed: generic failure Oct 6 04:25:20 mail postfix/smtpd[66480]: warning: unknown[94.102.48.51]: SASL LOGIN authentication failed: generic failure Oct 6 04:25:20 mail postfix/smtpd[66480]: warning: unknown[94.102.48.51]: SASL LOGIN authentication failed: generic failure ... |
2020-10-06 12:58:11 |