城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.82.134.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36610
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;120.82.134.139. IN A
;; AUTHORITY SECTION:
. 506 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031102 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 12:53:34 CST 2022
;; MSG SIZE rcvd: 107
Host 139.134.82.120.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.134.82.120.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 34.229.51.82 | attackspambots | Fail2Ban Ban Triggered |
2019-12-10 23:36:32 |
| 1.203.115.140 | attackspambots | Dec 10 16:33:46 meumeu sshd[10448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.140 Dec 10 16:33:47 meumeu sshd[10448]: Failed password for invalid user majid from 1.203.115.140 port 35297 ssh2 Dec 10 16:42:21 meumeu sshd[11821]: Failed password for root from 1.203.115.140 port 33385 ssh2 ... |
2019-12-10 23:56:59 |
| 80.88.88.181 | attackspam | Dec 10 16:23:45 legacy sshd[9493]: Failed password for root from 80.88.88.181 port 57111 ssh2 Dec 10 16:30:11 legacy sshd[9749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.88.181 Dec 10 16:30:13 legacy sshd[9749]: Failed password for invalid user admin from 80.88.88.181 port 36254 ssh2 ... |
2019-12-10 23:40:49 |
| 120.131.6.144 | attackbotsspam | Dec 10 15:37:50 root sshd[26624]: Failed password for root from 120.131.6.144 port 64768 ssh2 Dec 10 15:53:31 root sshd[26936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.6.144 Dec 10 15:53:34 root sshd[26936]: Failed password for invalid user act from 120.131.6.144 port 54112 ssh2 ... |
2019-12-11 00:04:26 |
| 212.243.158.2 | attackspambots | Dec 10 15:25:13 zeus sshd[23286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.243.158.2 Dec 10 15:25:16 zeus sshd[23286]: Failed password for invalid user asphaug from 212.243.158.2 port 39359 ssh2 Dec 10 15:31:01 zeus sshd[23460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.243.158.2 Dec 10 15:31:03 zeus sshd[23460]: Failed password for invalid user nobody6666 from 212.243.158.2 port 42600 ssh2 |
2019-12-10 23:34:40 |
| 192.241.202.169 | attackbotsspam | Dec 10 16:09:45 tux-35-217 sshd\[10802\]: Invalid user valda from 192.241.202.169 port 50654 Dec 10 16:09:45 tux-35-217 sshd\[10802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.202.169 Dec 10 16:09:47 tux-35-217 sshd\[10802\]: Failed password for invalid user valda from 192.241.202.169 port 50654 ssh2 Dec 10 16:17:54 tux-35-217 sshd\[10922\]: Invalid user apples from 192.241.202.169 port 57626 Dec 10 16:17:54 tux-35-217 sshd\[10922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.202.169 ... |
2019-12-10 23:43:59 |
| 46.44.243.62 | attackbots | proto=tcp . spt=49646 . dpt=25 . (Found on Dark List de Dec 10) (789) |
2019-12-10 23:41:13 |
| 46.227.162.98 | attackbots | proto=tcp . spt=46362 . dpt=25 . (Found on Dark List de Dec 10) (787) |
2019-12-10 23:48:42 |
| 218.92.0.184 | attackspam | Dec 10 17:04:43 sso sshd[14686]: Failed password for root from 218.92.0.184 port 37990 ssh2 Dec 10 17:04:46 sso sshd[14686]: Failed password for root from 218.92.0.184 port 37990 ssh2 ... |
2019-12-11 00:06:40 |
| 175.145.234.225 | attackbotsspam | Dec 10 05:11:00 php1 sshd\[18352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.234.225 user=root Dec 10 05:11:02 php1 sshd\[18352\]: Failed password for root from 175.145.234.225 port 37290 ssh2 Dec 10 05:19:37 php1 sshd\[19303\]: Invalid user etambra from 175.145.234.225 Dec 10 05:19:37 php1 sshd\[19303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.234.225 Dec 10 05:19:39 php1 sshd\[19303\]: Failed password for invalid user etambra from 175.145.234.225 port 40888 ssh2 |
2019-12-10 23:26:51 |
| 106.12.56.143 | attack | 2019-12-10T15:45:28.556971vps751288.ovh.net sshd\[12881\]: Invalid user pitcock from 106.12.56.143 port 33804 2019-12-10T15:45:28.568863vps751288.ovh.net sshd\[12881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.143 2019-12-10T15:45:30.026086vps751288.ovh.net sshd\[12881\]: Failed password for invalid user pitcock from 106.12.56.143 port 33804 ssh2 2019-12-10T15:53:40.335452vps751288.ovh.net sshd\[12945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.143 user=root 2019-12-10T15:53:41.667173vps751288.ovh.net sshd\[12945\]: Failed password for root from 106.12.56.143 port 59962 ssh2 |
2019-12-10 23:53:00 |
| 181.110.240.194 | attack | Dec 10 16:30:35 srv01 sshd[18138]: Invalid user 123456 from 181.110.240.194 port 57566 Dec 10 16:30:35 srv01 sshd[18138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.110.240.194 Dec 10 16:30:35 srv01 sshd[18138]: Invalid user 123456 from 181.110.240.194 port 57566 Dec 10 16:30:37 srv01 sshd[18138]: Failed password for invalid user 123456 from 181.110.240.194 port 57566 ssh2 Dec 10 16:37:44 srv01 sshd[18731]: Invalid user lagier from 181.110.240.194 port 37708 ... |
2019-12-11 00:07:44 |
| 106.13.52.159 | attack | 2019-12-10T15:59:24.815101abusebot-4.cloudsearch.cf sshd\[13011\]: Invalid user angelica from 106.13.52.159 port 54588 |
2019-12-11 00:04:43 |
| 50.254.86.98 | attackspambots | Dec 10 15:56:24 h2812830 sshd[3632]: Invalid user master from 50.254.86.98 port 56278 Dec 10 15:56:24 h2812830 sshd[3632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50-254-86-98-static.hfc.comcastbusiness.net Dec 10 15:56:24 h2812830 sshd[3632]: Invalid user master from 50.254.86.98 port 56278 Dec 10 15:56:26 h2812830 sshd[3632]: Failed password for invalid user master from 50.254.86.98 port 56278 ssh2 Dec 10 16:03:54 h2812830 sshd[3997]: Invalid user deloras from 50.254.86.98 port 54006 ... |
2019-12-10 23:25:26 |
| 179.106.17.192 | attackbotsspam | SIP/5060 Probe, BF, Hack - |
2019-12-11 00:03:19 |