城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.213.147.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.213.147.53. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:57:27 CST 2025
;; MSG SIZE rcvd: 107
53.147.213.122.in-addr.arpa domain name pointer 122x213x147x53.ap122.ftth.ucom.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
53.147.213.122.in-addr.arpa name = 122x213x147x53.ap122.ftth.ucom.ne.jp.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 187.87.39.147 | attackspambots | Jul 11 23:22:03 vtv3 sshd\[30670\]: Invalid user admin from 187.87.39.147 port 38232 Jul 11 23:22:04 vtv3 sshd\[30670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.87.39.147 Jul 11 23:22:06 vtv3 sshd\[30670\]: Failed password for invalid user admin from 187.87.39.147 port 38232 ssh2 Jul 11 23:30:43 vtv3 sshd\[2596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.87.39.147 user=root Jul 11 23:30:45 vtv3 sshd\[2596\]: Failed password for root from 187.87.39.147 port 36756 ssh2 Jul 11 23:43:14 vtv3 sshd\[8410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.87.39.147 user=root Jul 11 23:43:17 vtv3 sshd\[8410\]: Failed password for root from 187.87.39.147 port 38860 ssh2 Jul 11 23:49:41 vtv3 sshd\[11401\]: Invalid user sc from 187.87.39.147 port 39908 Jul 11 23:49:41 vtv3 sshd\[11401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh |
2019-07-13 00:33:15 |
| 106.13.104.94 | attackspambots | Brute force attempt |
2019-07-13 01:19:06 |
| 212.64.39.109 | attackspambots | Jul 12 18:50:11 eventyay sshd[14841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.39.109 Jul 12 18:50:14 eventyay sshd[14841]: Failed password for invalid user test from 212.64.39.109 port 39746 ssh2 Jul 12 18:56:09 eventyay sshd[16433]: Failed password for root from 212.64.39.109 port 60776 ssh2 ... |
2019-07-13 01:07:06 |
| 195.34.242.72 | attack | Unauthorized connection attempt from IP address 195.34.242.72 on Port 445(SMB) |
2019-07-13 01:09:33 |
| 185.74.4.189 | attack | Jul 12 18:56:57 vps647732 sshd[23663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189 Jul 12 18:56:59 vps647732 sshd[23663]: Failed password for invalid user minecraft from 185.74.4.189 port 36068 ssh2 ... |
2019-07-13 01:04:18 |
| 112.85.42.87 | attackspambots | Jul 12 16:31:51 mail sshd\[5261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root Jul 12 16:31:54 mail sshd\[5261\]: Failed password for root from 112.85.42.87 port 24250 ssh2 Jul 12 16:31:56 mail sshd\[5261\]: Failed password for root from 112.85.42.87 port 24250 ssh2 Jul 12 16:31:58 mail sshd\[5261\]: Failed password for root from 112.85.42.87 port 24250 ssh2 Jul 12 16:32:28 mail sshd\[5298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root ... |
2019-07-13 00:43:56 |
| 116.203.93.61 | attack | 116.203.93.61 - - \[12/Jul/2019:14:26:49 +0200\] "POST /wp-login.php HTTP/1.1" 200 2110 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 116.203.93.61 - - \[12/Jul/2019:14:26:49 +0200\] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2019-07-13 00:26:41 |
| 37.139.21.75 | attackbots | Jul 12 16:41:05 srv03 sshd\[22354\]: Invalid user denise from 37.139.21.75 port 48218 Jul 12 16:41:05 srv03 sshd\[22354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.21.75 Jul 12 16:41:07 srv03 sshd\[22354\]: Failed password for invalid user denise from 37.139.21.75 port 48218 ssh2 |
2019-07-13 01:06:47 |
| 218.104.199.131 | attackspambots | 2019-07-12T16:30:12.007206hub.schaetter.us sshd\[16719\]: Invalid user lab from 218.104.199.131 2019-07-12T16:30:12.048962hub.schaetter.us sshd\[16719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.199.131 2019-07-12T16:30:14.361949hub.schaetter.us sshd\[16719\]: Failed password for invalid user lab from 218.104.199.131 port 45523 ssh2 2019-07-12T16:36:43.666668hub.schaetter.us sshd\[16818\]: Invalid user ms from 218.104.199.131 2019-07-12T16:36:43.715014hub.schaetter.us sshd\[16818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.199.131 ... |
2019-07-13 01:10:42 |
| 84.217.220.68 | attack | SSH/22 Probe, BF, Hack - |
2019-07-13 01:24:25 |
| 107.170.249.81 | attackbots | Jul 12 18:16:45 minden010 sshd[13119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.81 Jul 12 18:16:47 minden010 sshd[13119]: Failed password for invalid user robinson from 107.170.249.81 port 41801 ssh2 Jul 12 18:22:03 minden010 sshd[14958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.81 ... |
2019-07-13 00:35:26 |
| 41.200.197.47 | attack | LGS,WP GET /wp-login.php |
2019-07-13 00:19:53 |
| 185.117.215.9 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.117.215.9 user=root Failed password for root from 185.117.215.9 port 46260 ssh2 Failed password for root from 185.117.215.9 port 46260 ssh2 Failed password for root from 185.117.215.9 port 46260 ssh2 Failed password for root from 185.117.215.9 port 46260 ssh2 |
2019-07-13 00:56:29 |
| 149.56.44.47 | attackspam | 2019-07-12T18:58:44.8445781240 sshd\[14404\]: Invalid user admin from 149.56.44.47 port 43426 2019-07-12T18:58:44.8523481240 sshd\[14404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.47 2019-07-12T18:58:46.8586871240 sshd\[14404\]: Failed password for invalid user admin from 149.56.44.47 port 43426 ssh2 ... |
2019-07-13 01:14:46 |
| 112.198.194.243 | attackbotsspam | Jul 12 11:26:00 aat-srv002 sshd[22663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.194.243 Jul 12 11:26:02 aat-srv002 sshd[22663]: Failed password for invalid user test2 from 112.198.194.243 port 60011 ssh2 Jul 12 11:32:34 aat-srv002 sshd[22875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.194.243 Jul 12 11:32:36 aat-srv002 sshd[22875]: Failed password for invalid user postgres from 112.198.194.243 port 48185 ssh2 ... |
2019-07-13 01:05:12 |