城市(city): unknown
省份(region): unknown
国家(country): Korea (the Republic of)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.38.159.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54967
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.38.159.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 04:53:05 CST 2025
;; MSG SIZE rcvd: 107
Host 142.159.38.122.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.159.38.122.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 164.132.209.242 | attackbotsspam | Sep 4 06:45:50 hanapaa sshd\[20754\]: Invalid user susanna from 164.132.209.242 Sep 4 06:45:50 hanapaa sshd\[20754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip242.ip-164-132-209.eu Sep 4 06:45:51 hanapaa sshd\[20754\]: Failed password for invalid user susanna from 164.132.209.242 port 57172 ssh2 Sep 4 06:50:05 hanapaa sshd\[21134\]: Invalid user tl from 164.132.209.242 Sep 4 06:50:05 hanapaa sshd\[21134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip242.ip-164-132-209.eu |
2019-09-05 00:57:11 |
| 190.5.241.138 | attackspambots | Sep 4 13:04:13 TORMINT sshd\[1790\]: Invalid user tb from 190.5.241.138 Sep 4 13:04:13 TORMINT sshd\[1790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.241.138 Sep 4 13:04:15 TORMINT sshd\[1790\]: Failed password for invalid user tb from 190.5.241.138 port 56246 ssh2 ... |
2019-09-05 01:28:30 |
| 118.25.48.254 | attack | Sep 4 18:48:44 vps691689 sshd[7316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.48.254 Sep 4 18:48:46 vps691689 sshd[7316]: Failed password for invalid user vincintz from 118.25.48.254 port 59668 ssh2 ... |
2019-09-05 00:58:56 |
| 46.101.170.142 | attackbots | Sep 4 10:38:42 vtv3 sshd\[27341\]: Invalid user admln from 46.101.170.142 port 48916 Sep 4 10:38:42 vtv3 sshd\[27341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.170.142 Sep 4 10:38:44 vtv3 sshd\[27341\]: Failed password for invalid user admln from 46.101.170.142 port 48916 ssh2 Sep 4 10:42:39 vtv3 sshd\[29423\]: Invalid user git from 46.101.170.142 port 36378 Sep 4 10:42:39 vtv3 sshd\[29423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.170.142 Sep 4 10:54:34 vtv3 sshd\[3303\]: Invalid user postgres from 46.101.170.142 port 55244 Sep 4 10:54:34 vtv3 sshd\[3303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.170.142 Sep 4 10:54:36 vtv3 sshd\[3303\]: Failed password for invalid user postgres from 46.101.170.142 port 55244 ssh2 Sep 4 10:58:34 vtv3 sshd\[5406\]: Invalid user ls from 46.101.170.142 port 42712 Sep 4 10:58:34 vtv3 sshd\[5406\]: |
2019-09-05 00:58:25 |
| 139.199.248.153 | attackspam | Sep 4 19:24:12 dedicated sshd[7193]: Invalid user o2 from 139.199.248.153 port 42658 |
2019-09-05 01:40:16 |
| 212.86.56.236 | attackbots | Sep 4 05:56:23 friendsofhawaii sshd\[22589\]: Invalid user psw from 212.86.56.236 Sep 4 05:56:23 friendsofhawaii sshd\[22589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.86.56.236 Sep 4 05:56:25 friendsofhawaii sshd\[22589\]: Failed password for invalid user psw from 212.86.56.236 port 62430 ssh2 Sep 4 06:01:37 friendsofhawaii sshd\[23077\]: Invalid user cafe from 212.86.56.236 Sep 4 06:01:37 friendsofhawaii sshd\[23077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.86.56.236 |
2019-09-05 01:05:58 |
| 203.160.132.4 | attackbots | Sep 4 19:05:33 mail sshd\[24155\]: Invalid user kun from 203.160.132.4 port 54712 Sep 4 19:05:33 mail sshd\[24155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.132.4 Sep 4 19:05:34 mail sshd\[24155\]: Failed password for invalid user kun from 203.160.132.4 port 54712 ssh2 Sep 4 19:11:09 mail sshd\[25019\]: Invalid user efsuser from 203.160.132.4 port 42664 Sep 4 19:11:09 mail sshd\[25019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.132.4 |
2019-09-05 01:27:54 |
| 219.121.131.183 | attackbots | Netgear DGN Device Remote Command Execution Vulnerability, PTR: d-219-121-131-183.ftth.katch.ne.jp. |
2019-09-05 01:27:21 |
| 112.85.42.173 | attack | Sep 4 19:13:11 tuxlinux sshd[46291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173 user=root Sep 4 19:13:13 tuxlinux sshd[46291]: Failed password for root from 112.85.42.173 port 20344 ssh2 Sep 4 19:13:11 tuxlinux sshd[46291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173 user=root Sep 4 19:13:13 tuxlinux sshd[46291]: Failed password for root from 112.85.42.173 port 20344 ssh2 ... |
2019-09-05 01:37:00 |
| 88.26.236.2 | attackbots | 2019-09-02T19:23:05.073384ns557175 sshd\[12852\]: Invalid user joeflores from 88.26.236.2 port 42476 2019-09-02T19:23:05.077987ns557175 sshd\[12852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.red-88-26-236.staticip.rima-tde.net 2019-09-02T19:23:06.816984ns557175 sshd\[12852\]: Failed password for invalid user joeflores from 88.26.236.2 port 42476 ssh2 2019-09-02T19:28:14.120985ns557175 sshd\[14453\]: Invalid user fmw from 88.26.236.2 port 39916 2019-09-02T19:28:14.126701ns557175 sshd\[14453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.red-88-26-236.staticip.rima-tde.net 2019-09-02T19:28:15.949806ns557175 sshd\[14453\]: Failed password for invalid user fmw from 88.26.236.2 port 39916 ssh2 2019-09-02T19:31:58.457620ns557175 sshd\[15710\]: Invalid user rmsasi from 88.26.236.2 port 55392 2019-09-02T19:31:58.461959ns557175 sshd\[15710\]: pam_unix\(sshd:auth\): authentication failure\; logn ... |
2019-09-05 01:08:53 |
| 120.86.175.188 | attack | 8080/tcp [2019-09-04]1pkt |
2019-09-05 01:02:30 |
| 23.129.64.159 | attackbots | Sep 4 12:11:25 ny01 sshd[9937]: Failed password for root from 23.129.64.159 port 36251 ssh2 Sep 4 12:11:41 ny01 sshd[9937]: error: maximum authentication attempts exceeded for root from 23.129.64.159 port 36251 ssh2 [preauth] Sep 4 12:11:47 ny01 sshd[9995]: Failed password for root from 23.129.64.159 port 60527 ssh2 |
2019-09-05 00:53:47 |
| 95.142.161.63 | attackbots | [ssh] SSH attack |
2019-09-05 01:37:34 |
| 89.254.148.26 | attack | Sep 2 02:36:29 itv-usvr-01 sshd[25391]: Invalid user mai from 89.254.148.26 Sep 2 02:36:29 itv-usvr-01 sshd[25391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.254.148.26 Sep 2 02:36:29 itv-usvr-01 sshd[25391]: Invalid user mai from 89.254.148.26 Sep 2 02:36:31 itv-usvr-01 sshd[25391]: Failed password for invalid user mai from 89.254.148.26 port 52532 ssh2 Sep 2 02:45:51 itv-usvr-01 sshd[25828]: Invalid user ksb from 89.254.148.26 |
2019-09-05 00:51:43 |
| 61.69.78.78 | attack | $f2bV_matches |
2019-09-05 00:49:00 |