城市(city): unknown
省份(region): unknown
国家(country): Korea (the Republic of)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.140.203.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;125.140.203.34. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400
;; Query time: 148 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 05:01:11 CST 2025
;; MSG SIZE rcvd: 107
Host 34.203.140.125.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 34.203.140.125.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.40.105.6 | attackspam | Sep 29 01:34:24 www sshd[27032]: Invalid user debian from 188.40.105.6 Sep 29 01:34:26 www sshd[27032]: Failed password for invalid user debian from 188.40.105.6 port 42902 ssh2 Sep 29 01:34:26 www sshd[27032]: Received disconnect from 188.40.105.6: 11: Bye Bye [preauth] Sep 29 01:54:02 www sshd[27203]: Invalid user amin from 188.40.105.6 Sep 29 01:54:04 www sshd[27203]: Failed password for invalid user amin from 188.40.105.6 port 58994 ssh2 Sep 29 01:54:04 www sshd[27203]: Received disconnect from 188.40.105.6: 11: Bye Bye [preauth] Sep 29 01:57:46 www sshd[27248]: Invalid user mcftp from 188.40.105.6 Sep 29 01:57:49 www sshd[27248]: Failed password for invalid user mcftp from 188.40.105.6 port 44780 ssh2 Sep 29 01:57:49 www sshd[27248]: Received disconnect from 188.40.105.6: 11: Bye Bye [preauth] Sep 29 02:01:23 www sshd[27297]: Invalid user admin from 188.40.105.6 Sep 29 02:01:25 www sshd[27297]: Failed password for invalid user admin from 188.40.105.6 port 58800 ssh........ ------------------------------- |
2019-09-29 17:55:40 |
| 46.101.105.55 | attackspambots | Sep 28 21:02:28 friendsofhawaii sshd\[5867\]: Invalid user brian from 46.101.105.55 Sep 28 21:02:28 friendsofhawaii sshd\[5867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.telaris.no Sep 28 21:02:30 friendsofhawaii sshd\[5867\]: Failed password for invalid user brian from 46.101.105.55 port 41898 ssh2 Sep 28 21:06:25 friendsofhawaii sshd\[6257\]: Invalid user temptemp from 46.101.105.55 Sep 28 21:06:25 friendsofhawaii sshd\[6257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.telaris.no |
2019-09-29 18:08:50 |
| 146.155.46.37 | attackspambots | Automatic report - Banned IP Access |
2019-09-29 18:21:03 |
| 101.50.69.153 | attackbotsspam | Chat Spam |
2019-09-29 18:16:33 |
| 187.32.120.215 | attackspam | Sep 29 09:24:16 hcbbdb sshd\[9067\]: Invalid user ross from 187.32.120.215 Sep 29 09:24:16 hcbbdb sshd\[9067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.120.215 Sep 29 09:24:18 hcbbdb sshd\[9067\]: Failed password for invalid user ross from 187.32.120.215 port 53886 ssh2 Sep 29 09:28:45 hcbbdb sshd\[9500\]: Invalid user user1 from 187.32.120.215 Sep 29 09:28:45 hcbbdb sshd\[9500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.120.215 |
2019-09-29 17:48:21 |
| 3.86.228.234 | attack | Sep 25 03:28:20 shadeyouvpn sshd[21084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-3-86-228-234.compute-1.amazonaws.com user=r.r Sep 25 03:28:22 shadeyouvpn sshd[21084]: Failed password for r.r from 3.86.228.234 port 44480 ssh2 Sep 25 03:28:22 shadeyouvpn sshd[21084]: Received disconnect from 3.86.228.234: 11: Bye Bye [preauth] Sep 25 03:42:15 shadeyouvpn sshd[29679]: Invalid user dietpi from 3.86.228.234 Sep 25 03:42:15 shadeyouvpn sshd[29679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-3-86-228-234.compute-1.amazonaws.com Sep 25 03:42:17 shadeyouvpn sshd[29679]: Failed password for invalid user dietpi from 3.86.228.234 port 60294 ssh2 Sep 25 03:42:17 shadeyouvpn sshd[29679]: Received disconnect from 3.86.228.234: 11: Bye Bye [preauth] Sep 25 03:45:59 shadeyouvpn sshd[32053]: Invalid user lab from 3.86.228.234 Sep 25 03:45:59 shadeyouvpn sshd[32053]: pam_unix(sshd:auth)........ ------------------------------- |
2019-09-29 18:22:12 |
| 219.142.28.206 | attackspambots | Sep 29 10:47:31 [host] sshd[22930]: Invalid user a4abroad from 219.142.28.206 Sep 29 10:47:31 [host] sshd[22930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.28.206 Sep 29 10:47:33 [host] sshd[22930]: Failed password for invalid user a4abroad from 219.142.28.206 port 39230 ssh2 |
2019-09-29 18:09:07 |
| 42.231.90.84 | attackspam | Honeypot attack, port: 23, PTR: hn.kd.ny.adsl. |
2019-09-29 18:23:55 |
| 125.124.152.133 | attackbotsspam | Automatic report - Banned IP Access |
2019-09-29 17:56:04 |
| 199.76.38.81 | attackbots | Sep 28 23:40:47 php1 sshd\[11749\]: Invalid user test3 from 199.76.38.81 Sep 28 23:40:47 php1 sshd\[11749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.76.38.81 Sep 28 23:40:49 php1 sshd\[11749\]: Failed password for invalid user test3 from 199.76.38.81 port 57223 ssh2 Sep 28 23:48:03 php1 sshd\[12951\]: Invalid user alister from 199.76.38.81 Sep 28 23:48:03 php1 sshd\[12951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.76.38.81 |
2019-09-29 18:00:15 |
| 41.239.26.248 | attack | Honeypot attack, port: 23, PTR: host-41.239.26.248.tedata.net. |
2019-09-29 18:27:31 |
| 192.3.177.213 | attackspam | 2019-09-29T04:15:39.0214401495-001 sshd\[52246\]: Failed password for invalid user user from 192.3.177.213 port 45718 ssh2 2019-09-29T04:28:21.5740091495-001 sshd\[53142\]: Invalid user simran from 192.3.177.213 port 56004 2019-09-29T04:28:21.5809761495-001 sshd\[53142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.177.213 2019-09-29T04:28:22.9155221495-001 sshd\[53142\]: Failed password for invalid user simran from 192.3.177.213 port 56004 ssh2 2019-09-29T04:32:35.8574381495-001 sshd\[53458\]: Invalid user admin from 192.3.177.213 port 40610 2019-09-29T04:32:35.8679041495-001 sshd\[53458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.177.213 ... |
2019-09-29 18:26:17 |
| 49.232.33.89 | attack | Sep 29 11:13:49 OPSO sshd\[966\]: Invalid user user2 from 49.232.33.89 port 56985 Sep 29 11:13:49 OPSO sshd\[966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.33.89 Sep 29 11:13:51 OPSO sshd\[966\]: Failed password for invalid user user2 from 49.232.33.89 port 56985 ssh2 Sep 29 11:19:05 OPSO sshd\[1979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.33.89 user=apache Sep 29 11:19:07 OPSO sshd\[1979\]: Failed password for apache from 49.232.33.89 port 46269 ssh2 |
2019-09-29 17:47:58 |
| 91.243.175.243 | attack | Sep 29 08:41:05 server sshd\[12829\]: Invalid user Ionut from 91.243.175.243 port 33828 Sep 29 08:41:05 server sshd\[12829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.243.175.243 Sep 29 08:41:07 server sshd\[12829\]: Failed password for invalid user Ionut from 91.243.175.243 port 33828 ssh2 Sep 29 08:46:09 server sshd\[443\]: Invalid user bots from 91.243.175.243 port 39300 Sep 29 08:46:09 server sshd\[443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.243.175.243 |
2019-09-29 17:54:41 |
| 81.183.253.86 | attack | Sep 28 19:45:13 php1 sshd\[20501\]: Invalid user Alphanetworks from 81.183.253.86 Sep 28 19:45:13 php1 sshd\[20501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.253.86 Sep 28 19:45:15 php1 sshd\[20501\]: Failed password for invalid user Alphanetworks from 81.183.253.86 port 35326 ssh2 Sep 28 19:50:31 php1 sshd\[21052\]: Invalid user lige from 81.183.253.86 Sep 28 19:50:31 php1 sshd\[21052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.253.86 |
2019-09-29 17:53:41 |