城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.136.14.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30224
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.136.14.189. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 361 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:00:12 CST 2025
;; MSG SIZE rcvd: 107
Host 189.14.136.129.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 189.14.136.129.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.70.151.185 | attackspambots | Unauthorised access (Jun 8) SRC=118.70.151.185 LEN=52 TTL=109 ID=31818 DF TCP DPT=445 WINDOW=8192 SYN |
2020-06-08 15:36:34 |
| 62.55.243.3 | attack | <6 unauthorized SSH connections |
2020-06-08 15:48:11 |
| 103.145.12.163 | attackbots | Jun 8 10:14:42 debian kernel: [503040.000229] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=103.145.12.163 DST=89.252.131.35 LEN=440 TOS=0x00 PREC=0x00 TTL=52 ID=60099 DF PROTO=UDP SPT=5080 DPT=5060 LEN=420 |
2020-06-08 16:09:00 |
| 45.55.191.211 | attackbotsspam | 2020-06-08T02:20:48.096309sorsha.thespaminator.com sshd[31812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=contaflex.cl user=root 2020-06-08T02:20:50.275627sorsha.thespaminator.com sshd[31812]: Failed password for root from 45.55.191.211 port 59950 ssh2 ... |
2020-06-08 15:40:16 |
| 103.78.39.106 | attackbotsspam | Jun 8 09:18:16 ns381471 sshd[29148]: Failed password for root from 103.78.39.106 port 37902 ssh2 |
2020-06-08 15:52:49 |
| 182.253.184.20 | attack | Jun 8 06:08:01 inter-technics sshd[24295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.184.20 user=root Jun 8 06:08:03 inter-technics sshd[24295]: Failed password for root from 182.253.184.20 port 37164 ssh2 Jun 8 06:09:14 inter-technics sshd[24462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.184.20 user=root Jun 8 06:09:16 inter-technics sshd[24462]: Failed password for root from 182.253.184.20 port 34056 ssh2 Jun 8 06:10:28 inter-technics sshd[24556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.184.20 user=root Jun 8 06:10:30 inter-technics sshd[24556]: Failed password for root from 182.253.184.20 port 59232 ssh2 ... |
2020-06-08 15:49:00 |
| 95.167.225.85 | attackspambots | Jun 8 06:51:43 server sshd[52689]: Failed password for root from 95.167.225.85 port 58050 ssh2 Jun 8 06:57:28 server sshd[57145]: Failed password for root from 95.167.225.85 port 58708 ssh2 Jun 8 07:03:04 server sshd[61821]: Failed password for root from 95.167.225.85 port 59366 ssh2 |
2020-06-08 16:03:43 |
| 185.240.65.251 | attackspam | Jun 8 01:33:53 server1 sshd\[4034\]: Invalid user avahi-autoipd from 185.240.65.251 Jun 8 01:33:53 server1 sshd\[4034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.240.65.251 Jun 8 01:33:56 server1 sshd\[4034\]: Failed password for invalid user avahi-autoipd from 185.240.65.251 port 6664 ssh2 Jun 8 01:42:33 server1 sshd\[6401\]: Invalid user avahi-autoipd from 185.240.65.251 Jun 8 01:42:33 server1 sshd\[6401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.240.65.251 ... |
2020-06-08 15:50:22 |
| 89.248.160.178 | attackspam |
|
2020-06-08 16:15:28 |
| 139.155.17.13 | attack | Jun 8 06:48:52 vpn01 sshd[30804]: Failed password for root from 139.155.17.13 port 58498 ssh2 ... |
2020-06-08 15:54:10 |
| 49.235.240.141 | attack | 2020-06-07 23:04:12.731310-0500 localhost sshd[26635]: Failed password for root from 49.235.240.141 port 42110 ssh2 |
2020-06-08 16:14:09 |
| 203.195.214.104 | attackbotsspam | Jun 8 06:55:39 fhem-rasp sshd[16068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.214.104 user=root Jun 8 06:55:41 fhem-rasp sshd[16068]: Failed password for root from 203.195.214.104 port 43621 ssh2 ... |
2020-06-08 15:58:35 |
| 51.15.214.21 | attackbots | Jun 7 23:43:38 Host-KLAX-C sshd[3158]: User root from 51.15.214.21 not allowed because not listed in AllowUsers ... |
2020-06-08 15:43:05 |
| 222.186.31.166 | attackspam | Jun 8 03:35:31 ny01 sshd[4981]: Failed password for root from 222.186.31.166 port 30632 ssh2 Jun 8 03:35:53 ny01 sshd[5015]: Failed password for root from 222.186.31.166 port 60205 ssh2 |
2020-06-08 15:43:33 |
| 219.250.188.144 | attackspambots | Jun 8 05:50:26 gestao sshd[7629]: Failed password for root from 219.250.188.144 port 60716 ssh2 Jun 8 05:55:34 gestao sshd[7741]: Failed password for root from 219.250.188.144 port 34038 ssh2 ... |
2020-06-08 15:59:45 |