城市(city): Washington
省份(region): Virginia
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): Microsoft Corporation
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.92.94.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12589
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;13.92.94.20. IN A
;; AUTHORITY SECTION:
. 3226 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019060100 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 01 21:01:45 CST 2019
;; MSG SIZE rcvd: 115
Host 20.94.92.13.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 20.94.92.13.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 60.23.107.219 | attackbots | Unauthorised access (Oct 7) SRC=60.23.107.219 LEN=40 TTL=49 ID=28698 TCP DPT=8080 WINDOW=52345 SYN Unauthorised access (Oct 7) SRC=60.23.107.219 LEN=40 TTL=49 ID=34480 TCP DPT=8080 WINDOW=64323 SYN Unauthorised access (Oct 7) SRC=60.23.107.219 LEN=40 TTL=49 ID=10694 TCP DPT=8080 WINDOW=63562 SYN Unauthorised access (Oct 6) SRC=60.23.107.219 LEN=40 TTL=49 ID=58879 TCP DPT=8080 WINDOW=63562 SYN Unauthorised access (Oct 6) SRC=60.23.107.219 LEN=40 TTL=49 ID=31799 TCP DPT=8080 WINDOW=52345 SYN |
2019-10-07 16:56:48 |
| 223.220.159.78 | attackspam | Oct 7 08:54:12 [host] sshd[24393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78 user=root Oct 7 08:54:14 [host] sshd[24393]: Failed password for root from 223.220.159.78 port 44545 ssh2 Oct 7 08:58:40 [host] sshd[24540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78 user=root |
2019-10-07 17:17:49 |
| 153.36.59.154 | attack | Unauthorised access (Oct 7) SRC=153.36.59.154 LEN=40 TTL=49 ID=22333 TCP DPT=8080 WINDOW=1405 SYN Unauthorised access (Oct 7) SRC=153.36.59.154 LEN=40 TTL=49 ID=13010 TCP DPT=8080 WINDOW=33678 SYN Unauthorised access (Oct 7) SRC=153.36.59.154 LEN=40 TTL=49 ID=1598 TCP DPT=8080 WINDOW=33678 SYN Unauthorised access (Oct 6) SRC=153.36.59.154 LEN=40 TTL=49 ID=32068 TCP DPT=8080 WINDOW=33678 SYN |
2019-10-07 17:07:48 |
| 54.38.184.235 | attackspam | Unauthorized SSH login attempts |
2019-10-07 17:23:24 |
| 138.197.179.102 | attack | Oct 7 00:36:31 nxxxxxxx sshd[19333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.102 user=r.r Oct 7 00:36:33 nxxxxxxx sshd[19333]: Failed password for r.r from 138.197.179.102 port 34402 ssh2 Oct 7 00:36:33 nxxxxxxx sshd[19333]: Received disconnect from 138.197.179.102: 11: Bye Bye [preauth] Oct 7 00:41:20 nxxxxxxx sshd[19724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.102 user=r.r Oct 7 00:41:22 nxxxxxxx sshd[19724]: Failed password for r.r from 138.197.179.102 port 54628 ssh2 Oct 7 00:41:22 nxxxxxxx sshd[19724]: Received disconnect from 138.197.179.102: 11: Bye Bye [preauth] Oct 7 00:45:02 nxxxxxxx sshd[20043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.102 user=r.r Oct 7 00:45:04 nxxxxxxx sshd[20043]: Failed password for r.r from 138.197.179.102 port 39986 ssh2 Oct 7 00:45:04 nxxxxxxx ss........ ------------------------------- |
2019-10-07 16:51:25 |
| 188.131.232.70 | attack | Oct 7 10:59:23 localhost sshd\[21194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.232.70 user=root Oct 7 10:59:25 localhost sshd\[21194\]: Failed password for root from 188.131.232.70 port 59838 ssh2 Oct 7 11:03:56 localhost sshd\[21713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.232.70 user=root |
2019-10-07 17:22:51 |
| 80.253.20.94 | attack | Unauthorised access (Oct 7) SRC=80.253.20.94 LEN=40 TTL=246 ID=25906 TCP DPT=445 WINDOW=1024 SYN |
2019-10-07 16:44:03 |
| 40.122.29.117 | attackspam | Oct 7 08:59:07 MK-Soft-VM3 sshd[18584]: Failed password for root from 40.122.29.117 port 1280 ssh2 ... |
2019-10-07 17:24:16 |
| 59.10.6.152 | attack | no |
2019-10-07 17:15:48 |
| 61.246.7.145 | attack | Oct 6 19:27:20 auw2 sshd\[26292\]: Invalid user Monaco!23 from 61.246.7.145 Oct 6 19:27:20 auw2 sshd\[26292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145 Oct 6 19:27:21 auw2 sshd\[26292\]: Failed password for invalid user Monaco!23 from 61.246.7.145 port 49768 ssh2 Oct 6 19:32:16 auw2 sshd\[26690\]: Invalid user Cent0s2018 from 61.246.7.145 Oct 6 19:32:16 auw2 sshd\[26690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.246.7.145 |
2019-10-07 16:56:30 |
| 104.248.138.223 | attack | Oct 7 05:43:20 pornomens sshd\[9476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.138.223 user=root Oct 7 05:43:23 pornomens sshd\[9476\]: Failed password for root from 104.248.138.223 port 49918 ssh2 Oct 7 05:47:00 pornomens sshd\[9485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.138.223 user=root ... |
2019-10-07 17:06:21 |
| 5.196.75.178 | attack | Oct 7 09:59:21 legacy sshd[15409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.75.178 Oct 7 09:59:23 legacy sshd[15409]: Failed password for invalid user Professur123 from 5.196.75.178 port 39520 ssh2 Oct 7 10:06:59 legacy sshd[15665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.75.178 ... |
2019-10-07 16:54:37 |
| 45.136.109.200 | attack | 10/07/2019-05:18:11.090025 45.136.109.200 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-07 17:25:59 |
| 106.13.81.18 | attack | Oct 7 10:01:41 h2177944 sshd\[24531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.18 user=root Oct 7 10:01:43 h2177944 sshd\[24531\]: Failed password for root from 106.13.81.18 port 40000 ssh2 Oct 7 10:06:20 h2177944 sshd\[24646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.18 user=root Oct 7 10:06:21 h2177944 sshd\[24646\]: Failed password for root from 106.13.81.18 port 42960 ssh2 ... |
2019-10-07 17:12:34 |
| 82.79.75.192 | attack | Unauthorised access (Oct 7) SRC=82.79.75.192 LEN=44 TTL=244 ID=22960 DF TCP DPT=23 WINDOW=14600 SYN |
2019-10-07 16:43:36 |