城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.106.134.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61111
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.106.134.67. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:26:11 CST 2025
;; MSG SIZE rcvd: 107
Host 67.134.106.130.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 67.134.106.130.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 169.61.43.20 | attackspambots | ... |
2020-06-03 20:13:08 |
| 142.93.43.11 | attackbotsspam | fail2ban/Jun 3 13:50:34 h1962932 sshd[17058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.43.11 user=root Jun 3 13:50:36 h1962932 sshd[17058]: Failed password for root from 142.93.43.11 port 34904 ssh2 Jun 3 13:54:00 h1962932 sshd[17140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.43.11 user=root Jun 3 13:54:03 h1962932 sshd[17140]: Failed password for root from 142.93.43.11 port 40170 ssh2 Jun 3 13:57:28 h1962932 sshd[17230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.43.11 user=root Jun 3 13:57:30 h1962932 sshd[17230]: Failed password for root from 142.93.43.11 port 45450 ssh2 |
2020-06-03 20:20:49 |
| 195.87.86.170 | attackspambots | Unauthorised access (Jun 3) SRC=195.87.86.170 LEN=52 TTL=115 ID=32052 DF TCP DPT=445 WINDOW=8192 SYN |
2020-06-03 20:43:34 |
| 202.147.198.154 | attackbotsspam | Jun 3 01:49:25 php1 sshd\[27687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.147.198.154 user=root Jun 3 01:49:26 php1 sshd\[27687\]: Failed password for root from 202.147.198.154 port 49083 ssh2 Jun 3 01:53:31 php1 sshd\[28037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.147.198.154 user=root Jun 3 01:53:33 php1 sshd\[28037\]: Failed password for root from 202.147.198.154 port 50963 ssh2 Jun 3 01:57:35 php1 sshd\[28371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.147.198.154 user=root |
2020-06-03 20:14:48 |
| 51.38.37.89 | attackbots | Jun 3 13:50:49 localhost sshd\[11878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.37.89 user=root Jun 3 13:50:51 localhost sshd\[11878\]: Failed password for root from 51.38.37.89 port 43456 ssh2 Jun 3 13:54:15 localhost sshd\[11957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.37.89 user=root Jun 3 13:54:17 localhost sshd\[11957\]: Failed password for root from 51.38.37.89 port 46948 ssh2 Jun 3 13:57:40 localhost sshd\[12166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.37.89 user=root ... |
2020-06-03 20:13:47 |
| 222.186.175.167 | attack | Jun 3 05:11:50 debian sshd[6808]: Unable to negotiate with 222.186.175.167 port 64742: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Jun 3 08:40:06 debian sshd[28933]: Unable to negotiate with 222.186.175.167 port 33124: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-06-03 20:43:54 |
| 152.0.56.54 | attack | Brute forcing RDP port 3389 |
2020-06-03 20:38:11 |
| 113.214.25.170 | attack | Jun 3 14:13:15 haigwepa sshd[11828]: Failed password for root from 113.214.25.170 port 39333 ssh2 ... |
2020-06-03 20:29:10 |
| 162.247.74.74 | attack | Jun 3 11:57:39 localhost sshd[74648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=wiebe.tor-exit.calyxinstitute.org user=sshd Jun 3 11:57:41 localhost sshd[74648]: Failed password for sshd from 162.247.74.74 port 55388 ssh2 Jun 3 11:57:43 localhost sshd[74648]: Failed password for sshd from 162.247.74.74 port 55388 ssh2 Jun 3 11:57:39 localhost sshd[74648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=wiebe.tor-exit.calyxinstitute.org user=sshd Jun 3 11:57:41 localhost sshd[74648]: Failed password for sshd from 162.247.74.74 port 55388 ssh2 Jun 3 11:57:43 localhost sshd[74648]: Failed password for sshd from 162.247.74.74 port 55388 ssh2 Jun 3 11:57:39 localhost sshd[74648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=wiebe.tor-exit.calyxinstitute.org user=sshd Jun 3 11:57:41 localhost sshd[74648]: Failed password for sshd from 162.247.74.74 port ... |
2020-06-03 20:12:12 |
| 61.185.114.130 | attackspambots | Jun 3 13:48:32 MainVPS sshd[27173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130 user=root Jun 3 13:48:34 MainVPS sshd[27173]: Failed password for root from 61.185.114.130 port 46676 ssh2 Jun 3 13:53:49 MainVPS sshd[32372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130 user=root Jun 3 13:53:52 MainVPS sshd[32372]: Failed password for root from 61.185.114.130 port 53828 ssh2 Jun 3 13:57:50 MainVPS sshd[3330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130 user=root Jun 3 13:57:52 MainVPS sshd[3330]: Failed password for root from 61.185.114.130 port 52570 ssh2 ... |
2020-06-03 20:07:16 |
| 222.186.42.136 | attackbotsspam | 2020-06-03T12:30:16.171114abusebot-4.cloudsearch.cf sshd[3968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136 user=root 2020-06-03T12:30:18.199339abusebot-4.cloudsearch.cf sshd[3968]: Failed password for root from 222.186.42.136 port 38088 ssh2 2020-06-03T12:30:20.732377abusebot-4.cloudsearch.cf sshd[3968]: Failed password for root from 222.186.42.136 port 38088 ssh2 2020-06-03T12:30:16.171114abusebot-4.cloudsearch.cf sshd[3968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136 user=root 2020-06-03T12:30:18.199339abusebot-4.cloudsearch.cf sshd[3968]: Failed password for root from 222.186.42.136 port 38088 ssh2 2020-06-03T12:30:20.732377abusebot-4.cloudsearch.cf sshd[3968]: Failed password for root from 222.186.42.136 port 38088 ssh2 2020-06-03T12:30:32.524972abusebot-4.cloudsearch.cf sshd[3984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser ... |
2020-06-03 20:31:48 |
| 49.232.144.7 | attackbots | Failed password for root from 49.232.144.7 port 40868 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.144.7 user=root Failed password for root from 49.232.144.7 port 56186 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.144.7 user=root Failed password for root from 49.232.144.7 port 43270 ssh2 |
2020-06-03 20:23:27 |
| 182.61.108.64 | attack | Jun 3 14:08:57 abendstille sshd\[6639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.64 user=root Jun 3 14:09:00 abendstille sshd\[6639\]: Failed password for root from 182.61.108.64 port 47920 ssh2 Jun 3 14:11:13 abendstille sshd\[8856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.64 user=root Jun 3 14:11:15 abendstille sshd\[8856\]: Failed password for root from 182.61.108.64 port 53280 ssh2 Jun 3 14:13:40 abendstille sshd\[11405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.64 user=root ... |
2020-06-03 20:20:28 |
| 82.100.239.100 | attackbots | Brute forcing RDP port 3389 |
2020-06-03 20:38:47 |
| 222.186.30.35 | attackspambots | Jun 3 14:31:37 minden010 sshd[9197]: Failed password for root from 222.186.30.35 port 12643 ssh2 Jun 3 14:31:40 minden010 sshd[9197]: Failed password for root from 222.186.30.35 port 12643 ssh2 Jun 3 14:31:42 minden010 sshd[9197]: Failed password for root from 222.186.30.35 port 12643 ssh2 ... |
2020-06-03 20:42:30 |