城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.40.193.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10809
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;132.40.193.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030200 1800 900 604800 86400
;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 01:10:21 CST 2025
;; MSG SIZE rcvd: 107
Host 142.193.40.132.in-addr.arpa not found: 2(SERVFAIL)
server can't find 132.40.193.142.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
77.247.108.119 | attack | 5038/tcp 5038/tcp 5038/tcp... [2020-03-26/05-26]3016pkt,1pt.(tcp) |
2020-05-27 03:06:21 |
111.229.50.131 | attackbots | May 26 20:47:16 legacy sshd[2640]: Failed password for root from 111.229.50.131 port 40810 ssh2 May 26 20:49:14 legacy sshd[2653]: Failed password for root from 111.229.50.131 port 35232 ssh2 May 26 20:51:14 legacy sshd[2689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.50.131 ... |
2020-05-27 02:59:04 |
137.74.132.171 | attackbotsspam | May 26 19:53:14 pve1 sshd[2933]: Failed password for root from 137.74.132.171 port 58022 ssh2 ... |
2020-05-27 02:45:00 |
163.172.96.131 | attack | Proxy for DDOS |
2020-05-27 02:49:58 |
114.40.150.3 | attackspam | Port Scan detected! ... |
2020-05-27 02:59:56 |
223.155.178.129 | attack | Automatic report - Port Scan Attack |
2020-05-27 02:59:38 |
122.51.243.223 | attack | Fail2Ban - SSH Bruteforce Attempt |
2020-05-27 02:57:03 |
223.68.169.180 | attack | $f2bV_matches |
2020-05-27 03:11:26 |
211.252.85.24 | attackbots | May 26 19:02:26 vps687878 sshd\[21232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.85.24 user=root May 26 19:02:28 vps687878 sshd\[21232\]: Failed password for root from 211.252.85.24 port 48276 ssh2 May 26 19:06:01 vps687878 sshd\[21613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.85.24 user=root May 26 19:06:03 vps687878 sshd\[21613\]: Failed password for root from 211.252.85.24 port 39522 ssh2 May 26 19:09:47 vps687878 sshd\[21889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.85.24 user=root ... |
2020-05-27 03:02:16 |
129.211.24.104 | attackspambots | May 26 19:56:20 ns382633 sshd\[972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.104 user=root May 26 19:56:22 ns382633 sshd\[972\]: Failed password for root from 129.211.24.104 port 58946 ssh2 May 26 20:02:12 ns382633 sshd\[1516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.104 user=root May 26 20:02:14 ns382633 sshd\[1516\]: Failed password for root from 129.211.24.104 port 39854 ssh2 May 26 20:10:28 ns382633 sshd\[3261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.104 user=root |
2020-05-27 03:07:48 |
190.119.190.122 | attackbots | May 26 17:55:00 Ubuntu-1404-trusty-64-minimal sshd\[7265\]: Invalid user 13 from 190.119.190.122 May 26 17:55:00 Ubuntu-1404-trusty-64-minimal sshd\[7265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.119.190.122 May 26 17:55:03 Ubuntu-1404-trusty-64-minimal sshd\[7265\]: Failed password for invalid user 13 from 190.119.190.122 port 52912 ssh2 May 26 18:07:08 Ubuntu-1404-trusty-64-minimal sshd\[25365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.119.190.122 user=root May 26 18:07:09 Ubuntu-1404-trusty-64-minimal sshd\[25365\]: Failed password for root from 190.119.190.122 port 57346 ssh2 |
2020-05-27 02:50:43 |
46.105.31.249 | attackspambots | 2020-05-26T17:39:13.504324ns386461 sshd\[11513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=249.ip-46-105-31.eu user=root 2020-05-26T17:39:15.185075ns386461 sshd\[11513\]: Failed password for root from 46.105.31.249 port 41040 ssh2 2020-05-26T17:51:04.627409ns386461 sshd\[22201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=249.ip-46-105-31.eu user=root 2020-05-26T17:51:07.282548ns386461 sshd\[22201\]: Failed password for root from 46.105.31.249 port 56826 ssh2 2020-05-26T17:53:48.881788ns386461 sshd\[25080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=249.ip-46-105-31.eu user=root ... |
2020-05-27 03:04:48 |
180.76.179.213 | attack | (sshd) Failed SSH login from 180.76.179.213 (CN/China/-): 5 in the last 3600 secs |
2020-05-27 02:34:17 |
222.186.30.112 | attackspam | May 26 18:36:00 marvibiene sshd[58049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root May 26 18:36:02 marvibiene sshd[58049]: Failed password for root from 222.186.30.112 port 13929 ssh2 May 26 18:36:04 marvibiene sshd[58049]: Failed password for root from 222.186.30.112 port 13929 ssh2 May 26 18:36:00 marvibiene sshd[58049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root May 26 18:36:02 marvibiene sshd[58049]: Failed password for root from 222.186.30.112 port 13929 ssh2 May 26 18:36:04 marvibiene sshd[58049]: Failed password for root from 222.186.30.112 port 13929 ssh2 ... |
2020-05-27 02:38:28 |
103.48.192.48 | attackbotsspam | May 26 20:50:34 DAAP sshd[28779]: Invalid user hadoop from 103.48.192.48 port 21550 May 26 20:50:34 DAAP sshd[28779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48 May 26 20:50:34 DAAP sshd[28779]: Invalid user hadoop from 103.48.192.48 port 21550 May 26 20:50:35 DAAP sshd[28779]: Failed password for invalid user hadoop from 103.48.192.48 port 21550 ssh2 May 26 20:55:25 DAAP sshd[28823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.192.48 user=root May 26 20:55:27 DAAP sshd[28823]: Failed password for root from 103.48.192.48 port 10386 ssh2 ... |
2020-05-27 03:13:19 |