城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.109.195.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.109.195.64. IN A
;; AUTHORITY SECTION:
. 449 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019110201 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 01:55:26 CST 2019
;; MSG SIZE rcvd: 118
Host 64.195.109.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 64.195.109.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 161.0.158.172 | attackspambots | Autoban 161.0.158.172 AUTH/CONNECT |
2019-11-04 18:13:54 |
| 91.207.40.43 | attack | Nov 3 23:10:20 tdfoods sshd\[18929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.43 user=root Nov 3 23:10:21 tdfoods sshd\[18929\]: Failed password for root from 91.207.40.43 port 55598 ssh2 Nov 3 23:14:41 tdfoods sshd\[19295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.43 user=root Nov 3 23:14:43 tdfoods sshd\[19295\]: Failed password for root from 91.207.40.43 port 37626 ssh2 Nov 3 23:19:03 tdfoods sshd\[19654\]: Invalid user test from 91.207.40.43 |
2019-11-04 17:42:00 |
| 58.240.110.174 | attack | Nov 4 06:14:31 lvps87-230-18-107 sshd[32549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.240.110.174 user=r.r Nov 4 06:14:33 lvps87-230-18-107 sshd[32549]: Failed password for r.r from 58.240.110.174 port 36066 ssh2 Nov 4 06:14:33 lvps87-230-18-107 sshd[32549]: Received disconnect from 58.240.110.174: 11: Bye Bye [preauth] Nov 4 06:46:38 lvps87-230-18-107 sshd[487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.240.110.174 user=r.r Nov 4 06:46:40 lvps87-230-18-107 sshd[487]: Failed password for r.r from 58.240.110.174 port 53550 ssh2 Nov 4 06:46:40 lvps87-230-18-107 sshd[487]: Received disconnect from 58.240.110.174: 11: Bye Bye [preauth] Nov 4 06:48:34 lvps87-230-18-107 sshd[499]: Invalid user amoswon from 58.240.110.174 Nov 4 06:48:34 lvps87-230-18-107 sshd[499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.240.110.174 N........ ------------------------------- |
2019-11-04 17:48:23 |
| 36.80.48.9 | attackspam | F2B jail: sshd. Time: 2019-11-04 10:27:44, Reported by: VKReport |
2019-11-04 17:47:21 |
| 157.245.107.153 | attackspam | Nov 4 09:08:37 vpn01 sshd[13130]: Failed password for root from 157.245.107.153 port 46578 ssh2 ... |
2019-11-04 18:03:56 |
| 219.92.117.83 | attackbots | scanner |
2019-11-04 18:04:31 |
| 180.250.124.227 | attackspambots | 2019-11-04T09:29:57.710628abusebot-5.cloudsearch.cf sshd\[13672\]: Invalid user mis from 180.250.124.227 port 49130 |
2019-11-04 17:46:05 |
| 104.245.145.42 | attackbots | (From silvia.ryan34@gmail.com) Hey there, Do you want to reach brand-new clients? We are personally welcoming you to join one of the leading influencer and affiliate networks on the internet. This network finds influencers and affiliates in your niche who will promote your products/services on their sites and social media channels. Advantages of our program consist of: brand name recognition for your company, increased credibility, and possibly more clients. It is the safest, easiest and most efficient way to increase your sales! What do you think? Find out more here: http://bit.ly/influencerpromo2019 |
2019-11-04 18:18:54 |
| 165.227.46.222 | attack | Nov 4 07:22:40 vps01 sshd[17363]: Failed password for root from 165.227.46.222 port 50640 ssh2 |
2019-11-04 18:17:49 |
| 62.210.132.23 | attackbotsspam | Nov 4 09:10:00 sd-53420 sshd\[23292\]: Invalid user !QAZ2wsx123 from 62.210.132.23 Nov 4 09:10:00 sd-53420 sshd\[23292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.132.23 Nov 4 09:10:02 sd-53420 sshd\[23292\]: Failed password for invalid user !QAZ2wsx123 from 62.210.132.23 port 43302 ssh2 Nov 4 09:13:48 sd-53420 sshd\[23580\]: Invalid user sayeidc from 62.210.132.23 Nov 4 09:13:48 sd-53420 sshd\[23580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.132.23 ... |
2019-11-04 18:07:59 |
| 83.20.207.37 | attackspambots | Automatic report - Port Scan Attack |
2019-11-04 18:16:40 |
| 35.236.164.194 | attackspambots | Nov 3 21:19:45 php1 sshd\[28789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.164.236.35.bc.googleusercontent.com user=root Nov 3 21:19:48 php1 sshd\[28789\]: Failed password for root from 35.236.164.194 port 33744 ssh2 Nov 3 21:24:20 php1 sshd\[29956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.164.236.35.bc.googleusercontent.com user=root Nov 3 21:24:22 php1 sshd\[29956\]: Failed password for root from 35.236.164.194 port 45152 ssh2 Nov 3 21:28:53 php1 sshd\[30470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.164.236.35.bc.googleusercontent.com user=root |
2019-11-04 17:54:05 |
| 172.245.214.174 | attackspam | (From eric@talkwithcustomer.com) Hey, You have a website frostchiropractic.com, right? Of course you do. I am looking at your website now. It gets traffic every day – that you’re probably spending $2 / $4 / $10 or more a click to get. Not including all of the work you put into creating social media, videos, blog posts, emails, and so on. So you’re investing seriously in getting people to that site. But how’s it working? Great? Okay? Not so much? If that answer could be better, then it’s likely you’re putting a lot of time, effort, and money into an approach that’s not paying off like it should. Now… imagine doubling your lead conversion in just minutes… In fact, I’ll go even better. You could actually get up to 100X more conversions! I’m not making this up. As Chris Smith, best-selling author of The Conversion Code says: Speed is essential - there is a 100x decrease in Leads when a Lead is contacted within 14 minutes vs being contacted within 5 minutes. He’s backed up by a s |
2019-11-04 17:50:23 |
| 50.2.189.106 | attackbots | Nov 4 10:30:12 sauna sshd[221378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.2.189.106 Nov 4 10:30:14 sauna sshd[221378]: Failed password for invalid user monique from 50.2.189.106 port 48406 ssh2 ... |
2019-11-04 18:15:46 |
| 54.68.200.31 | attackbotsspam | RDP Bruteforce |
2019-11-04 18:10:56 |