城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.139.35.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.139.35.126. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 11:39:14 CST 2025
;; MSG SIZE rcvd: 107
Host 126.35.139.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 126.35.139.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 81.22.45.253 | attackbotsspam | Dec 4 19:39:33 mc1 kernel: \[6770976.743682\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.253 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=10839 PROTO=TCP SPT=51645 DPT=10576 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 4 19:41:57 mc1 kernel: \[6771120.445214\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.253 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=9700 PROTO=TCP SPT=51645 DPT=12113 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 4 19:42:54 mc1 kernel: \[6771177.547683\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.253 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=29360 PROTO=TCP SPT=51645 DPT=7714 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-12-05 02:53:35 |
| 119.205.235.251 | attackspambots | Dec 4 18:26:55 sxvn sshd[378155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.235.251 |
2019-12-05 02:58:14 |
| 106.13.63.202 | attackspambots | Dec 4 16:58:39 marvibiene sshd[47773]: Invalid user loni from 106.13.63.202 port 49910 Dec 4 16:58:39 marvibiene sshd[47773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.63.202 Dec 4 16:58:39 marvibiene sshd[47773]: Invalid user loni from 106.13.63.202 port 49910 Dec 4 16:58:41 marvibiene sshd[47773]: Failed password for invalid user loni from 106.13.63.202 port 49910 ssh2 ... |
2019-12-05 02:57:31 |
| 1.53.137.12 | attack | IP was detected trying to Brute-Force SSH, FTP, Web Apps or Hacking. |
2019-12-05 03:15:50 |
| 197.51.207.238 | attack | Automatic report - Banned IP Access |
2019-12-05 03:02:17 |
| 118.25.126.32 | attackspambots | Dec 4 19:35:59 gw1 sshd[8571]: Failed password for daemon from 118.25.126.32 port 55226 ssh2 ... |
2019-12-05 03:29:30 |
| 187.190.236.88 | attackbots | Dec 4 12:00:43 work-partkepr sshd\[2264\]: Invalid user yoyo from 187.190.236.88 port 42176 Dec 4 12:00:43 work-partkepr sshd\[2264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.236.88 ... |
2019-12-05 03:22:36 |
| 94.191.58.157 | attackbots | Dec 4 06:10:03 kapalua sshd\[24578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.58.157 user=root Dec 4 06:10:05 kapalua sshd\[24578\]: Failed password for root from 94.191.58.157 port 49892 ssh2 Dec 4 06:18:33 kapalua sshd\[25295\]: Invalid user yoyo from 94.191.58.157 Dec 4 06:18:33 kapalua sshd\[25295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.58.157 Dec 4 06:18:35 kapalua sshd\[25295\]: Failed password for invalid user yoyo from 94.191.58.157 port 58300 ssh2 |
2019-12-05 03:23:07 |
| 182.254.184.247 | attack | Repeated brute force against a port |
2019-12-05 03:24:44 |
| 177.73.8.230 | spamattack | hacking attempts reported by Microsoft from 177.73.8.230 on a UK account for a recent data breach reported on https://haveibeenpwned.com/ |
2019-12-05 03:17:06 |
| 106.13.78.218 | attack | Dec 4 13:45:51 sauna sshd[34177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.218 Dec 4 13:45:53 sauna sshd[34177]: Failed password for invalid user cresap from 106.13.78.218 port 48238 ssh2 ... |
2019-12-05 02:51:29 |
| 112.85.42.237 | attack | Dec 4 18:47:30 localhost sshd\[69508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237 user=root Dec 4 18:47:32 localhost sshd\[69508\]: Failed password for root from 112.85.42.237 port 20253 ssh2 Dec 4 18:47:34 localhost sshd\[69508\]: Failed password for root from 112.85.42.237 port 20253 ssh2 Dec 4 18:47:36 localhost sshd\[69508\]: Failed password for root from 112.85.42.237 port 20253 ssh2 Dec 4 18:48:32 localhost sshd\[69529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237 user=root ... |
2019-12-05 02:55:06 |
| 122.51.140.164 | attackspam | Lines containing failures of 122.51.140.164 Dec 3 09:37:19 myhost sshd[19470]: Invalid user cussey from 122.51.140.164 port 55846 Dec 3 09:37:19 myhost sshd[19470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.140.164 Dec 3 09:37:21 myhost sshd[19470]: Failed password for invalid user cussey from 122.51.140.164 port 55846 ssh2 Dec 3 09:37:21 myhost sshd[19470]: Received disconnect from 122.51.140.164 port 55846:11: Bye Bye [preauth] Dec 3 09:37:21 myhost sshd[19470]: Disconnected from invalid user cussey 122.51.140.164 port 55846 [preauth] Dec 3 09:51:23 myhost sshd[19544]: User r.r from 122.51.140.164 not allowed because not listed in AllowUsers Dec 3 09:51:23 myhost sshd[19544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.140.164 user=r.r Dec 3 09:51:25 myhost sshd[19544]: Failed password for invalid user r.r from 122.51.140.164 port 46762 ssh2 Dec 3 09:51:25 ........ ------------------------------ |
2019-12-05 03:29:01 |
| 222.186.175.182 | attackbots | Dec 3 05:27:37 microserver sshd[39871]: Failed none for root from 222.186.175.182 port 21518 ssh2 Dec 3 05:27:38 microserver sshd[39871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root Dec 3 05:27:40 microserver sshd[39871]: Failed password for root from 222.186.175.182 port 21518 ssh2 Dec 3 05:27:43 microserver sshd[39871]: Failed password for root from 222.186.175.182 port 21518 ssh2 Dec 3 05:27:46 microserver sshd[39871]: Failed password for root from 222.186.175.182 port 21518 ssh2 Dec 3 10:15:26 microserver sshd[16640]: Failed none for root from 222.186.175.182 port 31706 ssh2 Dec 3 10:15:26 microserver sshd[16640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root Dec 3 10:15:28 microserver sshd[16640]: Failed password for root from 222.186.175.182 port 31706 ssh2 Dec 3 10:15:32 microserver sshd[16640]: Failed password for root from 222.186.175.182 port 31706 ssh2 |
2019-12-05 03:12:13 |
| 181.44.68.66 | attackspam | 2019-12-04T19:03:05.522648abusebot-5.cloudsearch.cf sshd\[31225\]: Invalid user lee from 181.44.68.66 port 48875 |
2019-12-05 03:20:13 |