城市(city): Tübingen
省份(region): Baden-Württemberg
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.2.113.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63770
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.2.113.58. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:44:02 CST 2025
;; MSG SIZE rcvd: 105
Host 58.113.2.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 58.113.2.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.166.232.14 | attackbots | Sep 19 21:35:48 localhost sshd\[24221\]: Invalid user can from 188.166.232.14 port 47560 Sep 19 21:35:48 localhost sshd\[24221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.232.14 Sep 19 21:35:50 localhost sshd\[24221\]: Failed password for invalid user can from 188.166.232.14 port 47560 ssh2 |
2019-09-20 03:45:50 |
| 206.201.5.117 | attackbotsspam | Sep 19 09:30:47 kapalua sshd\[15847\]: Invalid user lii from 206.201.5.117 Sep 19 09:30:47 kapalua sshd\[15847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.201.5.117 Sep 19 09:30:49 kapalua sshd\[15847\]: Failed password for invalid user lii from 206.201.5.117 port 54426 ssh2 Sep 19 09:35:59 kapalua sshd\[16323\]: Invalid user weblogic from 206.201.5.117 Sep 19 09:35:59 kapalua sshd\[16323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.201.5.117 |
2019-09-20 03:38:06 |
| 219.145.73.239 | attackspambots | Sep 19 22:50:36 www sshd\[26397\]: Invalid user xd from 219.145.73.239Sep 19 22:50:38 www sshd\[26397\]: Failed password for invalid user xd from 219.145.73.239 port 16716 ssh2Sep 19 22:55:30 www sshd\[26570\]: Invalid user jira from 219.145.73.239 ... |
2019-09-20 03:56:30 |
| 167.99.71.156 | attackbotsspam | Sep 19 18:05:41 reporting sshd[28419]: reveeclipse mapping checking getaddrinfo for preciousreiko26.8.9-singapore-1 [167.99.71.156] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 19 18:05:41 reporting sshd[28419]: Invalid user ftp from 167.99.71.156 Sep 19 18:05:41 reporting sshd[28419]: Failed password for invalid user ftp from 167.99.71.156 port 35976 ssh2 Sep 19 18:24:05 reporting sshd[31556]: reveeclipse mapping checking getaddrinfo for preciousreiko26.8.9-singapore-1 [167.99.71.156] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 19 18:24:05 reporting sshd[31556]: Invalid user snoopy from 167.99.71.156 Sep 19 18:24:05 reporting sshd[31556]: Failed password for invalid user snoopy from 167.99.71.156 port 41880 ssh2 Sep 19 18:28:47 reporting sshd[32427]: reveeclipse mapping checking getaddrinfo for preciousreiko26.8.9-singapore-1 [167.99.71.156] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 19 18:28:47 reporting sshd[32427]: Invalid user admin from 167.99.71.156 Sep 19 18:28:48 reporting........ ------------------------------- |
2019-09-20 04:00:54 |
| 137.74.47.22 | attack | Sep 19 15:31:43 xtremcommunity sshd\[256828\]: Invalid user httpfs from 137.74.47.22 port 37946 Sep 19 15:31:43 xtremcommunity sshd\[256828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.47.22 Sep 19 15:31:45 xtremcommunity sshd\[256828\]: Failed password for invalid user httpfs from 137.74.47.22 port 37946 ssh2 Sep 19 15:35:54 xtremcommunity sshd\[257021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.47.22 user=root Sep 19 15:35:56 xtremcommunity sshd\[257021\]: Failed password for root from 137.74.47.22 port 51792 ssh2 ... |
2019-09-20 03:38:20 |
| 201.49.82.125 | attackspam | firewall-block, port(s): 60001/tcp |
2019-09-20 03:32:06 |
| 182.61.162.54 | attackspam | 2019-09-19T15:26:54.1414041495-001 sshd\[54084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.162.54 2019-09-19T15:26:56.4399521495-001 sshd\[54084\]: Failed password for invalid user dougg from 182.61.162.54 port 38848 ssh2 2019-09-19T15:43:15.4096691495-001 sshd\[55419\]: Invalid user behrman from 182.61.162.54 port 53256 2019-09-19T15:43:15.4188161495-001 sshd\[55419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.162.54 2019-09-19T15:43:16.7238761495-001 sshd\[55419\]: Failed password for invalid user behrman from 182.61.162.54 port 53256 ssh2 2019-09-19T15:44:28.5598061495-001 sshd\[55467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.162.54 user=root ... |
2019-09-20 03:53:20 |
| 81.22.45.148 | attack | 09/19/2019-14:58:50.089008 81.22.45.148 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 85 |
2019-09-20 03:31:00 |
| 54.37.138.172 | attackspambots | Sep 19 17:39:28 dedicated sshd[19569]: Invalid user trendimsa1.0 from 54.37.138.172 port 45258 |
2019-09-20 03:29:02 |
| 157.44.106.169 | attackspam | Unauthorized connection attempt from IP address 157.44.106.169 on Port 445(SMB) |
2019-09-20 03:26:48 |
| 121.33.247.107 | attackbotsspam | Sep 19 15:35:29 web1 postfix/smtpd[11478]: warning: unknown[121.33.247.107]: SASL LOGIN authentication failed: authentication failure ... |
2019-09-20 03:55:58 |
| 79.137.72.121 | attack | Sep 19 09:47:09 lcprod sshd\[11831\]: Invalid user susana from 79.137.72.121 Sep 19 09:47:09 lcprod sshd\[11831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.ip-79-137-72.eu Sep 19 09:47:11 lcprod sshd\[11831\]: Failed password for invalid user susana from 79.137.72.121 port 44216 ssh2 Sep 19 09:51:04 lcprod sshd\[12183\]: Invalid user contable from 79.137.72.121 Sep 19 09:51:04 lcprod sshd\[12183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.ip-79-137-72.eu |
2019-09-20 03:59:48 |
| 58.47.177.161 | attackbotsspam | 2019-09-19T21:21:27.490647 sshd[8399]: Invalid user monitor from 58.47.177.161 port 38468 2019-09-19T21:21:27.505811 sshd[8399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.47.177.161 2019-09-19T21:21:27.490647 sshd[8399]: Invalid user monitor from 58.47.177.161 port 38468 2019-09-19T21:21:29.578460 sshd[8399]: Failed password for invalid user monitor from 58.47.177.161 port 38468 ssh2 2019-09-19T21:35:23.758469 sshd[8808]: Invalid user pulse-access from 58.47.177.161 port 51599 ... |
2019-09-20 04:04:29 |
| 192.42.116.15 | attack | Sep 19 08:09:00 eddieflores sshd\[1223\]: Invalid user aaron from 192.42.116.15 Sep 19 08:09:00 eddieflores sshd\[1223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=this-is-a-tor-exit-node-hviv115.hviv.nl Sep 19 08:09:02 eddieflores sshd\[1223\]: Failed password for invalid user aaron from 192.42.116.15 port 34850 ssh2 Sep 19 08:09:04 eddieflores sshd\[1223\]: Failed password for invalid user aaron from 192.42.116.15 port 34850 ssh2 Sep 19 08:09:07 eddieflores sshd\[1223\]: Failed password for invalid user aaron from 192.42.116.15 port 34850 ssh2 |
2019-09-20 03:30:27 |
| 190.115.1.49 | attack | Sep 19 22:36:01 www4 sshd\[6851\]: Invalid user appltst from 190.115.1.49 Sep 19 22:36:01 www4 sshd\[6851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.115.1.49 Sep 19 22:36:04 www4 sshd\[6851\]: Failed password for invalid user appltst from 190.115.1.49 port 50474 ssh2 ... |
2019-09-20 03:50:01 |