城市(city): unknown
省份(region): unknown
国家(country): United States of America
运营商(isp): DigitalOcean LLC
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): Data Center/Web Hosting/Transit
| 类型 | 评论内容 | 时间 |
|---|---|---|
| attack | $f2bV_matches |
2020-07-24 12:36:30 |
| attack | Jul 16 15:39:58 OPSO sshd\[20598\]: Invalid user guest from 134.209.102.196 port 33780 Jul 16 15:39:58 OPSO sshd\[20598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 Jul 16 15:40:00 OPSO sshd\[20598\]: Failed password for invalid user guest from 134.209.102.196 port 33780 ssh2 Jul 16 15:43:39 OPSO sshd\[21861\]: Invalid user csgo from 134.209.102.196 port 58374 Jul 16 15:43:39 OPSO sshd\[21861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 |
2020-07-17 05:08:37 |
| attackspam | Jul 14 15:14:20 jane sshd[32021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 Jul 14 15:14:22 jane sshd[32021]: Failed password for invalid user postgres from 134.209.102.196 port 59372 ssh2 ... |
2020-07-14 23:01:56 |
| attackbots | Invalid user tsbot from 134.209.102.196 port 43134 |
2020-07-12 05:37:45 |
| attackbotsspam | Jun 30 18:01:28 gw1 sshd[5984]: Failed password for root from 134.209.102.196 port 50066 ssh2 Jun 30 18:04:56 gw1 sshd[6148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 ... |
2020-07-01 03:35:50 |
| attackbots | Jun 19 05:58:12 vmd48417 sshd[27819]: Failed password for root from 134.209.102.196 port 55742 ssh2 |
2020-06-19 12:16:59 |
| attack | Jun 14 17:26:49 ws22vmsma01 sshd[56487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 Jun 14 17:26:51 ws22vmsma01 sshd[56487]: Failed password for invalid user uftp from 134.209.102.196 port 38892 ssh2 ... |
2020-06-15 04:29:12 |
| attackspam | Jun 14 10:36:18 gestao sshd[10391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 Jun 14 10:36:20 gestao sshd[10391]: Failed password for invalid user stephan from 134.209.102.196 port 60794 ssh2 Jun 14 10:40:04 gestao sshd[10574]: Failed password for root from 134.209.102.196 port 34020 ssh2 ... |
2020-06-14 17:54:52 |
| attackbotsspam | Jun 12 18:58:10 kapalua sshd\[520\]: Invalid user usuario from 134.209.102.196 Jun 12 18:58:10 kapalua sshd\[520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 Jun 12 18:58:12 kapalua sshd\[520\]: Failed password for invalid user usuario from 134.209.102.196 port 49552 ssh2 Jun 12 19:02:14 kapalua sshd\[855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 user=root Jun 12 19:02:17 kapalua sshd\[855\]: Failed password for root from 134.209.102.196 port 52176 ssh2 |
2020-06-13 18:37:50 |
| attackbotsspam | Jun 7 14:03:29 serwer sshd\[19589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 user=root Jun 7 14:03:31 serwer sshd\[19589\]: Failed password for root from 134.209.102.196 port 47380 ssh2 Jun 7 14:07:19 serwer sshd\[20029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 user=root ... |
2020-06-07 22:21:47 |
| attackspambots | SSH Invalid Login |
2020-05-23 06:42:56 |
| attack | Automatic report BANNED IP |
2020-05-21 05:22:36 |
| attackspambots | May 13 20:34:35 hosting sshd[6374]: Invalid user cui from 134.209.102.196 port 34110 ... |
2020-05-14 01:42:15 |
| attack | 2020-05-11T18:50:35.6063081495-001 sshd[54839]: Invalid user auditoria from 134.209.102.196 port 49794 2020-05-11T18:50:37.5496861495-001 sshd[54839]: Failed password for invalid user auditoria from 134.209.102.196 port 49794 ssh2 2020-05-11T18:54:34.1116691495-001 sshd[54972]: Invalid user alison from 134.209.102.196 port 57724 2020-05-11T18:54:34.1179581495-001 sshd[54972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 2020-05-11T18:54:34.1116691495-001 sshd[54972]: Invalid user alison from 134.209.102.196 port 57724 2020-05-11T18:54:35.8630791495-001 sshd[54972]: Failed password for invalid user alison from 134.209.102.196 port 57724 ssh2 ... |
2020-05-12 07:37:47 |
| attack | May 10 18:35:17 l02a sshd[2160]: Invalid user serveur6 from 134.209.102.196 May 10 18:35:17 l02a sshd[2160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 May 10 18:35:17 l02a sshd[2160]: Invalid user serveur6 from 134.209.102.196 May 10 18:35:19 l02a sshd[2160]: Failed password for invalid user serveur6 from 134.209.102.196 port 52486 ssh2 |
2020-05-11 01:55:32 |
| attackbots | 'Fail2Ban' |
2020-04-28 04:53:06 |
| attack | 2020-04-18T05:36:49.488885abusebot-7.cloudsearch.cf sshd[24136]: Invalid user admin from 134.209.102.196 port 47506 2020-04-18T05:36:49.496083abusebot-7.cloudsearch.cf sshd[24136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 2020-04-18T05:36:49.488885abusebot-7.cloudsearch.cf sshd[24136]: Invalid user admin from 134.209.102.196 port 47506 2020-04-18T05:36:51.056324abusebot-7.cloudsearch.cf sshd[24136]: Failed password for invalid user admin from 134.209.102.196 port 47506 ssh2 2020-04-18T05:40:43.072032abusebot-7.cloudsearch.cf sshd[24438]: Invalid user testftp from 134.209.102.196 port 54458 2020-04-18T05:40:43.080399abusebot-7.cloudsearch.cf sshd[24438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 2020-04-18T05:40:43.072032abusebot-7.cloudsearch.cf sshd[24438]: Invalid user testftp from 134.209.102.196 port 54458 2020-04-18T05:40:44.765493abusebot-7.cloudsearch.cf s ... |
2020-04-18 16:11:53 |
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 134.209.102.122 | botsattackproxynormal | A |
2022-05-21 11:19:18 |
| 134.209.102.130 | attackbots | TCP port : 28022 |
2020-08-05 18:36:53 |
| 134.209.102.130 | attackbotsspam | Aug 3 14:20:37 debian-2gb-nbg1-2 kernel: \[18715708.698407\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=134.209.102.130 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x40 TTL=242 ID=14318 PROTO=TCP SPT=57050 DPT=7203 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-08-04 02:55:14 |
| 134.209.102.130 | attackspam | Hits on port : 6000 30022 |
2020-08-02 17:09:25 |
| 134.209.102.93 | attackspam | Invalid user agx from 134.209.102.93 port 54402 |
2020-05-23 18:59:38 |
| 134.209.102.93 | attackspambots | May 14 19:04:09 km20725 sshd[572]: Invalid user contact from 134.209.102.93 port 53162 May 14 19:04:09 km20725 sshd[572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.93 May 14 19:04:11 km20725 sshd[572]: Failed password for invalid user contact from 134.209.102.93 port 53162 ssh2 May 14 19:04:13 km20725 sshd[572]: Received disconnect from 134.209.102.93 port 53162:11: Bye Bye [preauth] May 14 19:04:13 km20725 sshd[572]: Disconnected from invalid user contact 134.209.102.93 port 53162 [preauth] May 14 19:05:30 km20725 sshd[656]: Invalid user kristen from 134.209.102.93 port 40500 May 14 19:05:30 km20725 sshd[656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.93 May 14 19:05:32 km20725 sshd[656]: Failed password for invalid user kristen from 134.209.102.93 port 40500 ssh2 May 14 19:05:35 km20725 sshd[656]: Received disconnect from 134.209.102.93 port 40500:11: ........ ------------------------------- |
2020-05-16 00:13:11 |
| 134.209.102.95 | attackbotsspam | <6 unauthorized SSH connections |
2020-03-24 15:42:10 |
| 134.209.102.95 | attackspam | SSH brute-force: detected 8 distinct usernames within a 24-hour window. |
2020-03-21 07:08:48 |
| 134.209.102.95 | attackspam | Mar 19 19:34:48 pornomens sshd\[21724\]: Invalid user gmod from 134.209.102.95 port 46114 Mar 19 19:34:48 pornomens sshd\[21724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.95 Mar 19 19:34:50 pornomens sshd\[21724\]: Failed password for invalid user gmod from 134.209.102.95 port 46114 ssh2 ... |
2020-03-20 04:28:49 |
| 134.209.102.95 | attackbotsspam | Mar 9 08:54:51 vpn01 sshd[31170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.95 Mar 9 08:54:54 vpn01 sshd[31170]: Failed password for invalid user teamspeak3 from 134.209.102.95 port 43698 ssh2 ... |
2020-03-09 16:55:19 |
| 134.209.102.95 | attack | Mar 7 00:59:55 plusreed sshd[10203]: Invalid user hduser from 134.209.102.95 ... |
2020-03-07 14:10:27 |
| 134.209.102.95 | attackspambots | Mar 1 00:18:40 serwer sshd\[29190\]: Invalid user tanghao from 134.209.102.95 port 59082 Mar 1 00:18:40 serwer sshd\[29190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.95 Mar 1 00:18:42 serwer sshd\[29190\]: Failed password for invalid user tanghao from 134.209.102.95 port 59082 ssh2 ... |
2020-03-01 08:47:35 |
| 134.209.102.95 | attackbotsspam | Feb 19 20:26:03 ws22vmsma01 sshd[186674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.95 Feb 19 20:26:05 ws22vmsma01 sshd[186674]: Failed password for invalid user bruno from 134.209.102.95 port 57034 ssh2 ... |
2020-02-20 09:33:30 |
| 134.209.102.147 | attackspam | 134.209.102.147 - - [08/Jan/2020:14:06:44 +0100] "POST /wp-login.php HTTP/1.1" 200 3121 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.209.102.147 - - [08/Jan/2020:14:06:45 +0100] "POST /wp-login.php HTTP/1.1" 200 3100 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-01-08 21:33:46 |
| 134.209.102.147 | attack | 134.209.102.147 - - \[02/Dec/2019:06:38:33 +0100\] "POST /wp-login.php HTTP/1.0" 200 6655 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 134.209.102.147 - - \[02/Dec/2019:06:38:37 +0100\] "POST /wp-login.php HTTP/1.0" 200 6493 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 134.209.102.147 - - \[02/Dec/2019:06:38:40 +0100\] "POST /wp-login.php HTTP/1.0" 200 6492 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-12-02 14:20:17 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.209.102.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57128
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.209.102.196. IN A
;; AUTHORITY SECTION:
. 327 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020041001 1800 900 604800 86400
;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 04:10:55 CST 2020
;; MSG SIZE rcvd: 119
Host 196.102.209.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 196.102.209.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 95.189.104.78 | attackspam | Unauthorised access (Dec 16) SRC=95.189.104.78 LEN=52 PREC=0x20 TTL=114 ID=17216 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-16 06:59:19 |
| 138.68.93.14 | attackspam | Dec 15 23:40:59 MainVPS sshd[1056]: Invalid user pi from 138.68.93.14 port 34420 Dec 15 23:40:59 MainVPS sshd[1056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14 Dec 15 23:40:59 MainVPS sshd[1056]: Invalid user pi from 138.68.93.14 port 34420 Dec 15 23:41:01 MainVPS sshd[1056]: Failed password for invalid user pi from 138.68.93.14 port 34420 ssh2 Dec 15 23:49:26 MainVPS sshd[16998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14 user=root Dec 15 23:49:28 MainVPS sshd[16998]: Failed password for root from 138.68.93.14 port 41754 ssh2 ... |
2019-12-16 07:25:55 |
| 122.224.126.58 | attackbots | 1433/tcp 1433/tcp 1433/tcp... [2019-10-17/12-15]4pkt,1pt.(tcp) |
2019-12-16 07:33:24 |
| 190.221.81.6 | attackspam | Dec 15 22:42:28 game-panel sshd[19217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.81.6 Dec 15 22:42:30 game-panel sshd[19217]: Failed password for invalid user lillian123456 from 190.221.81.6 port 51036 ssh2 Dec 15 22:49:20 game-panel sshd[19429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.81.6 |
2019-12-16 07:38:58 |
| 69.42.89.216 | attack | 445/tcp 1433/tcp... [2019-11-08/12-15]4pkt,2pt.(tcp) |
2019-12-16 07:38:06 |
| 167.71.179.114 | attack | 2019-12-15T22:44:48.144938shield sshd\[9252\]: Invalid user admin from 167.71.179.114 port 36152 2019-12-15T22:44:48.150263shield sshd\[9252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.179.114 2019-12-15T22:44:50.599225shield sshd\[9252\]: Failed password for invalid user admin from 167.71.179.114 port 36152 ssh2 2019-12-15T22:49:52.357841shield sshd\[10886\]: Invalid user test from 167.71.179.114 port 44714 2019-12-15T22:49:52.363583shield sshd\[10886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.179.114 |
2019-12-16 06:57:05 |
| 49.233.153.194 | attackspam | Dec 16 00:03:26 vps647732 sshd[21527]: Failed password for root from 49.233.153.194 port 52042 ssh2 ... |
2019-12-16 07:16:53 |
| 106.12.211.247 | attackspam | Dec 15 12:42:47 auw2 sshd\[3426\]: Invalid user sangiovanni from 106.12.211.247 Dec 15 12:42:47 auw2 sshd\[3426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.211.247 Dec 15 12:42:49 auw2 sshd\[3426\]: Failed password for invalid user sangiovanni from 106.12.211.247 port 57986 ssh2 Dec 15 12:49:45 auw2 sshd\[4119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.211.247 user=root Dec 15 12:49:47 auw2 sshd\[4119\]: Failed password for root from 106.12.211.247 port 59362 ssh2 |
2019-12-16 07:01:49 |
| 78.38.80.245 | attackbotsspam | 445/tcp 445/tcp 445/tcp... [2019-10-24/12-15]9pkt,1pt.(tcp) |
2019-12-16 07:22:58 |
| 129.211.17.22 | attack | Dec 16 05:49:42 webhost01 sshd[5054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.17.22 Dec 16 05:49:44 webhost01 sshd[5054]: Failed password for invalid user guest from 129.211.17.22 port 38746 ssh2 ... |
2019-12-16 07:02:36 |
| 213.157.48.133 | attackspambots | Dec 15 13:01:29 wbs sshd\[25519\]: Invalid user icclaw from 213.157.48.133 Dec 15 13:01:29 wbs sshd\[25519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.157.48.133 Dec 15 13:01:31 wbs sshd\[25519\]: Failed password for invalid user icclaw from 213.157.48.133 port 35476 ssh2 Dec 15 13:07:31 wbs sshd\[26178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.157.48.133 user=root Dec 15 13:07:33 wbs sshd\[26178\]: Failed password for root from 213.157.48.133 port 43410 ssh2 |
2019-12-16 07:13:38 |
| 162.243.237.90 | attackbots | Brute-force attempt banned |
2019-12-16 06:57:24 |
| 49.231.201.242 | attackbots | Dec 16 01:08:00 sauna sshd[154380]: Failed password for root from 49.231.201.242 port 47122 ssh2 ... |
2019-12-16 07:14:36 |
| 104.248.227.130 | attack | Dec 15 23:49:26 mail sshd\[4231\]: Invalid user allee from 104.248.227.130 Dec 15 23:49:26 mail sshd\[4231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.227.130 Dec 15 23:49:27 mail sshd\[4231\]: Failed password for invalid user allee from 104.248.227.130 port 38324 ssh2 ... |
2019-12-16 07:20:58 |
| 86.87.215.219 | attackbotsspam | 23/tcp 23/tcp [2019-11-30/12-15]2pkt |
2019-12-16 07:04:58 |