城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.69.106.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.69.106.143. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 10:10:48 CST 2025
;; MSG SIZE rcvd: 107
Host 143.106.69.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 143.106.69.134.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.131.46.166 | attack | Invalid user willetta from 104.131.46.166 port 56974 |
2020-03-31 14:19:28 |
| 194.26.29.106 | attackspambots | 03/31/2020-02:43:02.229595 194.26.29.106 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-31 14:43:07 |
| 162.243.133.39 | attackspambots | " " |
2020-03-31 14:28:02 |
| 212.94.8.41 | attackspam | Mar 31 05:10:00 icinga sshd[11099]: Failed password for root from 212.94.8.41 port 42344 ssh2 Mar 31 05:38:53 icinga sshd[56792]: Failed password for root from 212.94.8.41 port 42148 ssh2 ... |
2020-03-31 14:13:36 |
| 212.129.17.32 | attackspambots | " " |
2020-03-31 15:12:01 |
| 51.178.53.238 | attackbots | Lines containing failures of 51.178.53.238 Mar 31 00:04:09 shared02 sshd[5558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.53.238 user=r.r Mar 31 00:04:11 shared02 sshd[5558]: Failed password for r.r from 51.178.53.238 port 34846 ssh2 Mar 31 00:04:11 shared02 sshd[5558]: Received disconnect from 51.178.53.238 port 34846:11: Bye Bye [preauth] Mar 31 00:04:11 shared02 sshd[5558]: Disconnected from authenticating user r.r 51.178.53.238 port 34846 [preauth] Mar 31 00:15:32 shared02 sshd[13430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.53.238 user=r.r Mar 31 00:15:34 shared02 sshd[13430]: Failed password for r.r from 51.178.53.238 port 35126 ssh2 Mar 31 00:15:34 shared02 sshd[13430]: Received disconnect from 51.178.53.238 port 35126:11: Bye Bye [preauth] Mar 31 00:15:34 shared02 sshd[13430]: Disconnected from authenticating user r.r 51.178.53.238 port 35126 [preauth] Ma........ ------------------------------ |
2020-03-31 14:21:21 |
| 2601:589:4480:a5a0:84b2:5a83:9c77:56fe | attackspambots | IP address logged by my Netflix account after the individual hacked into and locked me out of my account. Individual also changed my account settings to the most expensive plan, which allows multiple people (profiles) to watch, and several profiles were added. The name on my account was changed to "Juan". I contacted Netflix to have my account restored, so I was able to see the various IP addresses used. I will report all of them as well. |
2020-03-31 14:21:55 |
| 185.175.93.11 | attack | ET DROP Dshield Block Listed Source group 1 - port: 29012 proto: TCP cat: Misc Attack |
2020-03-31 14:45:20 |
| 194.36.191.134 | attackbots | Unauthorized connection attempt detected from IP address 194.36.191.134 to port 6379 |
2020-03-31 14:31:16 |
| 68.201.77.134 | spambotsattackproxynormal | The address |
2020-03-31 14:22:22 |
| 195.231.7.193 | attackbots | Unauthorized connection attempt detected from IP address 195.231.7.193 to port 81 [T] |
2020-03-31 14:38:29 |
| 217.125.110.139 | attackbots | Invalid user kpy from 217.125.110.139 port 54950 |
2020-03-31 14:27:12 |
| 181.169.155.174 | attack | Mar 31 04:30:23 web8 sshd\[14450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.169.155.174 user=root Mar 31 04:30:25 web8 sshd\[14450\]: Failed password for root from 181.169.155.174 port 51110 ssh2 Mar 31 04:40:14 web8 sshd\[19897\]: Invalid user dinghaobo from 181.169.155.174 Mar 31 04:40:14 web8 sshd\[19897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.169.155.174 Mar 31 04:40:16 web8 sshd\[19897\]: Failed password for invalid user dinghaobo from 181.169.155.174 port 37758 ssh2 |
2020-03-31 14:23:15 |
| 45.227.255.119 | attackspam | Mar 31 09:10:33 server2 sshd\[13310\]: Invalid user ftpuser from 45.227.255.119 Mar 31 09:10:34 server2 sshd\[13312\]: Invalid user admin from 45.227.255.119 Mar 31 09:10:35 server2 sshd\[13316\]: User ftp from 45.227.255.119 not allowed because not listed in AllowUsers Mar 31 09:10:37 server2 sshd\[13318\]: Invalid user service from 45.227.255.119 Mar 31 09:10:38 server2 sshd\[13320\]: Invalid user RPM from 45.227.255.119 Mar 31 09:10:39 server2 sshd\[13322\]: Invalid user ftpuser from 45.227.255.119 |
2020-03-31 14:24:13 |
| 87.251.74.18 | attackbots | Mar 31 08:23:17 debian-2gb-nbg1-2 kernel: \[7894851.284006\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.18 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=36526 PROTO=TCP SPT=49794 DPT=9958 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-31 14:36:12 |