城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.34.102.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;135.34.102.253. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 04:48:33 CST 2025
;; MSG SIZE rcvd: 107
253.102.34.135.in-addr.arpa domain name pointer nothing.attdns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
253.102.34.135.in-addr.arpa name = nothing.attdns.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.88.112.76 | attackspambots | Dec 20 21:51:26 webhost01 sshd[8873]: Failed password for root from 49.88.112.76 port 61568 ssh2 ... |
2019-12-20 23:15:02 |
| 92.222.92.128 | attackbotsspam | Dec 20 04:49:57 tdfoods sshd\[9108\]: Invalid user nazem from 92.222.92.128 Dec 20 04:49:57 tdfoods sshd\[9108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-92-222-92.eu Dec 20 04:49:59 tdfoods sshd\[9108\]: Failed password for invalid user nazem from 92.222.92.128 port 45468 ssh2 Dec 20 04:55:19 tdfoods sshd\[9611\]: Invalid user Juha from 92.222.92.128 Dec 20 04:55:19 tdfoods sshd\[9611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.ip-92-222-92.eu |
2019-12-20 23:05:57 |
| 118.126.112.72 | attack | Dec 20 15:36:05 Ubuntu-1404-trusty-64-minimal sshd\[32272\]: Invalid user guest from 118.126.112.72 Dec 20 15:36:05 Ubuntu-1404-trusty-64-minimal sshd\[32272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.112.72 Dec 20 15:36:07 Ubuntu-1404-trusty-64-minimal sshd\[32272\]: Failed password for invalid user guest from 118.126.112.72 port 56928 ssh2 Dec 20 16:00:16 Ubuntu-1404-trusty-64-minimal sshd\[16255\]: Invalid user tq from 118.126.112.72 Dec 20 16:00:16 Ubuntu-1404-trusty-64-minimal sshd\[16255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.112.72 |
2019-12-20 23:24:34 |
| 165.22.144.147 | attackbots | 2019-12-20T15:47:05.515122centos sshd\[14271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.147 user=root 2019-12-20T15:47:07.774856centos sshd\[14271\]: Failed password for root from 165.22.144.147 port 49656 ssh2 2019-12-20T15:55:20.236551centos sshd\[14478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.144.147 user=root |
2019-12-20 23:04:58 |
| 190.64.68.178 | attack | Dec 20 19:55:24 gw1 sshd[12079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178 Dec 20 19:55:27 gw1 sshd[12079]: Failed password for invalid user nfs from 190.64.68.178 port 23617 ssh2 ... |
2019-12-20 23:00:16 |
| 14.192.242.117 | attackbotsspam | Automatic report - Port Scan Attack |
2019-12-20 23:41:54 |
| 49.234.18.158 | attack | Dec 20 12:43:42 vtv3 sshd[29824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 Dec 20 12:43:43 vtv3 sshd[29824]: Failed password for invalid user devserver from 49.234.18.158 port 33574 ssh2 Dec 20 12:54:17 vtv3 sshd[3058]: Failed password for root from 49.234.18.158 port 47914 ssh2 Dec 20 12:59:45 vtv3 sshd[5606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 Dec 20 12:59:48 vtv3 sshd[5606]: Failed password for invalid user akino from 49.234.18.158 port 40894 ssh2 Dec 20 13:10:42 vtv3 sshd[10995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 Dec 20 13:10:44 vtv3 sshd[10995]: Failed password for invalid user web from 49.234.18.158 port 55228 ssh2 Dec 20 13:16:56 vtv3 sshd[13715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 Dec 20 13:28:41 vtv3 sshd[19043]: pam_unix(sshd:auth): auth |
2019-12-20 23:22:05 |
| 206.189.93.108 | attack | Dec 20 17:59:02 server sshd\[6796\]: Invalid user y from 206.189.93.108 Dec 20 17:59:02 server sshd\[6796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.93.108 Dec 20 17:59:04 server sshd\[6796\]: Failed password for invalid user y from 206.189.93.108 port 41092 ssh2 Dec 20 18:07:56 server sshd\[9123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.93.108 user=root Dec 20 18:07:58 server sshd\[9123\]: Failed password for root from 206.189.93.108 port 58038 ssh2 ... |
2019-12-20 23:09:46 |
| 203.137.182.54 | attackbotsspam | Lines containing failures of 203.137.182.54 Dec 20 06:47:37 metroid sshd[4406]: Did not receive identification string from 203.137.182.54 port 59598 Dec 20 06:50:03 metroid sshd[4407]: Did not receive identification string from 203.137.182.54 port 35482 Dec 20 06:50:14 metroid sshd[4408]: Received disconnect from 203.137.182.54 port 41398:11: Normal Shutdown, Thank you for playing [preauth] Dec 20 06:50:14 metroid sshd[4408]: Disconnected from authenticating user bin 203.137.182.54 port 41398 [preauth] Dec 20 06:52:52 metroid sshd[4418]: Invalid user jenkins from 203.137.182.54 port 53626 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=203.137.182.54 |
2019-12-20 23:10:00 |
| 202.137.144.228 | attackspam | TCP Port Scanning |
2019-12-20 22:57:40 |
| 123.18.206.15 | attack | Dec 20 05:22:43 web1 sshd\[25221\]: Invalid user ddavid from 123.18.206.15 Dec 20 05:22:43 web1 sshd\[25221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.18.206.15 Dec 20 05:22:45 web1 sshd\[25221\]: Failed password for invalid user ddavid from 123.18.206.15 port 38422 ssh2 Dec 20 05:28:59 web1 sshd\[25836\]: Invalid user thumbor from 123.18.206.15 Dec 20 05:28:59 web1 sshd\[25836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.18.206.15 |
2019-12-20 23:30:29 |
| 107.170.113.190 | attackspam | 2019-12-20T15:47:24.002669scmdmz1 sshd[4218]: Invalid user prasolov from 107.170.113.190 port 42730 2019-12-20T15:47:24.005269scmdmz1 sshd[4218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.113.190 2019-12-20T15:47:24.002669scmdmz1 sshd[4218]: Invalid user prasolov from 107.170.113.190 port 42730 2019-12-20T15:47:25.872949scmdmz1 sshd[4218]: Failed password for invalid user prasolov from 107.170.113.190 port 42730 ssh2 2019-12-20T15:55:19.044665scmdmz1 sshd[4918]: Invalid user marjorie from 107.170.113.190 port 46891 ... |
2019-12-20 23:07:07 |
| 139.162.121.251 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2019-12-20 23:00:33 |
| 78.138.165.170 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:55:13. |
2019-12-20 23:16:20 |
| 5.239.105.179 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:55:11. |
2019-12-20 23:22:26 |