城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.57.55.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49754
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.57.55.189. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 07:58:20 CST 2025
;; MSG SIZE rcvd: 106
189.55.57.136.in-addr.arpa domain name pointer 136-57-55-189.googlefiber.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
189.55.57.136.in-addr.arpa name = 136-57-55-189.googlefiber.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 134.209.254.186 | attackbots | 134.209.254.186 - - [22/Dec/2019:19:49:47 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6239 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 134.209.254.186 - - [22/Dec/2019:19:49:51 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6299 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-12-23 06:47:35 |
| 125.22.98.171 | attackspam | Dec 22 13:04:52 eddieflores sshd\[23482\]: Invalid user sharra from 125.22.98.171 Dec 22 13:04:52 eddieflores sshd\[23482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171 Dec 22 13:04:54 eddieflores sshd\[23482\]: Failed password for invalid user sharra from 125.22.98.171 port 49844 ssh2 Dec 22 13:10:55 eddieflores sshd\[24154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171 user=root Dec 22 13:10:57 eddieflores sshd\[24154\]: Failed password for root from 125.22.98.171 port 55610 ssh2 |
2019-12-23 07:18:11 |
| 45.248.71.28 | attackbots | 2019-12-22T23:03:33.704624shield sshd\[12395\]: Invalid user sandy from 45.248.71.28 port 58402 2019-12-22T23:03:33.711537shield sshd\[12395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.71.28 2019-12-22T23:03:35.775224shield sshd\[12395\]: Failed password for invalid user sandy from 45.248.71.28 port 58402 ssh2 2019-12-22T23:09:20.734299shield sshd\[15356\]: Invalid user pcap from 45.248.71.28 port 34902 2019-12-22T23:09:20.739673shield sshd\[15356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.71.28 |
2019-12-23 07:24:17 |
| 183.203.96.105 | attack | Dec 22 23:53:06 vpn01 sshd[1331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.203.96.105 Dec 22 23:53:07 vpn01 sshd[1331]: Failed password for invalid user hung from 183.203.96.105 port 41460 ssh2 ... |
2019-12-23 06:57:12 |
| 142.93.109.129 | attack | Dec 22 23:51:29 lnxweb61 sshd[17480]: Failed password for mail from 142.93.109.129 port 39684 ssh2 Dec 22 23:59:02 lnxweb61 sshd[23375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.109.129 Dec 22 23:59:04 lnxweb61 sshd[23375]: Failed password for invalid user ssh from 142.93.109.129 port 46878 ssh2 |
2019-12-23 07:12:28 |
| 77.247.109.82 | attackspam | Dec 22 23:58:44 debian-2gb-nbg1-2 kernel: \[708273.053326\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.109.82 DST=195.201.40.59 LEN=438 TOS=0x00 PREC=0x00 TTL=54 ID=0 DF PROTO=UDP SPT=5105 DPT=5060 LEN=418 |
2019-12-23 07:25:34 |
| 164.132.53.185 | attack | Dec 22 23:48:29 ns3042688 sshd\[14765\]: Invalid user ttl from 164.132.53.185 Dec 22 23:48:31 ns3042688 sshd\[14765\]: Failed password for invalid user ttl from 164.132.53.185 port 48246 ssh2 Dec 22 23:53:03 ns3042688 sshd\[16830\]: Invalid user teamspeak from 164.132.53.185 Dec 22 23:53:05 ns3042688 sshd\[16830\]: Failed password for invalid user teamspeak from 164.132.53.185 port 52350 ssh2 Dec 22 23:57:37 ns3042688 sshd\[18926\]: Invalid user transfer from 164.132.53.185 ... |
2019-12-23 07:15:50 |
| 106.245.255.19 | attack | Dec 22 23:47:03 markkoudstaal sshd[30531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.255.19 Dec 22 23:47:05 markkoudstaal sshd[30531]: Failed password for invalid user nfs from 106.245.255.19 port 37071 ssh2 Dec 22 23:53:08 markkoudstaal sshd[31017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.255.19 |
2019-12-23 06:58:39 |
| 222.186.180.147 | attackspambots | Fail2Ban Ban Triggered |
2019-12-23 07:17:21 |
| 163.172.223.186 | attackspam | Dec 22 23:06:40 web8 sshd\[26651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.223.186 user=root Dec 22 23:06:42 web8 sshd\[26651\]: Failed password for root from 163.172.223.186 port 58404 ssh2 Dec 22 23:12:26 web8 sshd\[29724\]: Invalid user ching from 163.172.223.186 Dec 22 23:12:26 web8 sshd\[29724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.223.186 Dec 22 23:12:28 web8 sshd\[29724\]: Failed password for invalid user ching from 163.172.223.186 port 35938 ssh2 |
2019-12-23 07:21:04 |
| 106.13.45.131 | attackspam | Dec 22 12:47:14 auw2 sshd\[13374\]: Invalid user lymer from 106.13.45.131 Dec 22 12:47:14 auw2 sshd\[13374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.131 Dec 22 12:47:16 auw2 sshd\[13374\]: Failed password for invalid user lymer from 106.13.45.131 port 44268 ssh2 Dec 22 12:52:44 auw2 sshd\[13900\]: Invalid user abcd@321 from 106.13.45.131 Dec 22 12:52:44 auw2 sshd\[13900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.131 |
2019-12-23 07:16:15 |
| 218.92.0.155 | attack | 2019-12-22T23:06:53.155019abusebot-8.cloudsearch.cf sshd[3145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.155 user=root 2019-12-22T23:06:54.340667abusebot-8.cloudsearch.cf sshd[3145]: Failed password for root from 218.92.0.155 port 6697 ssh2 2019-12-22T23:06:57.738129abusebot-8.cloudsearch.cf sshd[3145]: Failed password for root from 218.92.0.155 port 6697 ssh2 2019-12-22T23:06:53.155019abusebot-8.cloudsearch.cf sshd[3145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.155 user=root 2019-12-22T23:06:54.340667abusebot-8.cloudsearch.cf sshd[3145]: Failed password for root from 218.92.0.155 port 6697 ssh2 2019-12-22T23:06:57.738129abusebot-8.cloudsearch.cf sshd[3145]: Failed password for root from 218.92.0.155 port 6697 ssh2 2019-12-22T23:06:53.155019abusebot-8.cloudsearch.cf sshd[3145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0 ... |
2019-12-23 07:14:35 |
| 75.72.137.227 | attack | Lines containing failures of 75.72.137.227 Dec 20 12:26:18 shared09 sshd[5012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.72.137.227 user=r.r Dec 20 12:26:20 shared09 sshd[5012]: Failed password for r.r from 75.72.137.227 port 36312 ssh2 Dec 20 12:26:20 shared09 sshd[5012]: Received disconnect from 75.72.137.227 port 36312:11: Bye Bye [preauth] Dec 20 12:26:20 shared09 sshd[5012]: Disconnected from authenticating user r.r 75.72.137.227 port 36312 [preauth] Dec 20 12:37:42 shared09 sshd[8250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.72.137.227 user=r.r Dec 20 12:37:44 shared09 sshd[8250]: Failed password for r.r from 75.72.137.227 port 57294 ssh2 Dec 20 12:37:44 shared09 sshd[8250]: Received disconnect from 75.72.137.227 port 57294:11: Bye Bye [preauth] Dec 20 12:37:44 shared09 sshd[8250]: Disconnected from authenticating user r.r 75.72.137.227 port 57294 [preauth] Dec 20........ ------------------------------ |
2019-12-23 06:50:23 |
| 218.92.0.164 | attack | Dec 22 18:32:42 server sshd\[14839\]: Failed password for root from 218.92.0.164 port 43992 ssh2 Dec 23 02:03:39 server sshd\[5227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.164 user=root Dec 23 02:03:41 server sshd\[5227\]: Failed password for root from 218.92.0.164 port 20925 ssh2 Dec 23 02:03:42 server sshd\[5238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.164 user=root Dec 23 02:03:44 server sshd\[5227\]: Failed password for root from 218.92.0.164 port 20925 ssh2 ... |
2019-12-23 07:05:46 |
| 43.240.38.28 | attackbots | SSH Brute Force, server-1 sshd[11845]: Failed password for root from 43.240.38.28 port 58532 ssh2 |
2019-12-23 07:08:59 |