城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.108.173.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.108.173.74. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:03:42 CST 2025
;; MSG SIZE rcvd: 107
b'Host 74.173.108.138.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 74.173.108.138.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
125.213.150.6 | attackspambots | 2019-12-15T14:40:06.993300abusebot-6.cloudsearch.cf sshd\[21567\]: Invalid user trib from 125.213.150.6 port 34202 2019-12-15T14:40:06.999282abusebot-6.cloudsearch.cf sshd\[21567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.150.6 2019-12-15T14:40:08.659559abusebot-6.cloudsearch.cf sshd\[21567\]: Failed password for invalid user trib from 125.213.150.6 port 34202 ssh2 2019-12-15T14:46:42.714731abusebot-6.cloudsearch.cf sshd\[21602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.213.150.6 user=root |
2019-12-16 05:27:13 |
49.146.42.67 | attack | Unauthorized connection attempt from IP address 49.146.42.67 on Port 445(SMB) |
2019-12-16 05:24:37 |
198.108.67.90 | attack | firewall-block, port(s): 3069/tcp |
2019-12-16 04:53:33 |
110.164.205.133 | attackbotsspam | Invalid user ftpuser from 110.164.205.133 port 57145 |
2019-12-16 05:32:26 |
194.31.42.254 | attackbotsspam | Unauthorized connection attempt detected from IP address 194.31.42.254 to port 445 |
2019-12-16 05:11:38 |
182.73.123.118 | attackspam | Dec 15 21:43:56 mail sshd[7549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118 Dec 15 21:43:58 mail sshd[7549]: Failed password for invalid user exadmin from 182.73.123.118 port 20870 ssh2 Dec 15 21:50:31 mail sshd[10526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118 |
2019-12-16 05:01:34 |
200.54.69.194 | attackbotsspam | 1576425545 - 12/15/2019 16:59:05 Host: 200.54.69.194/200.54.69.194 Port: 445 TCP Blocked |
2019-12-16 05:22:28 |
103.22.250.234 | attackbotsspam | Unauthorized connection attempt from IP address 103.22.250.234 on Port 445(SMB) |
2019-12-16 05:28:01 |
20.188.4.3 | attackbotsspam | Dec 15 21:30:48 ns381471 sshd[31084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.188.4.3 Dec 15 21:30:50 ns381471 sshd[31084]: Failed password for invalid user custodia from 20.188.4.3 port 38142 ssh2 |
2019-12-16 05:11:07 |
159.89.139.228 | attack | Dec 15 20:58:27 amit sshd\[9819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.139.228 user=root Dec 15 20:58:29 amit sshd\[9819\]: Failed password for root from 159.89.139.228 port 51612 ssh2 Dec 15 21:05:20 amit sshd\[31019\]: Invalid user kb from 159.89.139.228 Dec 15 21:05:20 amit sshd\[31019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.139.228 ... |
2019-12-16 05:00:39 |
78.110.155.251 | attackspambots | Unauthorized connection attempt from IP address 78.110.155.251 on Port 445(SMB) |
2019-12-16 05:29:50 |
144.217.214.100 | attackspambots | Dec 15 15:38:05 game-panel sshd[32293]: Failed password for root from 144.217.214.100 port 45876 ssh2 Dec 15 15:44:31 game-panel sshd[32632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.214.100 Dec 15 15:44:33 game-panel sshd[32632]: Failed password for invalid user starratt from 144.217.214.100 port 55244 ssh2 |
2019-12-16 05:19:30 |
37.187.248.39 | attack | Dec 15 23:49:01 hosting sshd[21744]: Invalid user kunkun from 37.187.248.39 port 39472 Dec 15 23:49:01 hosting sshd[21744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns330057.ip-37-187-248.eu Dec 15 23:49:01 hosting sshd[21744]: Invalid user kunkun from 37.187.248.39 port 39472 Dec 15 23:49:03 hosting sshd[21744]: Failed password for invalid user kunkun from 37.187.248.39 port 39472 ssh2 Dec 15 23:56:38 hosting sshd[22507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns330057.ip-37-187-248.eu user=root Dec 15 23:56:40 hosting sshd[22507]: Failed password for root from 37.187.248.39 port 54868 ssh2 ... |
2019-12-16 05:30:27 |
101.230.236.177 | attack | 2019-12-15T20:56:35.728225shield sshd\[4819\]: Invalid user matos from 101.230.236.177 port 37212 2019-12-15T20:56:35.731786shield sshd\[4819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.230.236.177 2019-12-15T20:56:38.134787shield sshd\[4819\]: Failed password for invalid user matos from 101.230.236.177 port 37212 ssh2 2019-12-15T21:02:21.056130shield sshd\[6815\]: Invalid user mikutel from 101.230.236.177 port 43696 2019-12-15T21:02:21.060146shield sshd\[6815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.230.236.177 |
2019-12-16 05:20:33 |
116.97.222.145 | attackspambots | Unauthorized connection attempt from IP address 116.97.222.145 on Port 445(SMB) |
2019-12-16 05:30:08 |