城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.113.214.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.113.214.138. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 11:38:12 CST 2025
;; MSG SIZE rcvd: 108
Host 138.214.113.138.in-addr.arpa not found: 2(SERVFAIL)
server can't find 138.113.214.138.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 85.214.213.28 | attack | FTP Brute-Force reported by Fail2Ban |
2019-12-18 06:02:00 |
| 122.154.46.4 | attackspam | Dec 18 05:16:17 webhost01 sshd[9912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.46.4 Dec 18 05:16:19 webhost01 sshd[9912]: Failed password for invalid user test from 122.154.46.4 port 40314 ssh2 ... |
2019-12-18 06:23:53 |
| 34.216.5.112 | attack | Hits on port : 27017 |
2019-12-18 06:10:45 |
| 182.74.25.246 | attack | Dec 17 22:44:02 mail sshd\[1364\]: Invalid user user from 182.74.25.246 Dec 17 22:44:02 mail sshd\[1364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 Dec 17 22:44:04 mail sshd\[1364\]: Failed password for invalid user user from 182.74.25.246 port 38384 ssh2 ... |
2019-12-18 05:49:16 |
| 37.187.181.182 | attackspambots | Dec 17 22:05:46 marvibiene sshd[36576]: Invalid user fishbelli from 37.187.181.182 port 42372 Dec 17 22:05:46 marvibiene sshd[36576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.181.182 Dec 17 22:05:46 marvibiene sshd[36576]: Invalid user fishbelli from 37.187.181.182 port 42372 Dec 17 22:05:49 marvibiene sshd[36576]: Failed password for invalid user fishbelli from 37.187.181.182 port 42372 ssh2 ... |
2019-12-18 06:23:23 |
| 104.54.180.97 | attack | SSH Brute Force |
2019-12-18 05:52:06 |
| 73.100.211.143 | attackbotsspam | Dec 17 17:49:46 ns382633 sshd\[3763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.100.211.143 user=root Dec 17 17:49:48 ns382633 sshd\[3763\]: Failed password for root from 73.100.211.143 port 45766 ssh2 Dec 17 18:44:45 ns382633 sshd\[15739\]: Invalid user test from 73.100.211.143 port 57746 Dec 17 18:44:45 ns382633 sshd\[15739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.100.211.143 Dec 17 18:44:47 ns382633 sshd\[15739\]: Failed password for invalid user test from 73.100.211.143 port 57746 ssh2 |
2019-12-18 06:17:36 |
| 212.129.138.198 | attackbots | --- report --- Dec 17 18:58:08 sshd: Connection from 212.129.138.198 port 35432 Dec 17 18:58:11 sshd: Failed password for root from 212.129.138.198 port 35432 ssh2 Dec 17 18:58:12 sshd: Received disconnect from 212.129.138.198: 11: Bye Bye [preauth] |
2019-12-18 06:26:15 |
| 165.22.144.147 | attackspambots | $f2bV_matches |
2019-12-18 06:20:29 |
| 51.75.23.173 | attackspam | Dec 17 19:41:30 XXX sshd[45050]: Invalid user mesgina from 51.75.23.173 port 43537 |
2019-12-18 06:17:49 |
| 178.62.75.60 | attackspam | ... |
2019-12-18 05:57:05 |
| 5.59.53.233 | attackspam | Hits on port : 445 |
2019-12-18 06:11:03 |
| 95.85.8.215 | attack | Dec 17 22:25:10 ns382633 sshd\[23388\]: Invalid user master from 95.85.8.215 port 51270 Dec 17 22:25:10 ns382633 sshd\[23388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.8.215 Dec 17 22:25:12 ns382633 sshd\[23388\]: Failed password for invalid user master from 95.85.8.215 port 51270 ssh2 Dec 17 23:01:26 ns382633 sshd\[29906\]: Invalid user guest from 95.85.8.215 port 32899 Dec 17 23:01:26 ns382633 sshd\[29906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.8.215 |
2019-12-18 06:13:49 |
| 185.53.88.98 | attackbots | Port scan detected on ports: 1024[UDP], 1025[UDP], 1026[UDP] |
2019-12-18 06:06:29 |
| 49.235.90.120 | attackbotsspam | Dec 17 12:55:08 home sshd[20144]: Invalid user admin from 49.235.90.120 port 42616 Dec 17 12:55:08 home sshd[20144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.90.120 Dec 17 12:55:08 home sshd[20144]: Invalid user admin from 49.235.90.120 port 42616 Dec 17 12:55:10 home sshd[20144]: Failed password for invalid user admin from 49.235.90.120 port 42616 ssh2 Dec 17 13:14:11 home sshd[20220]: Invalid user gwinn from 49.235.90.120 port 39232 Dec 17 13:14:11 home sshd[20220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.90.120 Dec 17 13:14:11 home sshd[20220]: Invalid user gwinn from 49.235.90.120 port 39232 Dec 17 13:14:13 home sshd[20220]: Failed password for invalid user gwinn from 49.235.90.120 port 39232 ssh2 Dec 17 13:20:02 home sshd[20260]: Invalid user mysql from 49.235.90.120 port 38098 Dec 17 13:20:02 home sshd[20260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost |
2019-12-18 05:50:58 |