城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.150.146.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37331
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.150.146.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 15:29:49 CST 2025
;; MSG SIZE rcvd: 107
b'Host 55.146.150.138.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 138.150.146.55.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 36.156.24.43 | attackbotsspam | Sep 6 06:53:04 server2 sshd\[11507\]: User root from 36.156.24.43 not allowed because not listed in AllowUsers Sep 6 06:53:12 server2 sshd\[11510\]: User root from 36.156.24.43 not allowed because not listed in AllowUsers Sep 6 06:55:10 server2 sshd\[11725\]: User root from 36.156.24.43 not allowed because not listed in AllowUsers Sep 6 07:00:13 server2 sshd\[12063\]: User root from 36.156.24.43 not allowed because not listed in AllowUsers Sep 6 07:00:38 server2 sshd\[12070\]: User root from 36.156.24.43 not allowed because not listed in AllowUsers Sep 6 07:00:38 server2 sshd\[12069\]: User root from 36.156.24.43 not allowed because not listed in AllowUsers |
2019-09-06 12:21:05 |
| 88.0.80.224 | attackspam | Sep 6 06:55:47 www2 sshd\[38244\]: Invalid user alexk from 88.0.80.224Sep 6 06:55:49 www2 sshd\[38244\]: Failed password for invalid user alexk from 88.0.80.224 port 37294 ssh2Sep 6 06:59:52 www2 sshd\[38560\]: Invalid user guest from 88.0.80.224 ... |
2019-09-06 12:10:23 |
| 129.204.155.48 | attack | $f2bV_matches |
2019-09-06 12:40:35 |
| 103.215.217.42 | attack | 2,12-03/03 concatform PostRequest-Spammer scoring: oslo |
2019-09-06 12:41:40 |
| 103.80.117.214 | attack | Sep 5 18:30:41 php1 sshd\[12637\]: Invalid user admin from 103.80.117.214 Sep 5 18:30:41 php1 sshd\[12637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.117.214 Sep 5 18:30:42 php1 sshd\[12637\]: Failed password for invalid user admin from 103.80.117.214 port 35796 ssh2 Sep 5 18:35:18 php1 sshd\[13140\]: Invalid user deploy from 103.80.117.214 Sep 5 18:35:18 php1 sshd\[13140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.117.214 |
2019-09-06 12:42:06 |
| 103.17.92.254 | attackbotsspam | Sep 6 06:26:16 markkoudstaal sshd[14365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.92.254 Sep 6 06:26:18 markkoudstaal sshd[14365]: Failed password for invalid user admin from 103.17.92.254 port 52436 ssh2 Sep 6 06:30:18 markkoudstaal sshd[14882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.92.254 |
2019-09-06 12:59:42 |
| 89.239.25.7 | attack | Automatic report - Banned IP Access |
2019-09-06 12:53:50 |
| 86.97.54.162 | attack | Automatic report - Port Scan Attack |
2019-09-06 12:26:09 |
| 76.10.128.88 | attack | Sep 5 18:29:02 web9 sshd\[4194\]: Invalid user testing from 76.10.128.88 Sep 5 18:29:02 web9 sshd\[4194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.10.128.88 Sep 5 18:29:04 web9 sshd\[4194\]: Failed password for invalid user testing from 76.10.128.88 port 35658 ssh2 Sep 5 18:33:21 web9 sshd\[4971\]: Invalid user csserver from 76.10.128.88 Sep 5 18:33:21 web9 sshd\[4971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.10.128.88 |
2019-09-06 12:35:36 |
| 111.177.32.83 | attackbots | Sep 6 06:50:07 intra sshd\[35940\]: Invalid user ansible from 111.177.32.83Sep 6 06:50:10 intra sshd\[35940\]: Failed password for invalid user ansible from 111.177.32.83 port 34308 ssh2Sep 6 06:55:00 intra sshd\[36029\]: Invalid user demo from 111.177.32.83Sep 6 06:55:02 intra sshd\[36029\]: Failed password for invalid user demo from 111.177.32.83 port 49618 ssh2Sep 6 06:59:52 intra sshd\[36081\]: Invalid user nagios from 111.177.32.83Sep 6 06:59:54 intra sshd\[36081\]: Failed password for invalid user nagios from 111.177.32.83 port 36676 ssh2 ... |
2019-09-06 12:10:07 |
| 138.201.243.66 | attack | B: zzZZzz blocked content access |
2019-09-06 12:13:37 |
| 106.12.77.212 | attack | Sep 6 00:36:00 TORMINT sshd\[25789\]: Invalid user ts3 from 106.12.77.212 Sep 6 00:36:00 TORMINT sshd\[25789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.212 Sep 6 00:36:02 TORMINT sshd\[25789\]: Failed password for invalid user ts3 from 106.12.77.212 port 34576 ssh2 ... |
2019-09-06 12:48:11 |
| 118.152.164.59 | attackbotsspam | 2019-09-05T23:20:28.957396WS-Zach sshd[9615]: Invalid user bcd from 118.152.164.59 port 57408 2019-09-05T23:20:28.961454WS-Zach sshd[9615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.152.164.59 2019-09-05T23:20:28.957396WS-Zach sshd[9615]: Invalid user bcd from 118.152.164.59 port 57408 2019-09-05T23:20:30.992386WS-Zach sshd[9615]: Failed password for invalid user bcd from 118.152.164.59 port 57408 ssh2 2019-09-06T00:06:52.462705WS-Zach sshd[1116]: Invalid user asd from 118.152.164.59 port 58236 ... |
2019-09-06 12:40:11 |
| 138.118.123.248 | attackspambots | Automatic report - Port Scan Attack |
2019-09-06 12:21:33 |
| 118.184.216.161 | attack | Sep 6 06:42:18 vps691689 sshd[8012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.184.216.161 Sep 6 06:42:20 vps691689 sshd[8012]: Failed password for invalid user sysadmin from 118.184.216.161 port 42128 ssh2 Sep 6 06:50:48 vps691689 sshd[8105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.184.216.161 ... |
2019-09-06 12:51:31 |