城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.150.77.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.150.77.3. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 02:34:23 CST 2025
;; MSG SIZE rcvd: 105
b'Host 3.77.150.138.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 138.150.77.3.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 134.175.230.209 | attack | 2020-08-16T19:15:37.975855hostname sshd[30962]: Invalid user administrador from 134.175.230.209 port 38988 2020-08-16T19:15:40.933685hostname sshd[30962]: Failed password for invalid user administrador from 134.175.230.209 port 38988 ssh2 2020-08-16T19:20:18.406332hostname sshd[31585]: Invalid user cloud from 134.175.230.209 port 39102 ... |
2020-08-17 02:29:09 |
| 170.253.0.134 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-08-17 02:10:45 |
| 41.232.89.231 | attack | Telnet Server BruteForce Attack |
2020-08-17 02:15:58 |
| 106.13.44.100 | attackspam | 2020-08-16T19:56:53.381818ns386461 sshd\[17192\]: Invalid user hacker from 106.13.44.100 port 43304 2020-08-16T19:56:53.386682ns386461 sshd\[17192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.100 2020-08-16T19:56:55.334548ns386461 sshd\[17192\]: Failed password for invalid user hacker from 106.13.44.100 port 43304 ssh2 2020-08-16T20:09:03.077891ns386461 sshd\[29015\]: Invalid user li from 106.13.44.100 port 47124 2020-08-16T20:09:03.081999ns386461 sshd\[29015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.100 ... |
2020-08-17 02:18:05 |
| 68.183.111.135 | attackbotsspam | 68.183.111.135 - - [16/Aug/2020:18:15:31 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 68.183.111.135 - - [16/Aug/2020:18:15:32 +0100] "POST /wp-login.php HTTP/1.1" 200 1970 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 68.183.111.135 - - [16/Aug/2020:18:15:34 +0100] "POST /wp-login.php HTTP/1.1" 200 1973 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-17 02:08:39 |
| 135.23.251.14 | attack | Aug 16 14:04:33 www sshd[19414]: Invalid user admin from 135.23.251.14 Aug 16 14:04:36 www sshd[19414]: Failed password for invalid user admin from 135.23.251.14 port 35383 ssh2 Aug 16 14:04:37 www sshd[19416]: Invalid user admin from 135.23.251.14 Aug 16 14:04:38 www sshd[19416]: Failed password for invalid user admin from 135.23.251.14 port 35463 ssh2 Aug 16 14:04:39 www sshd[19420]: Invalid user admin from 135.23.251.14 Aug 16 14:04:41 www sshd[19420]: Failed password for invalid user admin from 135.23.251.14 port 35540 ssh2 Aug 16 14:04:42 www sshd[19422]: Invalid user admin from 135.23.251.14 Aug 16 14:04:44 www sshd[19422]: Failed password for invalid user admin from 135.23.251.14 port 35636 ssh2 Aug 16 14:04:45 www sshd[19424]: Invalid user admin from 135.23.251.14 Aug 16 14:04:47 www sshd[19424]: Failed password for invalid user admin from 135.23.251.14 port 35685 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=135.23.251.14 |
2020-08-17 02:04:06 |
| 34.87.95.9 | attackspam | Lines containing failures of 34.87.95.9 Aug 16 13:39:31 ntop sshd[31609]: Invalid user oy from 34.87.95.9 port 46376 Aug 16 13:39:31 ntop sshd[31609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.95.9 Aug 16 13:39:33 ntop sshd[31609]: Failed password for invalid user oy from 34.87.95.9 port 46376 ssh2 Aug 16 13:39:35 ntop sshd[31609]: Received disconnect from 34.87.95.9 port 46376:11: Bye Bye [preauth] Aug 16 13:39:35 ntop sshd[31609]: Disconnected from invalid user oy 34.87.95.9 port 46376 [preauth] Aug 16 14:12:24 ntop sshd[2591]: Invalid user tang from 34.87.95.9 port 46946 Aug 16 14:12:24 ntop sshd[2591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.95.9 Aug 16 14:12:26 ntop sshd[2591]: Failed password for invalid user tang from 34.87.95.9 port 46946 ssh2 Aug 16 14:12:28 ntop sshd[2591]: Received disconnect from 34.87.95.9 port 46946:11: Bye Bye [preauth] Aug 16 14:12:........ ------------------------------ |
2020-08-17 02:37:31 |
| 45.231.12.37 | attackbotsspam | 2020-08-15T16:00:26.465324hostname sshd[27297]: Failed password for root from 45.231.12.37 port 45110 ssh2 ... |
2020-08-17 02:11:35 |
| 49.234.149.92 | attackspambots | SSH Brute-Force. Ports scanning. |
2020-08-17 02:20:29 |
| 77.247.109.88 | attackspam | [2020-08-16 13:48:02] NOTICE[1185][C-00002d22] chan_sip.c: Call from '' (77.247.109.88:60741) to extension '9011442037699492' rejected because extension not found in context 'public'. [2020-08-16 13:48:02] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-16T13:48:02.027-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442037699492",SessionID="0x7f10c405a408",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.109.88/60741",ACLName="no_extension_match" [2020-08-16 13:48:06] NOTICE[1185][C-00002d23] chan_sip.c: Call from '' (77.247.109.88:50251) to extension '01146812400621' rejected because extension not found in context 'public'. [2020-08-16 13:48:06] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-16T13:48:06.410-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146812400621",SessionID="0x7f10c41b0fe8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/ ... |
2020-08-17 02:03:05 |
| 158.69.210.168 | attackspam | Aug 16 19:03:43 fhem-rasp sshd[27553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.210.168 Aug 16 19:03:45 fhem-rasp sshd[27553]: Failed password for invalid user hadi from 158.69.210.168 port 59222 ssh2 ... |
2020-08-17 02:17:32 |
| 219.240.99.110 | attack | Aug 16 18:13:16 *** sshd[28547]: Invalid user oracle from 219.240.99.110 |
2020-08-17 02:13:26 |
| 54.37.71.204 | attackspam | "Unauthorized connection attempt on SSHD detected" |
2020-08-17 02:03:36 |
| 103.45.190.181 | attack | Lines containing failures of 103.45.190.181 Aug 16 14:14:35 shared04 sshd[31436]: Invalid user tomcat9 from 103.45.190.181 port 57388 Aug 16 14:14:35 shared04 sshd[31436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.190.181 Aug 16 14:14:37 shared04 sshd[31436]: Failed password for invalid user tomcat9 from 103.45.190.181 port 57388 ssh2 Aug 16 14:14:37 shared04 sshd[31436]: Received disconnect from 103.45.190.181 port 57388:11: Bye Bye [preauth] Aug 16 14:14:37 shared04 sshd[31436]: Disconnected from invalid user tomcat9 103.45.190.181 port 57388 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=103.45.190.181 |
2020-08-17 02:22:12 |
| 106.54.14.42 | attackspam | Aug 16 18:33:58 ajax sshd[26608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.14.42 Aug 16 18:33:59 ajax sshd[26608]: Failed password for invalid user mdh from 106.54.14.42 port 50680 ssh2 |
2020-08-17 02:07:20 |