城市(city): unknown
省份(region): unknown
国家(country): India
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.1.119.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29140
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.1.119.27. IN A
;; AUTHORITY SECTION:
. 136 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 21:25:03 CST 2022
;; MSG SIZE rcvd: 104
Host 27.119.1.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 27.119.1.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.222.72.130 | attackspam | Nov 8 07:21:15 sd-53420 sshd\[2854\]: Invalid user gittest from 92.222.72.130 Nov 8 07:21:15 sd-53420 sshd\[2854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.130 Nov 8 07:21:17 sd-53420 sshd\[2854\]: Failed password for invalid user gittest from 92.222.72.130 port 55618 ssh2 Nov 8 07:25:10 sd-53420 sshd\[3987\]: Invalid user abcd666 from 92.222.72.130 Nov 8 07:25:10 sd-53420 sshd\[3987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.130 ... |
2019-11-08 18:57:50 |
| 106.12.189.89 | attackbots | Nov 8 10:56:17 nextcloud sshd\[32169\]: Invalid user tangjun!1990 from 106.12.189.89 Nov 8 10:56:17 nextcloud sshd\[32169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.189.89 Nov 8 10:56:20 nextcloud sshd\[32169\]: Failed password for invalid user tangjun!1990 from 106.12.189.89 port 47922 ssh2 ... |
2019-11-08 18:44:25 |
| 138.68.4.198 | attackbots | $f2bV_matches |
2019-11-08 19:12:34 |
| 103.17.55.200 | attack | Nov 8 07:24:53 vps647732 sshd[19934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200 Nov 8 07:24:55 vps647732 sshd[19934]: Failed password for invalid user admin from 103.17.55.200 port 39808 ssh2 ... |
2019-11-08 19:08:39 |
| 162.243.50.8 | attackspam | Nov 7 20:21:21 sachi sshd\[22862\]: Invalid user qj123456qq from 162.243.50.8 Nov 7 20:21:21 sachi sshd\[22862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.50.8 Nov 7 20:21:23 sachi sshd\[22862\]: Failed password for invalid user qj123456qq from 162.243.50.8 port 52159 ssh2 Nov 7 20:25:19 sachi sshd\[23176\]: Invalid user AHNJH231423 from 162.243.50.8 Nov 7 20:25:19 sachi sshd\[23176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.50.8 |
2019-11-08 18:53:01 |
| 79.137.86.205 | attackspambots | Nov 8 07:25:30 serwer sshd\[3801\]: Invalid user cvs from 79.137.86.205 port 38678 Nov 8 07:25:30 serwer sshd\[3801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.86.205 Nov 8 07:25:32 serwer sshd\[3801\]: Failed password for invalid user cvs from 79.137.86.205 port 38678 ssh2 ... |
2019-11-08 18:41:23 |
| 123.151.172.194 | attackbots | Nov 07 20:43:37 host sshd[31770]: Invalid user admin from 123.151.172.194 port 55099 |
2019-11-08 18:54:23 |
| 220.94.205.234 | attack | SSH bruteforce (Triggered fail2ban) |
2019-11-08 19:05:09 |
| 201.184.40.119 | attack | Honeypot attack, port: 23, PTR: static-adsl201-184-40-119.une.net.co. |
2019-11-08 18:51:15 |
| 104.37.172.38 | attackspambots | Port Scan 1433 |
2019-11-08 19:02:22 |
| 77.163.34.71 | attackspam | Nov 8 04:11:21 ovpn sshd[7472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.163.34.71 user=r.r Nov 8 04:11:22 ovpn sshd[7472]: Failed password for r.r from 77.163.34.71 port 41686 ssh2 Nov 8 04:11:23 ovpn sshd[7472]: Received disconnect from 77.163.34.71 port 41686:11: Bye Bye [preauth] Nov 8 04:11:23 ovpn sshd[7472]: Disconnected from 77.163.34.71 port 41686 [preauth] Nov 8 04:21:47 ovpn sshd[29231]: Invalid user aline from 77.163.34.71 Nov 8 04:21:47 ovpn sshd[29231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.163.34.71 Nov 8 04:21:49 ovpn sshd[29231]: Failed password for invalid user aline from 77.163.34.71 port 60100 ssh2 Nov 8 04:21:49 ovpn sshd[29231]: Received disconnect from 77.163.34.71 port 60100:11: Bye Bye [preauth] Nov 8 04:21:49 ovpn sshd[29231]: Disconnected from 77.163.34.71 port 60100 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html? |
2019-11-08 19:05:54 |
| 51.77.201.36 | attackspam | 2019-11-08T08:49:25.409708shield sshd\[16413\]: Invalid user vision from 51.77.201.36 port 36404 2019-11-08T08:49:25.414393shield sshd\[16413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu 2019-11-08T08:49:27.892900shield sshd\[16413\]: Failed password for invalid user vision from 51.77.201.36 port 36404 ssh2 2019-11-08T08:52:38.217569shield sshd\[16835\]: Invalid user pi from 51.77.201.36 port 44818 2019-11-08T08:52:38.221864shield sshd\[16835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-77-201.eu |
2019-11-08 19:18:17 |
| 117.71.53.105 | attackbots | Nov 8 04:57:02 TORMINT sshd\[25266\]: Invalid user 1q2w3e from 117.71.53.105 Nov 8 04:57:02 TORMINT sshd\[25266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.71.53.105 Nov 8 04:57:03 TORMINT sshd\[25266\]: Failed password for invalid user 1q2w3e from 117.71.53.105 port 42228 ssh2 ... |
2019-11-08 18:54:37 |
| 94.23.24.213 | attack | Nov 8 05:12:22 xm3 sshd[8390]: Failed password for r.r from 94.23.24.213 port 48722 ssh2 Nov 8 05:12:22 xm3 sshd[8390]: Received disconnect from 94.23.24.213: 11: Bye Bye [preauth] Nov 8 05:19:12 xm3 sshd[20916]: Failed password for r.r from 94.23.24.213 port 58222 ssh2 Nov 8 05:19:12 xm3 sshd[20916]: Received disconnect from 94.23.24.213: 11: Bye Bye [preauth] Nov 8 05:22:34 xm3 sshd[29638]: Failed password for r.r from 94.23.24.213 port 41246 ssh2 Nov 8 05:22:34 xm3 sshd[29638]: Received disconnect from 94.23.24.213: 11: Bye Bye [preauth] Nov 8 05:25:53 xm3 sshd[4334]: Failed password for r.r from 94.23.24.213 port 52484 ssh2 Nov 8 05:25:53 xm3 sshd[4334]: Received disconnect from 94.23.24.213: 11: Bye Bye [preauth] Nov 8 05:29:43 xm3 sshd[9950]: Failed password for r.r from 94.23.24.213 port 35490 ssh2 Nov 8 05:29:43 xm3 sshd[9950]: Received disconnect from 94.23.24.213: 11: Bye Bye [preauth] Nov 8 05:32:54 xm3 sshd[18651]: Failed password for invalid user........ ------------------------------- |
2019-11-08 19:12:06 |
| 118.179.149.227 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-11-08 18:57:04 |