城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.159.249.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.159.249.78. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 19:10:46 CST 2025
;; MSG SIZE rcvd: 106
Host 78.249.159.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 78.249.159.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 221.229.218.50 | attackbotsspam | hit -> srv3:22 |
2020-05-01 18:44:19 |
| 106.12.71.159 | attack | Invalid user sherlock from 106.12.71.159 port 50446 |
2020-05-01 19:09:07 |
| 122.51.254.9 | attackspambots | Fail2Ban - SSH Bruteforce Attempt |
2020-05-01 19:00:10 |
| 51.91.56.33 | attackspambots | 2020-05-01T07:37:39.725762abusebot-4.cloudsearch.cf sshd[16370]: Invalid user tanja from 51.91.56.33 port 34846 2020-05-01T07:37:39.731133abusebot-4.cloudsearch.cf sshd[16370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=33.ip-51-91-56.eu 2020-05-01T07:37:39.725762abusebot-4.cloudsearch.cf sshd[16370]: Invalid user tanja from 51.91.56.33 port 34846 2020-05-01T07:37:41.722107abusebot-4.cloudsearch.cf sshd[16370]: Failed password for invalid user tanja from 51.91.56.33 port 34846 ssh2 2020-05-01T07:41:20.085195abusebot-4.cloudsearch.cf sshd[16699]: Invalid user peace from 51.91.56.33 port 44480 2020-05-01T07:41:20.090556abusebot-4.cloudsearch.cf sshd[16699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=33.ip-51-91-56.eu 2020-05-01T07:41:20.085195abusebot-4.cloudsearch.cf sshd[16699]: Invalid user peace from 51.91.56.33 port 44480 2020-05-01T07:41:22.091296abusebot-4.cloudsearch.cf sshd[16699]: Failed p ... |
2020-05-01 19:17:51 |
| 152.136.87.219 | attackspambots | Invalid user harlan from 152.136.87.219 port 53296 |
2020-05-01 18:56:03 |
| 106.75.114.56 | attackspam | May 1 12:53:27 localhost sshd\[13506\]: Invalid user gera from 106.75.114.56 May 1 12:53:27 localhost sshd\[13506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.114.56 May 1 12:53:29 localhost sshd\[13506\]: Failed password for invalid user gera from 106.75.114.56 port 40172 ssh2 May 1 12:56:32 localhost sshd\[13672\]: Invalid user bouncer from 106.75.114.56 May 1 12:56:32 localhost sshd\[13672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.114.56 ... |
2020-05-01 19:05:23 |
| 219.250.188.142 | attack | Invalid user public from 219.250.188.142 port 47881 |
2020-05-01 18:45:07 |
| 119.28.116.166 | attack | Invalid user edoardo from 119.28.116.166 port 45454 |
2020-05-01 19:00:55 |
| 114.67.66.199 | attackspambots | May 1 12:53:14 sshd[9247]: Connection closed by 114.67.66.199 [preauth] |
2020-05-01 19:03:54 |
| 39.155.215.139 | attack | 2020-04-30T11:22:18.7612161495-001 sshd[35311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.155.215.139 user=root 2020-04-30T11:22:20.8370191495-001 sshd[35311]: Failed password for root from 39.155.215.139 port 23871 ssh2 2020-04-30T11:39:53.4976081495-001 sshd[36251]: Invalid user jesse from 39.155.215.139 port 2054 2020-04-30T11:39:53.5012531495-001 sshd[36251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.155.215.139 2020-04-30T11:39:53.4976081495-001 sshd[36251]: Invalid user jesse from 39.155.215.139 port 2054 2020-04-30T11:39:55.4111061495-001 sshd[36251]: Failed password for invalid user jesse from 39.155.215.139 port 2054 ssh2 ... |
2020-05-01 19:24:13 |
| 106.12.86.238 | attack | Invalid user nash from 106.12.86.238 port 49968 |
2020-05-01 19:08:53 |
| 128.199.102.17 | attack | May 1 10:38:16 ns3164893 sshd[11249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.102.17 user=root May 1 10:38:18 ns3164893 sshd[11249]: Failed password for root from 128.199.102.17 port 56823 ssh2 ... |
2020-05-01 18:59:26 |
| 128.199.193.127 | attack | 2020-05-01T07:16:34.1904241240 sshd\[27212\]: Invalid user dlc from 128.199.193.127 port 49368 2020-05-01T07:16:34.1940631240 sshd\[27212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.193.127 2020-05-01T07:16:36.0881461240 sshd\[27212\]: Failed password for invalid user dlc from 128.199.193.127 port 49368 ssh2 ... |
2020-05-01 18:58:58 |
| 49.232.59.246 | attackbots | odoo8 ... |
2020-05-01 19:22:07 |
| 111.229.48.141 | attackspam | 2020-04-30 UTC: (31x) - amandabackup,apple,bertolotti,demo,deploy,device,dgr,gh,httpfs,joan,ka,kl,lij,nproc(4x),olga,php,robert,root(5x),saitoh,superstar,tax,ubuntu,usuario,zope |
2020-05-01 19:04:54 |