城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.20.180.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.20.180.193. IN A
;; AUTHORITY SECTION:
. 571 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020030700 1800 900 604800 86400
;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 19:56:27 CST 2020
;; MSG SIZE rcvd: 117
Host 193.180.20.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 193.180.20.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.68.181 | attackspam | Port scanning [2 denied] |
2020-05-22 16:43:13 |
| 114.69.249.194 | attackspambots | Invalid user oso from 114.69.249.194 port 57572 |
2020-05-22 16:31:00 |
| 106.13.166.122 | attackspam | May 19 00:03:30 h1946882 sshd[12283]: pam_unix(sshd:auth): authenticati= on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D106.= 13.166.122=20 May 19 00:03:32 h1946882 sshd[12283]: Failed password for invalid user = ftb from 106.13.166.122 port 57442 ssh2 May 19 00:03:33 h1946882 sshd[12283]: Received disconnect from 106.13.1= 66.122: 11: Bye Bye [preauth] May 19 00:16:00 h1946882 sshd[12530]: pam_unix(sshd:auth): authenticati= on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D106.= 13.166.122=20 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=106.13.166.122 |
2020-05-22 16:35:00 |
| 159.89.114.40 | attackbotsspam | Invalid user ync from 159.89.114.40 port 38724 |
2020-05-22 16:39:21 |
| 78.128.113.42 | attack | May 22 10:04:04 debian-2gb-nbg1-2 kernel: \[12393462.788986\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=78.128.113.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54109 PROTO=TCP SPT=47653 DPT=5040 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-22 16:22:51 |
| 92.222.93.104 | attackspambots | k+ssh-bruteforce |
2020-05-22 16:43:30 |
| 52.80.191.225 | attackbots | Lines containing failures of 52.80.191.225 May 19 02:47:43 penfold sshd[2187]: Invalid user jrt from 52.80.191.225 port 37434 May 19 02:47:43 penfold sshd[2187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.80.191.225 May 19 02:47:45 penfold sshd[2187]: Failed password for invalid user jrt from 52.80.191.225 port 37434 ssh2 May 19 02:47:45 penfold sshd[2187]: Received disconnect from 52.80.191.225 port 37434:11: Bye Bye [preauth] May 19 02:47:45 penfold sshd[2187]: Disconnected from invalid user jrt 52.80.191.225 port 37434 [preauth] May 19 02:55:24 penfold sshd[2584]: Connection closed by 52.80.191.225 port 34782 [preauth] May 19 03:01:46 penfold sshd[3007]: Invalid user mhb from 52.80.191.225 port 57582 May 19 03:01:46 penfold sshd[3007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.80.191.225 May 19 03:01:48 penfold sshd[3007]: Failed password for invalid user mhb from 52.80......... ------------------------------ |
2020-05-22 16:33:14 |
| 106.54.3.80 | attack | May 22 01:53:45 firewall sshd[4831]: Invalid user cvy from 106.54.3.80 May 22 01:53:46 firewall sshd[4831]: Failed password for invalid user cvy from 106.54.3.80 port 43872 ssh2 May 22 01:56:10 firewall sshd[4936]: Invalid user rtr from 106.54.3.80 ... |
2020-05-22 16:35:59 |
| 94.102.51.58 | attackbots | 05/22/2020-04:04:55.443304 94.102.51.58 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-22 16:07:04 |
| 207.248.127.161 | attackspam | May 22 08:54:56 ourumov-web sshd\[1572\]: Invalid user rwt from 207.248.127.161 port 35788 May 22 08:54:56 ourumov-web sshd\[1572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.248.127.161 May 22 08:54:58 ourumov-web sshd\[1572\]: Failed password for invalid user rwt from 207.248.127.161 port 35788 ssh2 ... |
2020-05-22 16:17:13 |
| 157.230.132.100 | attackbotsspam | Invalid user dal from 157.230.132.100 port 55534 |
2020-05-22 16:09:59 |
| 211.193.58.173 | attackbotsspam | May 22 10:26:05 abendstille sshd\[20606\]: Invalid user sgw from 211.193.58.173 May 22 10:26:05 abendstille sshd\[20606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.58.173 May 22 10:26:07 abendstille sshd\[20606\]: Failed password for invalid user sgw from 211.193.58.173 port 38374 ssh2 May 22 10:30:10 abendstille sshd\[24763\]: Invalid user utz from 211.193.58.173 May 22 10:30:10 abendstille sshd\[24763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.58.173 ... |
2020-05-22 16:33:55 |
| 94.23.26.6 | attack | May 22 10:13:06 * sshd[5099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.26.6 May 22 10:13:09 * sshd[5099]: Failed password for invalid user ibpliups from 94.23.26.6 port 39276 ssh2 |
2020-05-22 16:31:37 |
| 104.248.45.204 | attackbots | May 22 08:38:03 ns382633 sshd\[3590\]: Invalid user kil from 104.248.45.204 port 60044 May 22 08:38:03 ns382633 sshd\[3590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.45.204 May 22 08:38:05 ns382633 sshd\[3590\]: Failed password for invalid user kil from 104.248.45.204 port 60044 ssh2 May 22 08:44:31 ns382633 sshd\[4917\]: Invalid user igz from 104.248.45.204 port 57096 May 22 08:44:31 ns382633 sshd\[4917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.45.204 |
2020-05-22 16:28:39 |
| 104.211.213.59 | attack | May 22 16:45:02 localhost sshd[2579120]: Invalid user yvm from 104.211.213.59 port 39878 ... |
2020-05-22 16:38:47 |