城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.112.145.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.112.145.162. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020042900 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 29 23:33:46 CST 2020
;; MSG SIZE rcvd: 119
162.145.112.140.in-addr.arpa domain name pointer pc18.cr.liberal.ntu.edu.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
162.145.112.140.in-addr.arpa name = pc18.cr.liberal.ntu.edu.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 183.80.142.244 | attackspam | Nov 30 18:24:00 MK-Soft-Root2 sshd[1030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.80.142.244 Nov 30 18:24:02 MK-Soft-Root2 sshd[1030]: Failed password for invalid user guest from 183.80.142.244 port 50475 ssh2 ... |
2019-12-01 02:19:57 |
| 118.172.76.225 | attackbotsspam | 26/tcp [2019-11-30]1pkt |
2019-12-01 02:39:01 |
| 117.43.10.99 | attackspam | Telnet/23 MH Probe, BF, Hack - |
2019-12-01 02:44:00 |
| 179.232.1.254 | attackbots | Nov 30 19:35:41 andromeda sshd\[31024\]: Invalid user asterisk2222 from 179.232.1.254 port 38642 Nov 30 19:35:41 andromeda sshd\[31024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.254 Nov 30 19:35:43 andromeda sshd\[31024\]: Failed password for invalid user asterisk2222 from 179.232.1.254 port 38642 ssh2 |
2019-12-01 02:43:08 |
| 156.216.161.106 | attack | Invalid user admin from 156.216.161.106 port 49276 |
2019-12-01 02:06:09 |
| 171.5.30.47 | attack | 9001/tcp 23/tcp 23/tcp [2019-11-29/30]3pkt |
2019-12-01 02:07:09 |
| 91.215.244.12 | attackbotsspam | Nov 30 08:14:58 kapalua sshd\[20718\]: Invalid user zhongmin from 91.215.244.12 Nov 30 08:14:58 kapalua sshd\[20718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.244.12 Nov 30 08:15:00 kapalua sshd\[20718\]: Failed password for invalid user zhongmin from 91.215.244.12 port 59564 ssh2 Nov 30 08:18:06 kapalua sshd\[20917\]: Invalid user gggggggggg from 91.215.244.12 Nov 30 08:18:06 kapalua sshd\[20917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.244.12 |
2019-12-01 02:28:52 |
| 141.237.30.183 | attackspam | Telnet/23 MH Probe, BF, Hack - |
2019-12-01 02:30:20 |
| 82.145.171.183 | attackbotsspam | Microsoft-Windows-Security-Auditing |
2019-12-01 02:15:19 |
| 112.85.42.177 | attackbots | Nov 30 19:25:12 dedicated sshd[19160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.177 user=root Nov 30 19:25:14 dedicated sshd[19160]: Failed password for root from 112.85.42.177 port 30467 ssh2 |
2019-12-01 02:34:44 |
| 178.79.7.4 | attack | Nov 30 15:33:30 srv01 sshd[10014]: Invalid user ubnt from 178.79.7.4 port 57386 Nov 30 15:33:30 srv01 sshd[10014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.79.7.4 Nov 30 15:33:30 srv01 sshd[10014]: Invalid user ubnt from 178.79.7.4 port 57386 Nov 30 15:33:32 srv01 sshd[10014]: Failed password for invalid user ubnt from 178.79.7.4 port 57386 ssh2 Nov 30 15:33:30 srv01 sshd[10014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.79.7.4 Nov 30 15:33:30 srv01 sshd[10014]: Invalid user ubnt from 178.79.7.4 port 57386 Nov 30 15:33:32 srv01 sshd[10014]: Failed password for invalid user ubnt from 178.79.7.4 port 57386 ssh2 ... |
2019-12-01 02:26:34 |
| 14.248.150.123 | attack | 2019-11-30T14:33:55.839825abusebot-2.cloudsearch.cf sshd\[13076\]: Invalid user admin from 14.248.150.123 port 34453 |
2019-12-01 02:10:44 |
| 5.196.18.169 | attackspam | Nov 30 17:34:13 icinga sshd[2426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.18.169 Nov 30 17:34:15 icinga sshd[2426]: Failed password for invalid user wangcheng!@#!@# from 5.196.18.169 port 60210 ssh2 ... |
2019-12-01 02:41:46 |
| 13.234.116.48 | attackbots | Nov3015:31:01server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=13.234.116.48DST=136.243.224.58LEN=40TOS=0x00PREC=0x00TTL=45ID=26855PROTO=TCPSPT=41403DPT=23WINDOW=32090RES=0x00SYNURGP=0Nov3015:31:03server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=13.234.116.48DST=136.243.224.58LEN=40TOS=0x00PREC=0x00TTL=45ID=26855PROTO=TCPSPT=41403DPT=23WINDOW=32090RES=0x00SYNURGP=0Nov3015:31:03server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=13.234.116.48DST=136.243.224.58LEN=40TOS=0x00PREC=0x00TTL=45ID=26855PROTO=TCPSPT=41403DPT=23WINDOW=32090RES=0x00SYNURGP=0Nov3015:31:06server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52:54:00:a2:7f:43:08:00SRC=13.234.116.48DST=136.243.224.58LEN=40TOS=0x00PREC=0x00TTL=45ID=26855PROTO=TCPSPT=41403DPT=23WINDOW=32090RES=0x00SYNURGP=0Nov3015:31:07server2kernel:Firewall:\*TCP_INBlocked\*IN=eth0OUT=MAC=00:16:3e:3f:7a:43:52 |
2019-12-01 02:32:33 |
| 51.91.122.140 | attackspambots | Automatic report - SSH Brute-Force Attack |
2019-12-01 02:18:10 |