城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.214.97.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39781
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.214.97.158. IN A
;; AUTHORITY SECTION:
. 282 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020092302 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 24 07:38:58 CST 2020
;; MSG SIZE rcvd: 118
Host 158.97.214.140.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.136, trying next server
Server: 100.100.2.138
Address: 100.100.2.138#53
** server can't find 158.97.214.140.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 190.145.7.42 | attackbots | DATE:2019-08-27 04:09:18, IP:190.145.7.42, PORT:ssh SSH brute force auth (ermes) |
2019-08-27 10:39:10 |
| 54.36.163.70 | attackbots | Aug 26 20:24:03 home sshd[26887]: Invalid user atendimento from 54.36.163.70 port 49339 Aug 26 20:24:03 home sshd[26887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.70 Aug 26 20:24:03 home sshd[26887]: Invalid user atendimento from 54.36.163.70 port 49339 Aug 26 20:24:05 home sshd[26887]: Failed password for invalid user atendimento from 54.36.163.70 port 49339 ssh2 Aug 26 20:34:22 home sshd[26919]: Invalid user wwwrun from 54.36.163.70 port 43637 Aug 26 20:34:22 home sshd[26919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.70 Aug 26 20:34:22 home sshd[26919]: Invalid user wwwrun from 54.36.163.70 port 43637 Aug 26 20:34:24 home sshd[26919]: Failed password for invalid user wwwrun from 54.36.163.70 port 43637 ssh2 Aug 26 20:38:02 home sshd[26938]: Invalid user lillian from 54.36.163.70 port 37919 Aug 26 20:38:02 home sshd[26938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss |
2019-08-27 11:04:25 |
| 134.209.237.152 | attackbotsspam | Aug 27 08:13:11 itv-usvr-01 sshd[2113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.152 user=root Aug 27 08:13:13 itv-usvr-01 sshd[2113]: Failed password for root from 134.209.237.152 port 37544 ssh2 Aug 27 08:16:43 itv-usvr-01 sshd[4027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.152 user=backup Aug 27 08:16:45 itv-usvr-01 sshd[4027]: Failed password for backup from 134.209.237.152 port 51988 ssh2 Aug 27 08:20:05 itv-usvr-01 sshd[5771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.152 user=root Aug 27 08:20:07 itv-usvr-01 sshd[5771]: Failed password for root from 134.209.237.152 port 38186 ssh2 |
2019-08-27 10:53:00 |
| 116.202.25.67 | attackbots | Wordpress attack |
2019-08-27 11:22:25 |
| 193.56.28.47 | attackspam | 2019-08-27T09:42:11.124100enmeeting.mahidol.ac.th sshd\[12233\]: User daemon from 193.56.28.47 not allowed because not listed in AllowUsers 2019-08-27T09:42:11.138127enmeeting.mahidol.ac.th sshd\[12233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.56.28.47 user=daemon 2019-08-27T09:42:13.015022enmeeting.mahidol.ac.th sshd\[12233\]: Failed password for invalid user daemon from 193.56.28.47 port 41268 ssh2 ... |
2019-08-27 11:08:11 |
| 167.71.217.70 | attackbots | Aug 26 22:44:42 ny01 sshd[18873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.70 Aug 26 22:44:43 ny01 sshd[18873]: Failed password for invalid user applmgr from 167.71.217.70 port 38394 ssh2 Aug 26 22:49:33 ny01 sshd[19626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.217.70 |
2019-08-27 10:55:48 |
| 37.49.231.130 | attack | Splunk® : port scan detected: Aug 26 19:49:04 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=37.49.231.130 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=8205 PROTO=TCP SPT=58260 DPT=50802 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-08-27 10:58:21 |
| 107.170.209.246 | attack | [munged]::443 107.170.209.246 - - [27/Aug/2019:03:22:44 +0200] "POST /[munged]: HTTP/1.1" 200 6160 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 107.170.209.246 - - [27/Aug/2019:03:22:47 +0200] "POST /[munged]: HTTP/1.1" 200 6165 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-08-27 11:06:38 |
| 186.42.103.181 | attackspam | Aug 26 17:01:47 aiointranet sshd\[22609\]: Invalid user hello from 186.42.103.181 Aug 26 17:01:47 aiointranet sshd\[22609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.42.103.181 Aug 26 17:01:49 aiointranet sshd\[22609\]: Failed password for invalid user hello from 186.42.103.181 port 42170 ssh2 Aug 26 17:06:37 aiointranet sshd\[23024\]: Invalid user patrick from 186.42.103.181 Aug 26 17:06:37 aiointranet sshd\[23024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.42.103.181 |
2019-08-27 11:15:19 |
| 82.196.4.46 | attackbots | Aug 27 02:54:54 tuxlinux sshd[38829]: Invalid user ahavi from 82.196.4.46 port 45629 Aug 27 02:54:54 tuxlinux sshd[38829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.46 Aug 27 02:54:54 tuxlinux sshd[38829]: Invalid user ahavi from 82.196.4.46 port 45629 Aug 27 02:54:54 tuxlinux sshd[38829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.46 Aug 27 02:54:54 tuxlinux sshd[38829]: Invalid user ahavi from 82.196.4.46 port 45629 Aug 27 02:54:54 tuxlinux sshd[38829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.46 Aug 27 02:54:56 tuxlinux sshd[38829]: Failed password for invalid user ahavi from 82.196.4.46 port 45629 ssh2 ... |
2019-08-27 10:39:45 |
| 154.66.113.78 | attack | Aug 27 04:39:54 mail sshd\[2138\]: Invalid user maurta from 154.66.113.78 port 50802 Aug 27 04:39:54 mail sshd\[2138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.113.78 Aug 27 04:39:57 mail sshd\[2138\]: Failed password for invalid user maurta from 154.66.113.78 port 50802 ssh2 Aug 27 04:45:16 mail sshd\[2839\]: Invalid user train5 from 154.66.113.78 port 39130 Aug 27 04:45:16 mail sshd\[2839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.113.78 |
2019-08-27 11:00:13 |
| 80.211.65.31 | attackspam | Aug 27 03:36:31 host sshd\[343\]: Invalid user reach from 80.211.65.31 port 52626 Aug 27 03:36:31 host sshd\[343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.65.31 ... |
2019-08-27 11:09:18 |
| 140.143.201.236 | attack | Aug 26 16:52:21 web9 sshd\[22768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.201.236 user=root Aug 26 16:52:23 web9 sshd\[22768\]: Failed password for root from 140.143.201.236 port 36088 ssh2 Aug 26 16:57:49 web9 sshd\[23751\]: Invalid user landon from 140.143.201.236 Aug 26 16:57:49 web9 sshd\[23751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.201.236 Aug 26 16:57:50 web9 sshd\[23751\]: Failed password for invalid user landon from 140.143.201.236 port 53056 ssh2 |
2019-08-27 11:08:46 |
| 174.138.21.117 | attackbots | Aug 27 03:12:40 game-panel sshd[11093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.117 Aug 27 03:12:42 game-panel sshd[11093]: Failed password for invalid user test from 174.138.21.117 port 54594 ssh2 Aug 27 03:17:23 game-panel sshd[11267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.117 |
2019-08-27 11:18:50 |
| 123.24.131.28 | attack | Aug 27 02:39:16 srv-4 sshd\[18924\]: Invalid user admin from 123.24.131.28 Aug 27 02:39:16 srv-4 sshd\[18924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.24.131.28 Aug 27 02:39:18 srv-4 sshd\[18924\]: Failed password for invalid user admin from 123.24.131.28 port 49415 ssh2 ... |
2019-08-27 11:00:38 |