城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.65.90.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.65.90.137. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:30:39 CST 2025
;; MSG SIZE rcvd: 106
Host 137.90.65.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 137.90.65.140.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 115.236.168.35 | attack | Dec 31 05:53:13 localhost sshd\[17340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.168.35 user=root Dec 31 05:53:16 localhost sshd\[17340\]: Failed password for root from 115.236.168.35 port 57222 ssh2 Dec 31 05:56:14 localhost sshd\[17613\]: Invalid user levans from 115.236.168.35 port 54164 |
2019-12-31 13:41:27 |
| 158.174.171.23 | attack | Dec 31 07:27:37 pkdns2 sshd\[10399\]: Invalid user administracion from 158.174.171.23Dec 31 07:27:39 pkdns2 sshd\[10399\]: Failed password for invalid user administracion from 158.174.171.23 port 57177 ssh2Dec 31 07:28:07 pkdns2 sshd\[10426\]: Invalid user msr from 158.174.171.23Dec 31 07:28:09 pkdns2 sshd\[10426\]: Failed password for invalid user msr from 158.174.171.23 port 60126 ssh2Dec 31 07:28:36 pkdns2 sshd\[10433\]: Invalid user ariel from 158.174.171.23Dec 31 07:28:38 pkdns2 sshd\[10433\]: Failed password for invalid user ariel from 158.174.171.23 port 34839 ssh2 ... |
2019-12-31 13:40:18 |
| 222.186.175.169 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root Failed password for root from 222.186.175.169 port 36494 ssh2 Failed password for root from 222.186.175.169 port 36494 ssh2 Failed password for root from 222.186.175.169 port 36494 ssh2 Failed password for root from 222.186.175.169 port 36494 ssh2 |
2019-12-31 13:29:28 |
| 182.61.14.161 | attackbots | Dec 31 04:47:11 toyboy sshd[12866]: Invalid user keraflow from 182.61.14.161 Dec 31 04:47:11 toyboy sshd[12866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.161 Dec 31 04:47:13 toyboy sshd[12866]: Failed password for invalid user keraflow from 182.61.14.161 port 58404 ssh2 Dec 31 04:47:13 toyboy sshd[12866]: Received disconnect from 182.61.14.161: 11: Bye Bye [preauth] Dec 31 05:17:12 toyboy sshd[14749]: Invalid user t2 from 182.61.14.161 Dec 31 05:17:12 toyboy sshd[14749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.161 Dec 31 05:17:14 toyboy sshd[14749]: Failed password for invalid user t2 from 182.61.14.161 port 44807 ssh2 Dec 31 05:17:15 toyboy sshd[14749]: Received disconnect from 182.61.14.161: 11: Bye Bye [preauth] Dec 31 05:19:43 toyboy sshd[14889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.161 user=........ ------------------------------- |
2019-12-31 13:06:51 |
| 222.75.0.197 | attack | Dec 30 21:43:12 DNS-2 sshd[29807]: Invalid user aaa from 222.75.0.197 port 59480 Dec 30 21:43:12 DNS-2 sshd[29807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.75.0.197 Dec 30 21:43:14 DNS-2 sshd[29807]: Failed password for invalid user aaa from 222.75.0.197 port 59480 ssh2 Dec 30 21:43:15 DNS-2 sshd[29807]: Received disconnect from 222.75.0.197 port 59480:11: Bye Bye [preauth] Dec 30 21:43:15 DNS-2 sshd[29807]: Disconnected from invalid user aaa 222.75.0.197 port 59480 [preauth] Dec 30 22:01:17 DNS-2 sshd[31236]: User sshd from 222.75.0.197 not allowed because not listed in AllowUsers Dec 30 22:01:17 DNS-2 sshd[31236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.75.0.197 user=sshd Dec 30 22:01:19 DNS-2 sshd[31236]: Failed password for invalid user sshd from 222.75.0.197 port 43964 ssh2 Dec 30 22:01:22 DNS-2 sshd[31236]: Received disconnect from 222.75.0.197 port 43964:11: ........ ------------------------------- |
2019-12-31 13:38:44 |
| 171.228.148.75 | attack | 1577768198 - 12/31/2019 05:56:38 Host: 171.228.148.75/171.228.148.75 Port: 445 TCP Blocked |
2019-12-31 13:25:09 |
| 92.118.37.58 | attack | 12/30/2019-23:56:51.139076 92.118.37.58 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-12-31 13:19:13 |
| 184.69.74.2 | attackspambots | Dec 31 05:57:01 [munged] sshd[1790]: Failed password for root from 184.69.74.2 port 35758 ssh2 |
2019-12-31 13:11:12 |
| 86.242.29.0 | attackbots | Dec 31 05:52:27 ns382633 sshd\[13326\]: Invalid user admin from 86.242.29.0 port 57196 Dec 31 05:52:27 ns382633 sshd\[13326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.242.29.0 Dec 31 05:52:29 ns382633 sshd\[13326\]: Failed password for invalid user admin from 86.242.29.0 port 57196 ssh2 Dec 31 05:56:16 ns382633 sshd\[14076\]: Invalid user ubuntu from 86.242.29.0 port 58344 Dec 31 05:56:16 ns382633 sshd\[14076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.242.29.0 |
2019-12-31 13:39:57 |
| 200.117.185.230 | attackbotsspam | 2019-12-31T05:51:17.551365vps751288.ovh.net sshd\[4456\]: Invalid user marketing from 200.117.185.230 port 9569 2019-12-31T05:51:17.561985vps751288.ovh.net sshd\[4456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host230.200-117-185.telecom.net.ar 2019-12-31T05:51:19.616847vps751288.ovh.net sshd\[4456\]: Failed password for invalid user marketing from 200.117.185.230 port 9569 ssh2 2019-12-31T05:57:00.265774vps751288.ovh.net sshd\[4486\]: Invalid user zander from 200.117.185.230 port 32641 2019-12-31T05:57:00.273866vps751288.ovh.net sshd\[4486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host230.200-117-185.telecom.net.ar |
2019-12-31 13:11:53 |
| 188.226.171.36 | attack | Dec 31 05:56:07 mout sshd[28047]: Invalid user yuechu from 188.226.171.36 port 52064 |
2019-12-31 13:44:56 |
| 168.126.85.225 | attackspam | $f2bV_matches |
2019-12-31 13:45:13 |
| 113.253.57.24 | attack | 1577768202 - 12/31/2019 05:56:42 Host: 113.253.57.24/113.253.57.24 Port: 445 TCP Blocked |
2019-12-31 13:23:22 |
| 221.217.48.2 | attackbotsspam | Dec 31 05:56:35 MK-Soft-VM6 sshd[2452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.217.48.2 Dec 31 05:56:37 MK-Soft-VM6 sshd[2452]: Failed password for invalid user waterson from 221.217.48.2 port 52214 ssh2 ... |
2019-12-31 13:16:12 |
| 218.92.0.171 | attackbots | --- report --- Dec 31 02:18:41 -0300 sshd: Connection from 218.92.0.171 port 47215 Dec 31 02:18:45 -0300 sshd: Failed password for root from 218.92.0.171 port 47215 ssh2 Dec 31 02:18:47 -0300 sshd: Received disconnect from 218.92.0.171: 11: [preauth] |
2019-12-31 13:26:17 |