城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.191.17.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54122
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.191.17.106. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 00:46:26 CST 2025
;; MSG SIZE rcvd: 107
Host 106.17.191.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 106.17.191.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.92.0.220 | attackbotsspam | Lines containing failures of 218.92.0.220 Jun 13 15:12:41 *** sshd[126111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220 user=r.r Jun 13 15:12:42 *** sshd[126111]: Failed password for r.r from 218.92.0.220 port 61397 ssh2 Jun 13 15:12:47 *** sshd[126111]: message repeated 2 serveres: [ Failed password for r.r from 218.92.0.220 port 61397 ssh2] Jun 13 15:12:47 *** sshd[126111]: Received disconnect from 218.92.0.220 port 61397:11: [preauth] Jun 13 15:12:47 *** sshd[126111]: Disconnected from authenticating user r.r 218.92.0.220 port 61397 [preauth] Jun 13 15:12:47 *** sshd[126111]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220 user=r.r Jun 13 15:12:51 *** sshd[126116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220 user=r.r Jun 13 15:12:54 *** sshd[126116]: Failed password for r.r from 218.92.0.220 port 46607 ssh2 J........ ------------------------------ |
2020-06-14 17:44:45 |
| 134.209.102.196 | attackspam | Jun 14 10:36:18 gestao sshd[10391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.102.196 Jun 14 10:36:20 gestao sshd[10391]: Failed password for invalid user stephan from 134.209.102.196 port 60794 ssh2 Jun 14 10:40:04 gestao sshd[10574]: Failed password for root from 134.209.102.196 port 34020 ssh2 ... |
2020-06-14 17:54:52 |
| 120.92.34.203 | attack | Jun 14 16:35:23 localhost sshd[682843]: Connection closed by 120.92.34.203 port 46016 [preauth] ... |
2020-06-14 17:42:43 |
| 103.52.217.136 | attackbots | Unauthorized connection attempt detected from IP address 103.52.217.136 to port 3052 |
2020-06-14 17:35:32 |
| 61.216.5.153 | attack | Jun 14 12:05:56 icinga sshd[30817]: Failed password for root from 61.216.5.153 port 48108 ssh2 Jun 14 12:11:30 icinga sshd[39408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.5.153 Jun 14 12:11:32 icinga sshd[39408]: Failed password for invalid user userslb from 61.216.5.153 port 60126 ssh2 ... |
2020-06-14 18:11:58 |
| 190.215.112.122 | attack | Jun 14 11:31:56 vmd26974 sshd[8214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122 Jun 14 11:31:58 vmd26974 sshd[8214]: Failed password for invalid user tls from 190.215.112.122 port 46401 ssh2 ... |
2020-06-14 18:13:09 |
| 192.144.230.221 | attackspam | Failed password for invalid user shaca from 192.144.230.221 port 52788 ssh2 |
2020-06-14 18:02:09 |
| 46.38.150.153 | attackspambots | Jun 14 11:21:32 relay postfix/smtpd\[3363\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 14 11:21:48 relay postfix/smtpd\[29839\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 14 11:22:58 relay postfix/smtpd\[11774\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 14 11:23:10 relay postfix/smtpd\[6979\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 14 11:24:22 relay postfix/smtpd\[15593\]: warning: unknown\[46.38.150.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-06-14 17:34:53 |
| 113.160.87.66 | attackbotsspam | (mod_security) mod_security (id:5000135) triggered by 113.160.87.66 (VN/Vietnam/static.vnpt.vn): 10 in the last 3600 secs; ID: rub |
2020-06-14 18:06:57 |
| 167.172.185.179 | attack | Jun 14 08:27:34 vps333114 sshd[23065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.185.179 Jun 14 08:27:36 vps333114 sshd[23065]: Failed password for invalid user awr from 167.172.185.179 port 60220 ssh2 ... |
2020-06-14 18:04:17 |
| 68.183.137.173 | attackspam | Jun 14 08:58:19 localhost sshd[65673]: Invalid user voice from 68.183.137.173 port 60008 Jun 14 08:58:19 localhost sshd[65673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.137.173 Jun 14 08:58:19 localhost sshd[65673]: Invalid user voice from 68.183.137.173 port 60008 Jun 14 08:58:21 localhost sshd[65673]: Failed password for invalid user voice from 68.183.137.173 port 60008 ssh2 Jun 14 09:03:42 localhost sshd[66255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.137.173 user=root Jun 14 09:03:44 localhost sshd[66255]: Failed password for root from 68.183.137.173 port 48852 ssh2 ... |
2020-06-14 18:00:26 |
| 36.152.38.149 | attack | 2020-06-14T03:44:09.754720abusebot-3.cloudsearch.cf sshd[5790]: Invalid user factorio from 36.152.38.149 port 35216 2020-06-14T03:44:09.761633abusebot-3.cloudsearch.cf sshd[5790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.152.38.149 2020-06-14T03:44:09.754720abusebot-3.cloudsearch.cf sshd[5790]: Invalid user factorio from 36.152.38.149 port 35216 2020-06-14T03:44:12.224757abusebot-3.cloudsearch.cf sshd[5790]: Failed password for invalid user factorio from 36.152.38.149 port 35216 ssh2 2020-06-14T03:48:27.472382abusebot-3.cloudsearch.cf sshd[6135]: Invalid user shachunyang from 36.152.38.149 port 43994 2020-06-14T03:48:27.488953abusebot-3.cloudsearch.cf sshd[6135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.152.38.149 2020-06-14T03:48:27.472382abusebot-3.cloudsearch.cf sshd[6135]: Invalid user shachunyang from 36.152.38.149 port 43994 2020-06-14T03:48:29.705320abusebot-3.cloudsearch.cf sshd[ ... |
2020-06-14 17:53:20 |
| 94.23.172.28 | attack | odoo8 ... |
2020-06-14 18:14:56 |
| 193.32.126.161 | attackspambots | srv02 SSH BruteForce Attacks 22 .. |
2020-06-14 17:33:27 |
| 112.85.42.176 | attackspambots | Jun 14 11:26:45 *host* sshd\[18540\]: Unable to negotiate with 112.85.42.176 port 48534: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\] |
2020-06-14 17:29:46 |