城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.194.171.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.194.171.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 21:44:42 CST 2025
;; MSG SIZE rcvd: 108
213.171.194.142.in-addr.arpa domain name pointer d213-nxnx01.pdi.allstream.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
213.171.194.142.in-addr.arpa name = d213-nxnx01.pdi.allstream.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.41.84.248 | attack | Dec 23 22:04:39 gutwein sshd[14533]: Failed password for invalid user jackloski from 14.41.84.248 port 55664 ssh2 Dec 23 22:04:39 gutwein sshd[14533]: Received disconnect from 14.41.84.248: 11: Bye Bye [preauth] Dec 23 22:19:21 gutwein sshd[17237]: Failed password for invalid user gautvik from 14.41.84.248 port 48326 ssh2 Dec 23 22:19:21 gutwein sshd[17237]: Received disconnect from 14.41.84.248: 11: Bye Bye [preauth] Dec 23 22:22:39 gutwein sshd[17826]: Failed password for invalid user connie from 14.41.84.248 port 54678 ssh2 Dec 23 22:22:39 gutwein sshd[17826]: Received disconnect from 14.41.84.248: 11: Bye Bye [preauth] Dec 23 22:25:50 gutwein sshd[18452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.41.84.248 user=r.r Dec 23 22:25:52 gutwein sshd[18452]: Failed password for r.r from 14.41.84.248 port 32804 ssh2 Dec 23 22:25:52 gutwein sshd[18452]: Received disconnect from 14.41.84.248: 11: Bye Bye [preauth] Dec 23 22:28........ ------------------------------- |
2019-12-24 08:57:42 |
| 58.244.255.24 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-12-24 09:16:59 |
| 51.75.191.195 | attackbotsspam | Unauthorised access (Dec 24) SRC=51.75.191.195 LEN=40 TTL=52 ID=35130 TCP DPT=8080 WINDOW=43780 SYN |
2019-12-24 09:07:18 |
| 84.254.57.45 | attackspambots | Dec 23 22:46:11 *** sshd[3432]: User root from 84.254.57.45 not allowed because not listed in AllowUsers |
2019-12-24 08:58:42 |
| 5.135.185.27 | attackspambots | Automatic report - Banned IP Access |
2019-12-24 09:02:06 |
| 218.92.0.172 | attackbotsspam | Dec 24 02:12:08 debian64 sshd\[26691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172 user=root Dec 24 02:12:11 debian64 sshd\[26691\]: Failed password for root from 218.92.0.172 port 53960 ssh2 Dec 24 02:12:14 debian64 sshd\[26691\]: Failed password for root from 218.92.0.172 port 53960 ssh2 ... |
2019-12-24 09:14:48 |
| 92.148.2.42 | attackspambots | [portscan] Port scan |
2019-12-24 09:01:34 |
| 103.209.20.36 | attack | Automatic report - Banned IP Access |
2019-12-24 08:59:24 |
| 212.64.67.116 | attack | Dec 24 04:55:14 work-partkepr sshd\[22026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.67.116 user=root Dec 24 04:55:16 work-partkepr sshd\[22026\]: Failed password for root from 212.64.67.116 port 58898 ssh2 ... |
2019-12-24 13:07:10 |
| 182.61.104.247 | attack | Dec 24 05:55:11 odroid64 sshd\[6815\]: User root from 182.61.104.247 not allowed because not listed in AllowUsers Dec 24 05:55:11 odroid64 sshd\[6815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.104.247 user=root ... |
2019-12-24 13:08:34 |
| 49.88.112.75 | attack | Dec 24 06:07:41 gw1 sshd[9083]: Failed password for root from 49.88.112.75 port 29536 ssh2 ... |
2019-12-24 09:09:04 |
| 51.15.207.74 | attack | Unauthorized connection attempt detected from IP address 51.15.207.74 to port 22 |
2019-12-24 08:59:12 |
| 200.87.178.137 | attack | 2019-12-24T04:55:10.119914homeassistant sshd[5658]: Invalid user server from 200.87.178.137 port 41632 2019-12-24T04:55:10.127203homeassistant sshd[5658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.87.178.137 ... |
2019-12-24 13:09:37 |
| 84.39.247.209 | attack | 1577147766 - 12/24/2019 01:36:06 Host: 84.39.247.209/84.39.247.209 Port: 445 TCP Blocked |
2019-12-24 09:17:13 |
| 117.82.129.230 | attack | Dec 23 23:45:07 localhost postfix/smtpd\[23808\]: warning: unknown\[117.82.129.230\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 23 23:45:15 localhost postfix/smtpd\[23616\]: warning: unknown\[117.82.129.230\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 23 23:45:29 localhost postfix/smtpd\[23808\]: warning: unknown\[117.82.129.230\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 23 23:45:44 localhost postfix/smtpd\[24023\]: warning: unknown\[117.82.129.230\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 23 23:45:52 localhost postfix/smtpd\[23808\]: warning: unknown\[117.82.129.230\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-24 09:16:07 |