城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.202.191.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.202.191.92. IN A
;; AUTHORITY SECTION:
. 597 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:01:58 CST 2022
;; MSG SIZE rcvd: 107
92.191.202.142.in-addr.arpa domain name pointer unassigned.142-202-191-92.pivo.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
92.191.202.142.in-addr.arpa name = unassigned.142-202-191-92.pivo.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.92.0.175 | attackbots | 2020-02-19T23:23:13.644031 sshd[3799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175 user=root 2020-02-19T23:23:16.513808 sshd[3799]: Failed password for root from 218.92.0.175 port 59791 ssh2 2020-02-19T23:23:21.703737 sshd[3799]: Failed password for root from 218.92.0.175 port 59791 ssh2 2020-02-19T23:23:13.644031 sshd[3799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175 user=root 2020-02-19T23:23:16.513808 sshd[3799]: Failed password for root from 218.92.0.175 port 59791 ssh2 2020-02-19T23:23:21.703737 sshd[3799]: Failed password for root from 218.92.0.175 port 59791 ssh2 ... |
2020-02-20 06:41:34 |
| 69.92.184.148 | attackbots | Feb 19 23:10:37 sd-53420 sshd\[29953\]: Invalid user at from 69.92.184.148 Feb 19 23:10:37 sd-53420 sshd\[29953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.92.184.148 Feb 19 23:10:38 sd-53420 sshd\[29953\]: Failed password for invalid user at from 69.92.184.148 port 38256 ssh2 Feb 19 23:13:45 sd-53420 sshd\[30251\]: Invalid user nxroot from 69.92.184.148 Feb 19 23:13:45 sd-53420 sshd\[30251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.92.184.148 ... |
2020-02-20 06:50:05 |
| 106.12.33.181 | attackbots | Feb 19 23:30:17 legacy sshd[3308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.181 Feb 19 23:30:19 legacy sshd[3308]: Failed password for invalid user zanron from 106.12.33.181 port 57458 ssh2 Feb 19 23:37:41 legacy sshd[3495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.181 ... |
2020-02-20 06:58:03 |
| 196.192.110.64 | attack | Feb 19 12:25:15 hpm sshd\[3087\]: Invalid user ljh from 196.192.110.64 Feb 19 12:25:15 hpm sshd\[3087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.192.110.64 Feb 19 12:25:16 hpm sshd\[3087\]: Failed password for invalid user ljh from 196.192.110.64 port 47226 ssh2 Feb 19 12:29:13 hpm sshd\[3459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.192.110.64 user=news Feb 19 12:29:15 hpm sshd\[3459\]: Failed password for news from 196.192.110.64 port 49720 ssh2 |
2020-02-20 06:36:49 |
| 41.231.8.214 | attackspam | Feb 19 18:57:51 ws19vmsma01 sshd[211170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.231.8.214 Feb 19 18:57:54 ws19vmsma01 sshd[211170]: Failed password for invalid user sinusbot from 41.231.8.214 port 57408 ssh2 ... |
2020-02-20 06:42:42 |
| 89.36.213.80 | attack | TCP port 3389: Scan and connection |
2020-02-20 06:51:31 |
| 196.11.231.220 | attackbots | Feb 19 12:20:29 web9 sshd\[31994\]: Invalid user rstudio-server from 196.11.231.220 Feb 19 12:20:29 web9 sshd\[31994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.11.231.220 Feb 19 12:20:31 web9 sshd\[31994\]: Failed password for invalid user rstudio-server from 196.11.231.220 port 46926 ssh2 Feb 19 12:23:09 web9 sshd\[32365\]: Invalid user info from 196.11.231.220 Feb 19 12:23:09 web9 sshd\[32365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.11.231.220 |
2020-02-20 06:58:25 |
| 222.186.30.145 | attack | Feb 20 04:27:00 areeb-Workstation sshd[18866]: Failed password for root from 222.186.30.145 port 54326 ssh2 Feb 20 04:27:03 areeb-Workstation sshd[18866]: Failed password for root from 222.186.30.145 port 54326 ssh2 ... |
2020-02-20 06:57:20 |
| 192.241.175.48 | attack | Invalid user luan from 192.241.175.48 port 39552 |
2020-02-20 06:50:22 |
| 112.85.42.176 | attack | Feb 19 17:56:59 plusreed sshd[31051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root Feb 19 17:57:01 plusreed sshd[31051]: Failed password for root from 112.85.42.176 port 29598 ssh2 ... |
2020-02-20 07:03:18 |
| 49.88.112.112 | attackbotsspam | February 19 2020, 22:35:43 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban. |
2020-02-20 06:43:29 |
| 71.107.31.98 | attack | Feb 19 22:58:16 nextcloud sshd\[29487\]: Invalid user pai from 71.107.31.98 Feb 19 22:58:16 nextcloud sshd\[29487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.107.31.98 Feb 19 22:58:18 nextcloud sshd\[29487\]: Failed password for invalid user pai from 71.107.31.98 port 35568 ssh2 |
2020-02-20 06:25:56 |
| 222.186.15.166 | attackbotsspam | Feb 19 12:34:06 auw2 sshd\[5651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166 user=root Feb 19 12:34:08 auw2 sshd\[5651\]: Failed password for root from 222.186.15.166 port 28433 ssh2 Feb 19 12:43:34 auw2 sshd\[6622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166 user=root Feb 19 12:43:36 auw2 sshd\[6622\]: Failed password for root from 222.186.15.166 port 26404 ssh2 Feb 19 12:43:38 auw2 sshd\[6622\]: Failed password for root from 222.186.15.166 port 26404 ssh2 |
2020-02-20 06:45:08 |
| 222.186.173.183 | attackspam | Feb 19 23:53:52 dedicated sshd[5373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183 user=root Feb 19 23:53:54 dedicated sshd[5373]: Failed password for root from 222.186.173.183 port 57642 ssh2 |
2020-02-20 06:56:22 |
| 45.133.99.130 | attackspam | Feb 19 23:33:15 relay postfix/smtpd\[22497\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 19 23:34:34 relay postfix/smtpd\[28885\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 19 23:34:52 relay postfix/smtpd\[28885\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 19 23:44:40 relay postfix/smtpd\[27417\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 19 23:45:00 relay postfix/smtpd\[28885\]: warning: unknown\[45.133.99.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-02-20 06:52:08 |