城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.34.111.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;143.34.111.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:02:29 CST 2025
;; MSG SIZE rcvd: 106
Host 42.111.34.143.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.111.34.143.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.92.0.165 | attack | Aug 11 17:53:24 db sshd[1495]: User root from 218.92.0.165 not allowed because none of user's groups are listed in AllowGroups ... |
2020-08-11 23:58:19 |
| 106.52.93.202 | attackspambots | Aug 10 14:06:05 host sshd[8439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.202 user=r.r Aug 10 14:06:08 host sshd[8439]: Failed password for r.r from 106.52.93.202 port 42958 ssh2 Aug 10 14:06:08 host sshd[8439]: Received disconnect from 106.52.93.202: 11: Bye Bye [preauth] Aug 10 14:23:49 host sshd[997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.202 user=r.r Aug 10 14:23:51 host sshd[997]: Failed password for r.r from 106.52.93.202 port 46568 ssh2 Aug 10 14:23:51 host sshd[997]: Received disconnect from 106.52.93.202: 11: Bye Bye [preauth] Aug 10 14:27:02 host sshd[10310]: Connection closed by 106.52.93.202 [preauth] Aug 10 14:30:02 host sshd[20199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.93.202 user=r.r Aug 10 14:30:04 host sshd[20199]: Failed password for r.r from 106.52.93.202 port 48242 ssh2 Aug 1........ ------------------------------- |
2020-08-12 00:27:50 |
| 190.145.12.233 | attackspam | Aug 11 12:06:10 124388 sshd[17012]: Failed password for root from 190.145.12.233 port 47934 ssh2 Aug 11 12:07:51 124388 sshd[17081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.12.233 user=root Aug 11 12:07:53 124388 sshd[17081]: Failed password for root from 190.145.12.233 port 46386 ssh2 Aug 11 12:09:43 124388 sshd[17336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.12.233 user=root Aug 11 12:09:45 124388 sshd[17336]: Failed password for root from 190.145.12.233 port 44836 ssh2 |
2020-08-12 00:30:45 |
| 62.148.142.202 | attackbotsspam | $f2bV_matches |
2020-08-11 23:45:58 |
| 101.36.178.48 | attackbots | (sshd) Failed SSH login from 101.36.178.48 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 11 13:52:03 grace sshd[23818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.178.48 user=root Aug 11 13:52:05 grace sshd[23818]: Failed password for root from 101.36.178.48 port 60575 ssh2 Aug 11 14:05:37 grace sshd[26135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.178.48 user=root Aug 11 14:05:39 grace sshd[26135]: Failed password for root from 101.36.178.48 port 25690 ssh2 Aug 11 14:09:39 grace sshd[27054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.178.48 user=root |
2020-08-12 00:33:06 |
| 106.51.113.15 | attackspambots | 2020-08-11T15:07:11.034769lavrinenko.info sshd[18753]: Failed password for root from 106.51.113.15 port 46020 ssh2 2020-08-11T15:08:45.233829lavrinenko.info sshd[18901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.113.15 user=root 2020-08-11T15:08:47.213882lavrinenko.info sshd[18901]: Failed password for root from 106.51.113.15 port 57578 ssh2 2020-08-11T15:10:28.089966lavrinenko.info sshd[18946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.113.15 user=root 2020-08-11T15:10:30.541937lavrinenko.info sshd[18946]: Failed password for root from 106.51.113.15 port 41161 ssh2 ... |
2020-08-11 23:50:06 |
| 209.151.153.32 | attackspambots | tcp 445 |
2020-08-11 23:47:03 |
| 210.56.23.100 | attackspambots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-11T13:52:21Z and 2020-08-11T14:02:02Z |
2020-08-12 00:05:01 |
| 222.186.15.158 | attackbotsspam | Aug 11 12:08:00 NPSTNNYC01T sshd[9267]: Failed password for root from 222.186.15.158 port 55889 ssh2 Aug 11 12:16:28 NPSTNNYC01T sshd[10336]: Failed password for root from 222.186.15.158 port 24115 ssh2 Aug 11 12:16:30 NPSTNNYC01T sshd[10336]: Failed password for root from 222.186.15.158 port 24115 ssh2 ... |
2020-08-12 00:22:14 |
| 180.76.102.226 | attackspam | Aug 11 17:22:42 inter-technics sshd[10926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.102.226 user=root Aug 11 17:22:44 inter-technics sshd[10926]: Failed password for root from 180.76.102.226 port 49206 ssh2 Aug 11 17:23:46 inter-technics sshd[10960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.102.226 user=root Aug 11 17:23:48 inter-technics sshd[10960]: Failed password for root from 180.76.102.226 port 57214 ssh2 Aug 11 17:24:39 inter-technics sshd[11003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.102.226 user=root Aug 11 17:24:41 inter-technics sshd[11003]: Failed password for root from 180.76.102.226 port 36988 ssh2 ... |
2020-08-11 23:51:36 |
| 101.72.6.171 | attackbotsspam | Unauthorised access (Aug 11) SRC=101.72.6.171 LEN=40 TTL=46 ID=51274 TCP DPT=8080 WINDOW=49496 SYN Unauthorised access (Aug 11) SRC=101.72.6.171 LEN=40 TTL=46 ID=32622 TCP DPT=8080 WINDOW=47963 SYN Unauthorised access (Aug 10) SRC=101.72.6.171 LEN=40 TTL=46 ID=39546 TCP DPT=8080 WINDOW=49496 SYN Unauthorised access (Aug 10) SRC=101.72.6.171 LEN=40 TTL=46 ID=34722 TCP DPT=8080 WINDOW=49496 SYN |
2020-08-11 23:59:23 |
| 80.20.133.206 | attack | 2020-08-11T16:23:35.312449mail.standpoint.com.ua sshd[24920]: Failed password for root from 80.20.133.206 port 43826 ssh2 2020-08-11T16:23:47.789451mail.standpoint.com.ua sshd[24946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-80-20-133-206.business.telecomitalia.it user=root 2020-08-11T16:23:49.844194mail.standpoint.com.ua sshd[24946]: Failed password for root from 80.20.133.206 port 44562 ssh2 2020-08-11T16:24:00.265137mail.standpoint.com.ua sshd[24974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-80-20-133-206.business.telecomitalia.it user=root 2020-08-11T16:24:02.130599mail.standpoint.com.ua sshd[24974]: Failed password for root from 80.20.133.206 port 45296 ssh2 ... |
2020-08-12 00:06:22 |
| 24.230.41.86 | attack | Brute forcing email accounts |
2020-08-11 23:45:07 |
| 66.70.130.155 | attackbots | Aug 11 17:15:25 rancher-0 sshd[996421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.155 user=root Aug 11 17:15:26 rancher-0 sshd[996421]: Failed password for root from 66.70.130.155 port 55982 ssh2 ... |
2020-08-12 00:01:08 |
| 68.183.193.148 | attackbotsspam | Aug 11 16:26:21 vps639187 sshd\[9666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148 user=root Aug 11 16:26:23 vps639187 sshd\[9666\]: Failed password for root from 68.183.193.148 port 56854 ssh2 Aug 11 16:30:34 vps639187 sshd\[9743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148 user=root ... |
2020-08-11 23:48:47 |