城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.100.100.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;144.100.100.12. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 13:32:54 CST 2025
;; MSG SIZE rcvd: 107
Host 12.100.100.144.in-addr.arpa not found: 2(SERVFAIL)
server can't find 144.100.100.12.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 159.203.13.4 | attack | Automatic report - Banned IP Access |
2019-08-02 08:17:30 |
| 154.120.225.134 | attack | Aug 2 01:21:56 OPSO sshd\[4000\]: Invalid user sr from 154.120.225.134 port 47618 Aug 2 01:21:56 OPSO sshd\[4000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.120.225.134 Aug 2 01:21:58 OPSO sshd\[4000\]: Failed password for invalid user sr from 154.120.225.134 port 47618 ssh2 Aug 2 01:27:43 OPSO sshd\[4803\]: Invalid user otoniel from 154.120.225.134 port 45264 Aug 2 01:27:43 OPSO sshd\[4803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.120.225.134 |
2019-08-02 07:52:34 |
| 114.67.224.87 | attack | 2019-08-01T23:27:26.208914abusebot-6.cloudsearch.cf sshd\[24327\]: Invalid user factoria from 114.67.224.87 port 38000 |
2019-08-02 07:57:27 |
| 182.162.20.55 | attack | SMB Server BruteForce Attack |
2019-08-02 08:19:51 |
| 218.92.0.154 | attack | $f2bV_matches |
2019-08-02 08:03:43 |
| 178.128.75.154 | attack | Aug 2 01:26:38 vps647732 sshd[1439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.75.154 Aug 2 01:26:41 vps647732 sshd[1439]: Failed password for invalid user zapp from 178.128.75.154 port 45580 ssh2 ... |
2019-08-02 08:18:55 |
| 45.82.153.7 | attackbots | Excessive Port-Scanning |
2019-08-02 07:49:18 |
| 203.99.57.115 | attack | Aug 2 01:27:18 [host] sshd[1485]: Invalid user test from 203.99.57.115 Aug 2 01:27:18 [host] sshd[1485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.57.115 Aug 2 01:27:20 [host] sshd[1485]: Failed password for invalid user test from 203.99.57.115 port 19106 ssh2 |
2019-08-02 07:59:03 |
| 106.13.37.253 | attackspambots | Aug 2 00:14:39 localhost sshd\[58228\]: Invalid user samba from 106.13.37.253 port 54770 Aug 2 00:14:39 localhost sshd\[58228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.37.253 Aug 2 00:14:41 localhost sshd\[58228\]: Failed password for invalid user samba from 106.13.37.253 port 54770 ssh2 Aug 2 00:19:34 localhost sshd\[58350\]: Invalid user xue from 106.13.37.253 port 35258 Aug 2 00:19:34 localhost sshd\[58350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.37.253 ... |
2019-08-02 08:26:27 |
| 46.101.10.42 | attack | Aug 2 01:41:55 mail sshd\[20536\]: Invalid user ims from 46.101.10.42 Aug 2 01:41:55 mail sshd\[20536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.10.42 Aug 2 01:41:57 mail sshd\[20536\]: Failed password for invalid user ims from 46.101.10.42 port 37704 ssh2 ... |
2019-08-02 07:57:44 |
| 134.209.150.73 | attackbots | Aug 1 23:27:26 MK-Soft-VM3 sshd\[15845\]: Invalid user raravena from 134.209.150.73 port 51184 Aug 1 23:27:26 MK-Soft-VM3 sshd\[15845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.150.73 Aug 1 23:27:29 MK-Soft-VM3 sshd\[15845\]: Failed password for invalid user raravena from 134.209.150.73 port 51184 ssh2 ... |
2019-08-02 07:54:54 |
| 103.25.21.151 | attackspam | Aug 2 00:12:44 localhost sshd\[58174\]: Invalid user bob from 103.25.21.151 port 35511 Aug 2 00:12:44 localhost sshd\[58174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.25.21.151 Aug 2 00:12:47 localhost sshd\[58174\]: Failed password for invalid user bob from 103.25.21.151 port 35511 ssh2 Aug 2 00:17:49 localhost sshd\[58304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.25.21.151 user=daemon Aug 2 00:17:51 localhost sshd\[58304\]: Failed password for daemon from 103.25.21.151 port 32887 ssh2 ... |
2019-08-02 08:23:02 |
| 218.17.157.34 | attackspambots | Aug 2 01:27:45 ks10 sshd[4856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.157.34 Aug 2 01:27:47 ks10 sshd[4856]: Failed password for invalid user val from 218.17.157.34 port 61123 ssh2 ... |
2019-08-02 07:49:34 |
| 85.34.243.131 | attack | port scan and connect, tcp 80 (http) |
2019-08-02 08:20:44 |
| 31.10.38.170 | attack | Aug 2 00:45:47 debian sshd\[16797\]: Invalid user shubham from 31.10.38.170 port 10482 Aug 2 00:45:47 debian sshd\[16797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.10.38.170 ... |
2019-08-02 07:53:25 |