城市(city): unknown
省份(region): unknown
国家(country): Netherlands
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.114.40.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2692
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.114.40.130. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051900 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 20 00:35:04 CST 2019
;; MSG SIZE rcvd: 118
130.40.114.145.in-addr.arpa domain name pointer surfnet-nl.ipv4.ptr.145.114.x.invalid.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
130.40.114.145.in-addr.arpa name = surfnet-nl.ipv4.ptr.145.114.x.invalid.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.204.1.63 | attackspambots | Dec 8 14:58:40 mail sshd[14029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.204.1.63 Dec 8 14:58:42 mail sshd[14029]: Failed password for invalid user guest from 45.204.1.63 port 47546 ssh2 Dec 8 15:05:24 mail sshd[16025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.204.1.63 |
2019-12-10 08:46:57 |
| 218.92.0.141 | attack | Dec 10 06:07:11 vibhu-HP-Z238-Microtower-Workstation sshd\[25214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.141 user=root Dec 10 06:07:12 vibhu-HP-Z238-Microtower-Workstation sshd\[25214\]: Failed password for root from 218.92.0.141 port 59817 ssh2 Dec 10 06:07:31 vibhu-HP-Z238-Microtower-Workstation sshd\[25233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.141 user=root Dec 10 06:07:33 vibhu-HP-Z238-Microtower-Workstation sshd\[25233\]: Failed password for root from 218.92.0.141 port 26309 ssh2 Dec 10 06:07:36 vibhu-HP-Z238-Microtower-Workstation sshd\[25233\]: Failed password for root from 218.92.0.141 port 26309 ssh2 ... |
2019-12-10 08:42:47 |
| 112.85.42.177 | attack | Dec 8 20:52:13 mail sshd[32085]: Failed password for root from 112.85.42.177 port 48674 ssh2 Dec 8 20:52:18 mail sshd[32085]: Failed password for root from 112.85.42.177 port 48674 ssh2 Dec 8 20:52:23 mail sshd[32085]: Failed password for root from 112.85.42.177 port 48674 ssh2 Dec 8 20:52:26 mail sshd[32085]: Failed password for root from 112.85.42.177 port 48674 ssh2 |
2019-12-10 08:55:44 |
| 180.76.119.77 | attackbots | Dec 10 00:15:04 cp sshd[10993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.119.77 |
2019-12-10 08:31:39 |
| 124.156.240.118 | attackspam | firewall-block, port(s): 7199/tcp |
2019-12-10 08:34:01 |
| 46.163.179.66 | attack | Dec 8 14:36:37 mail postfix/smtpd[8750]: warning: unknown[46.163.179.66]: SASL PLAIN authentication failed: Dec 8 14:38:22 mail postfix/smtpd[8448]: warning: unknown[46.163.179.66]: SASL PLAIN authentication failed: Dec 8 14:44:49 mail postfix/smtpd[9883]: warning: unknown[46.163.179.66]: SASL PLAIN authentication failed: |
2019-12-10 08:46:33 |
| 218.93.27.230 | attackbotsspam | Dec 10 00:15:07 MK-Soft-VM3 sshd[23236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.93.27.230 Dec 10 00:15:08 MK-Soft-VM3 sshd[23236]: Failed password for invalid user lisa from 218.93.27.230 port 44678 ssh2 ... |
2019-12-10 08:26:32 |
| 61.177.172.128 | attackbotsspam | Dec 10 01:45:55 fr01 sshd[2260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128 user=root Dec 10 01:45:57 fr01 sshd[2260]: Failed password for root from 61.177.172.128 port 3675 ssh2 ... |
2019-12-10 08:46:16 |
| 182.61.14.161 | attack | Dec 10 07:21:56 webhost01 sshd[21447]: Failed password for root from 182.61.14.161 port 39207 ssh2 Dec 10 07:27:55 webhost01 sshd[21592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.161 ... |
2019-12-10 08:31:17 |
| 222.186.190.2 | attackbots | Dec 10 01:23:27 minden010 sshd[16326]: Failed password for root from 222.186.190.2 port 6304 ssh2 Dec 10 01:23:30 minden010 sshd[16326]: Failed password for root from 222.186.190.2 port 6304 ssh2 Dec 10 01:23:34 minden010 sshd[16326]: Failed password for root from 222.186.190.2 port 6304 ssh2 Dec 10 01:23:37 minden010 sshd[16326]: Failed password for root from 222.186.190.2 port 6304 ssh2 ... |
2019-12-10 08:26:12 |
| 14.186.252.188 | attackspam | Dec 8 14:19:31 mail postfix/smtpd[5022]: warning: unknown[14.186.252.188]: SASL PLAIN authentication failed: Dec 8 14:22:10 mail postfix/smtps/smtpd[31248]: warning: unknown[14.186.252.188]: SASL PLAIN authentication failed: Dec 8 14:27:21 mail postfix/smtpd[7510]: warning: unknown[14.186.252.188]: SASL PLAIN authentication failed: |
2019-12-10 08:47:12 |
| 222.186.180.8 | attackspambots | Dec 10 01:31:01 ns381471 sshd[25066]: Failed password for root from 222.186.180.8 port 1506 ssh2 Dec 10 01:31:15 ns381471 sshd[25066]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 1506 ssh2 [preauth] |
2019-12-10 08:33:33 |
| 114.47.164.52 | attackspambots | Unauthorized connection attempt from IP address 114.47.164.52 on Port 445(SMB) |
2019-12-10 08:28:03 |
| 193.255.125.165 | attackspam | Brute force attempt |
2019-12-10 08:43:52 |
| 94.23.218.74 | attack | Dec 9 16:10:45 home sshd[5589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.218.74 user=root Dec 9 16:10:47 home sshd[5589]: Failed password for root from 94.23.218.74 port 33522 ssh2 Dec 9 16:18:31 home sshd[5640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.218.74 user=root Dec 9 16:18:32 home sshd[5640]: Failed password for root from 94.23.218.74 port 51804 ssh2 Dec 9 16:23:15 home sshd[5670]: Invalid user kerxhalli from 94.23.218.74 port 57854 Dec 9 16:23:15 home sshd[5670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.218.74 Dec 9 16:23:15 home sshd[5670]: Invalid user kerxhalli from 94.23.218.74 port 57854 Dec 9 16:23:17 home sshd[5670]: Failed password for invalid user kerxhalli from 94.23.218.74 port 57854 ssh2 Dec 9 16:28:02 home sshd[5711]: Invalid user gerberding from 94.23.218.74 port 35780 Dec 9 16:28:02 home sshd[5711]: pam_unix(sshd:aut |
2019-12-10 08:20:59 |