城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.4.54.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.4.54.105. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:41:45 CST 2025
;; MSG SIZE rcvd: 105
105.54.4.149.in-addr.arpa domain name pointer DRTH-RA108-EW.qc.cuny.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
105.54.4.149.in-addr.arpa name = DRTH-RA108-EW.qc.cuny.edu.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 190.223.26.38 | attack | Sep 22 14:56:58 s64-1 sshd[2763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.223.26.38 Sep 22 14:57:00 s64-1 sshd[2763]: Failed password for invalid user ts from 190.223.26.38 port 9752 ssh2 Sep 22 15:02:15 s64-1 sshd[2846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.223.26.38 ... |
2019-09-22 21:54:50 |
| 193.56.28.213 | attackbotsspam | Sep 22 12:46:34 heicom postfix/smtpd\[12944\]: warning: unknown\[193.56.28.213\]: SASL LOGIN authentication failed: authentication failure Sep 22 12:46:35 heicom postfix/smtpd\[12944\]: warning: unknown\[193.56.28.213\]: SASL LOGIN authentication failed: authentication failure Sep 22 12:46:35 heicom postfix/smtpd\[12944\]: warning: unknown\[193.56.28.213\]: SASL LOGIN authentication failed: authentication failure Sep 22 12:46:35 heicom postfix/smtpd\[12944\]: warning: unknown\[193.56.28.213\]: SASL LOGIN authentication failed: authentication failure Sep 22 12:46:35 heicom postfix/smtpd\[12944\]: warning: unknown\[193.56.28.213\]: SASL LOGIN authentication failed: authentication failure ... |
2019-09-22 21:53:17 |
| 128.199.162.2 | attackbots | Sep 22 03:40:36 sachi sshd\[10798\]: Invalid user mud from 128.199.162.2 Sep 22 03:40:36 sachi sshd\[10798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2 Sep 22 03:40:37 sachi sshd\[10798\]: Failed password for invalid user mud from 128.199.162.2 port 60520 ssh2 Sep 22 03:45:57 sachi sshd\[11264\]: Invalid user luca from 128.199.162.2 Sep 22 03:45:57 sachi sshd\[11264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2 |
2019-09-22 21:55:16 |
| 37.187.181.182 | attackbots | Sep 22 03:00:20 hiderm sshd\[1987\]: Invalid user 123456 from 37.187.181.182 Sep 22 03:00:20 hiderm sshd\[1987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.ip-37-187-181.eu Sep 22 03:00:21 hiderm sshd\[1987\]: Failed password for invalid user 123456 from 37.187.181.182 port 52954 ssh2 Sep 22 03:04:21 hiderm sshd\[2355\]: Invalid user ew@123 from 37.187.181.182 Sep 22 03:04:21 hiderm sshd\[2355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.ip-37-187-181.eu |
2019-09-22 21:20:23 |
| 180.76.246.38 | attack | Sep 22 09:12:34 ny01 sshd[15746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.38 Sep 22 09:12:36 ny01 sshd[15746]: Failed password for invalid user vicky from 180.76.246.38 port 45222 ssh2 Sep 22 09:17:22 ny01 sshd[16866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.38 |
2019-09-22 21:32:37 |
| 203.121.116.11 | attackbots | Sep 22 03:52:40 hcbb sshd\[18235\]: Invalid user admin from 203.121.116.11 Sep 22 03:52:40 hcbb sshd\[18235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.121.116.11 Sep 22 03:52:41 hcbb sshd\[18235\]: Failed password for invalid user admin from 203.121.116.11 port 38079 ssh2 Sep 22 03:57:43 hcbb sshd\[18668\]: Invalid user zx from 203.121.116.11 Sep 22 03:57:43 hcbb sshd\[18668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.121.116.11 |
2019-09-22 22:00:46 |
| 46.101.77.58 | attackbotsspam | $f2bV_matches |
2019-09-22 21:24:01 |
| 93.42.126.148 | attackbots | Sep 22 13:11:55 hcbbdb sshd\[24224\]: Invalid user dd from 93.42.126.148 Sep 22 13:11:55 hcbbdb sshd\[24224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-42-126-148.ip86.fastwebnet.it Sep 22 13:11:57 hcbbdb sshd\[24224\]: Failed password for invalid user dd from 93.42.126.148 port 46872 ssh2 Sep 22 13:16:42 hcbbdb sshd\[24812\]: Invalid user aDmin from 93.42.126.148 Sep 22 13:16:42 hcbbdb sshd\[24812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-42-126-148.ip86.fastwebnet.it |
2019-09-22 21:30:59 |
| 37.59.195.106 | attackspambots | Sep 21 09:53:02 garuda sshd[958994]: Invalid user abass from 37.59.195.106 Sep 21 09:53:04 garuda sshd[958994]: Failed password for invalid user abass from 37.59.195.106 port 60174 ssh2 Sep 21 09:53:06 garuda sshd[958994]: Failed password for invalid user abass from 37.59.195.106 port 60174 ssh2 Sep 21 09:53:07 garuda sshd[958994]: Connection closed by 37.59.195.106 [preauth] Sep 21 09:53:09 garuda sshd[959004]: Invalid user abba from 37.59.195.106 Sep 21 09:53:11 garuda sshd[959004]: Failed password for invalid user abba from 37.59.195.106 port 37662 ssh2 Sep 21 09:53:13 garuda sshd[959004]: Failed password for invalid user abba from 37.59.195.106 port 37662 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=37.59.195.106 |
2019-09-22 21:39:50 |
| 134.209.98.248 | attackbotsspam | Sep 21 11:49:39 fv15 sshd[12418]: Failed password for invalid user amazon from 134.209.98.248 port 55516 ssh2 Sep 21 11:49:40 fv15 sshd[12418]: Received disconnect from 134.209.98.248: 11: Bye Bye [preauth] Sep 21 11:54:05 fv15 sshd[19283]: Failed password for invalid user em3-user from 134.209.98.248 port 40964 ssh2 Sep 21 11:54:06 fv15 sshd[19283]: Received disconnect from 134.209.98.248: 11: Bye Bye [preauth] Sep 21 11:58:15 fv15 sshd[25907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.98.248 user=games Sep 21 11:58:17 fv15 sshd[25907]: Failed password for games from 134.209.98.248 port 52816 ssh2 Sep 21 11:58:17 fv15 sshd[25907]: Received disconnect from 134.209.98.248: 11: Bye Bye [preauth] Sep 21 12:02:23 fv15 sshd[12600]: Failed password for invalid user scrappy from 134.209.98.248 port 36434 ssh2 Sep 21 12:02:23 fv15 sshd[12600]: Received disconnect from 134.209.98.248: 11: Bye Bye [preauth] Sep 21 12:06:31 fv........ ------------------------------- |
2019-09-22 21:51:15 |
| 37.187.122.195 | attack | Sep 22 15:36:31 MK-Soft-VM7 sshd[1988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.122.195 Sep 22 15:36:33 MK-Soft-VM7 sshd[1988]: Failed password for invalid user cv from 37.187.122.195 port 37320 ssh2 ... |
2019-09-22 21:44:08 |
| 110.43.42.244 | attack | Sep 22 15:38:28 eventyay sshd[23804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.42.244 Sep 22 15:38:30 eventyay sshd[23804]: Failed password for invalid user vn from 110.43.42.244 port 38792 ssh2 Sep 22 15:41:54 eventyay sshd[23887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.42.244 ... |
2019-09-22 21:56:37 |
| 51.38.125.51 | attack | Sep 22 15:02:53 SilenceServices sshd[14423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.125.51 Sep 22 15:02:55 SilenceServices sshd[14423]: Failed password for invalid user eaugustt from 51.38.125.51 port 36384 ssh2 Sep 22 15:06:45 SilenceServices sshd[15504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.125.51 |
2019-09-22 21:18:18 |
| 171.232.249.225 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/171.232.249.225/ GB - 1H : (56) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : GB NAME ASN : ASN7552 IP : 171.232.249.225 CIDR : 171.232.240.0/20 PREFIX COUNT : 3319 UNIQUE IP COUNT : 5214720 WYKRYTE ATAKI Z ASN7552 : 1H - 1 3H - 3 6H - 5 12H - 11 24H - 17 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery |
2019-09-22 21:43:10 |
| 190.161.19.212 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/190.161.19.212/ US - 1H : (322) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : US NAME ASN : ASN22047 IP : 190.161.19.212 CIDR : 190.161.16.0/20 PREFIX COUNT : 389 UNIQUE IP COUNT : 1379584 WYKRYTE ATAKI Z ASN22047 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery |
2019-09-22 21:59:10 |