城市(city): Newcastle upon Tyne
省份(region): England
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.242.71.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;159.242.71.8. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 14:37:19 CST 2025
;; MSG SIZE rcvd: 105
Host 8.71.242.159.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 8.71.242.159.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 83.221.223.178 | attackbotsspam | Unauthorized connection attempt detected from IP address 83.221.223.178 to port 445 |
2020-02-12 02:01:32 |
| 45.55.188.133 | attack | Feb 11 16:46:38 pornomens sshd\[29624\]: Invalid user dah from 45.55.188.133 port 42775 Feb 11 16:46:38 pornomens sshd\[29624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.188.133 Feb 11 16:46:40 pornomens sshd\[29624\]: Failed password for invalid user dah from 45.55.188.133 port 42775 ssh2 ... |
2020-02-12 01:43:19 |
| 220.143.0.95 | attackspam | " " |
2020-02-12 02:25:07 |
| 144.131.134.105 | attackbotsspam | 2020-02-11T16:52:26.554976scmdmz1 sshd[14990]: Invalid user kcz from 144.131.134.105 port 53235 2020-02-11T16:52:26.558765scmdmz1 sshd[14990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-144-131-134-105.static.nsw.bigpond.net.au 2020-02-11T16:52:26.554976scmdmz1 sshd[14990]: Invalid user kcz from 144.131.134.105 port 53235 2020-02-11T16:52:28.866953scmdmz1 sshd[14990]: Failed password for invalid user kcz from 144.131.134.105 port 53235 ssh2 2020-02-11T16:56:56.384820scmdmz1 sshd[15449]: Invalid user ucr from 144.131.134.105 port 35056 ... |
2020-02-12 02:20:39 |
| 200.29.120.196 | attackbotsspam | Failed password for invalid user flr from 200.29.120.196 port 55872 ssh2 Invalid user rdr from 200.29.120.196 port 54390 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.120.196 Failed password for invalid user rdr from 200.29.120.196 port 54390 ssh2 Invalid user dzv from 200.29.120.196 port 52934 |
2020-02-12 01:51:17 |
| 212.237.57.82 | attackspambots | Feb 10 03:57:23 vpxxxxxxx22308 sshd[1905]: Invalid user rga from 212.237.57.82 Feb 10 03:57:23 vpxxxxxxx22308 sshd[1905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.57.82 Feb 10 03:57:25 vpxxxxxxx22308 sshd[1905]: Failed password for invalid user rga from 212.237.57.82 port 56892 ssh2 Feb 10 03:59:38 vpxxxxxxx22308 sshd[2299]: Invalid user jhe from 212.237.57.82 Feb 10 03:59:38 vpxxxxxxx22308 sshd[2299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.57.82 Feb 10 03:59:40 vpxxxxxxx22308 sshd[2299]: Failed password for invalid user jhe from 212.237.57.82 port 48658 ssh2 Feb 10 04:01:55 vpxxxxxxx22308 sshd[2776]: Invalid user knj from 212.237.57.82 Feb 10 04:01:55 vpxxxxxxx22308 sshd[2776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.57.82 Feb 10 04:01:58 vpxxxxxxx22308 sshd[2776]: Failed password for invalid user knj fro........ ------------------------------ |
2020-02-12 01:48:29 |
| 65.199.249.180 | attackspambots | Unauthorized connection attempt from IP address 65.199.249.180 on Port 445(SMB) |
2020-02-12 01:44:42 |
| 125.162.101.45 | attack | Honeypot hit. |
2020-02-12 01:41:08 |
| 186.250.48.17 | attackbots | Feb 11 16:18:31 MK-Soft-Root1 sshd[6961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.250.48.17 Feb 11 16:18:34 MK-Soft-Root1 sshd[6961]: Failed password for invalid user eel from 186.250.48.17 port 44338 ssh2 ... |
2020-02-12 02:15:04 |
| 60.208.121.230 | attackspam | Feb 11 18:53:01 legacy sshd[25261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.208.121.230 Feb 11 18:53:02 legacy sshd[25261]: Failed password for invalid user pab from 60.208.121.230 port 27496 ssh2 Feb 11 18:56:20 legacy sshd[25328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.208.121.230 ... |
2020-02-12 02:04:04 |
| 51.68.97.191 | attackbots | Feb 11 07:28:51 web9 sshd\[27863\]: Invalid user brm from 51.68.97.191 Feb 11 07:28:51 web9 sshd\[27863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.97.191 Feb 11 07:28:53 web9 sshd\[27863\]: Failed password for invalid user brm from 51.68.97.191 port 33798 ssh2 Feb 11 07:32:32 web9 sshd\[28510\]: Invalid user svp from 51.68.97.191 Feb 11 07:32:32 web9 sshd\[28510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.97.191 |
2020-02-12 01:58:31 |
| 41.41.142.73 | attackbotsspam | Unauthorized connection attempt from IP address 41.41.142.73 on Port 445(SMB) |
2020-02-12 01:41:32 |
| 46.105.31.249 | attackspambots | Feb 11 15:41:15 shared-1 sshd\[31713\]: Invalid user bot3 from 46.105.31.249Feb 11 15:41:35 shared-1 sshd\[31723\]: Invalid user bsd from 46.105.31.249 ... |
2020-02-12 01:53:43 |
| 218.92.0.199 | attackbots | Feb 11 18:49:32 vmanager6029 sshd\[16150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199 user=root Feb 11 18:49:34 vmanager6029 sshd\[16150\]: Failed password for root from 218.92.0.199 port 51409 ssh2 Feb 11 18:49:36 vmanager6029 sshd\[16150\]: Failed password for root from 218.92.0.199 port 51409 ssh2 |
2020-02-12 02:20:17 |
| 51.75.16.138 | attack | Feb 11 11:15:22 plusreed sshd[27338]: Invalid user rpb from 51.75.16.138 ... |
2020-02-12 02:01:53 |