城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.39.192.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;161.39.192.99. IN A
;; AUTHORITY SECTION:
. 370 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 04:20:21 CST 2022
;; MSG SIZE rcvd: 106
Host 99.192.39.161.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 99.192.39.161.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 198.245.49.37 | attack | Jul 12 07:30:02 eventyay sshd[26942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.49.37 Jul 12 07:30:04 eventyay sshd[26942]: Failed password for invalid user pdf from 198.245.49.37 port 60744 ssh2 Jul 12 07:35:00 eventyay sshd[28225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.49.37 ... |
2019-07-12 13:39:57 |
| 92.118.161.13 | attackbotsspam | Unauthorised access (Jul 12) SRC=92.118.161.13 LEN=44 TTL=238 ID=54248 TCP DPT=138 WINDOW=1024 SYN |
2019-07-12 13:50:51 |
| 118.24.57.53 | attack | Jul 12 00:52:11 aat-srv002 sshd[4266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.57.53 Jul 12 00:52:13 aat-srv002 sshd[4266]: Failed password for invalid user user from 118.24.57.53 port 52324 ssh2 Jul 12 00:54:27 aat-srv002 sshd[4349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.57.53 Jul 12 00:54:29 aat-srv002 sshd[4349]: Failed password for invalid user ubuntu from 118.24.57.53 port 43802 ssh2 ... |
2019-07-12 14:11:08 |
| 118.98.96.184 | attack | Jul 12 06:39:00 tux-35-217 sshd\[31823\]: Invalid user ubuntu from 118.98.96.184 port 42099 Jul 12 06:39:00 tux-35-217 sshd\[31823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.96.184 Jul 12 06:39:02 tux-35-217 sshd\[31823\]: Failed password for invalid user ubuntu from 118.98.96.184 port 42099 ssh2 Jul 12 06:45:07 tux-35-217 sshd\[31871\]: Invalid user filip from 118.98.96.184 port 41346 Jul 12 06:45:07 tux-35-217 sshd\[31871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.96.184 ... |
2019-07-12 13:25:41 |
| 211.240.105.132 | attack | Jul 12 07:36:21 vps647732 sshd[6114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.240.105.132 Jul 12 07:36:22 vps647732 sshd[6114]: Failed password for invalid user etherpad-lite from 211.240.105.132 port 37148 ssh2 ... |
2019-07-12 13:51:15 |
| 111.231.75.83 | attack | Mar 8 21:18:03 vtv3 sshd\[11997\]: Invalid user ha from 111.231.75.83 port 60840 Mar 8 21:18:03 vtv3 sshd\[11997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83 Mar 8 21:18:06 vtv3 sshd\[11997\]: Failed password for invalid user ha from 111.231.75.83 port 60840 ssh2 Mar 8 21:26:38 vtv3 sshd\[15418\]: Invalid user jj from 111.231.75.83 port 33636 Mar 8 21:26:38 vtv3 sshd\[15418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83 Mar 22 23:32:45 vtv3 sshd\[20153\]: Invalid user jz from 111.231.75.83 port 47686 Mar 22 23:32:45 vtv3 sshd\[20153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83 Mar 22 23:32:46 vtv3 sshd\[20153\]: Failed password for invalid user jz from 111.231.75.83 port 47686 ssh2 Mar 22 23:40:57 vtv3 sshd\[23662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.75.83 |
2019-07-12 13:27:07 |
| 66.240.236.119 | attackspambots | NAME : NET-26 CIDR : 66.240.192.128/26 | EMAIL - SPAM {Looking for resource vulnerabilities} DDoS Attack USA - California - block certain countries :) IP: 66.240.236.119 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-07-12 13:35:36 |
| 202.69.66.130 | attackbotsspam | Jul 12 05:24:36 localhost sshd\[8425\]: Invalid user gk from 202.69.66.130 port 12138 Jul 12 05:24:36 localhost sshd\[8425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.69.66.130 Jul 12 05:24:38 localhost sshd\[8425\]: Failed password for invalid user gk from 202.69.66.130 port 12138 ssh2 Jul 12 05:29:45 localhost sshd\[8454\]: Invalid user vaibhav from 202.69.66.130 port 42895 Jul 12 05:29:45 localhost sshd\[8454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.69.66.130 ... |
2019-07-12 13:46:44 |
| 54.38.184.10 | attackbotsspam | Jul 12 07:08:35 localhost sshd\[2575\]: Invalid user test1 from 54.38.184.10 port 36846 Jul 12 07:08:35 localhost sshd\[2575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.184.10 Jul 12 07:08:37 localhost sshd\[2575\]: Failed password for invalid user test1 from 54.38.184.10 port 36846 ssh2 |
2019-07-12 13:36:38 |
| 157.230.254.249 | attackbots | 23/tcp [2019-07-12]1pkt |
2019-07-12 14:04:48 |
| 122.195.200.148 | attackspambots | Too many connections or unauthorized access detected from Arctic banned ip |
2019-07-12 13:43:02 |
| 212.64.39.109 | attackbotsspam | Jul 12 07:07:55 eventyay sshd[21164]: Failed password for root from 212.64.39.109 port 57116 ssh2 Jul 12 07:13:30 eventyay sshd[22715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.39.109 Jul 12 07:13:31 eventyay sshd[22715]: Failed password for invalid user postgres from 212.64.39.109 port 48034 ssh2 ... |
2019-07-12 13:16:03 |
| 51.83.72.243 | attackbots | Jul 12 06:27:28 localhost sshd\[54503\]: Invalid user tan from 51.83.72.243 port 47856 Jul 12 06:27:28 localhost sshd\[54503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.243 ... |
2019-07-12 13:38:08 |
| 120.132.117.254 | attackspam | Jul 12 01:23:19 vps200512 sshd\[6391\]: Invalid user terraria from 120.132.117.254 Jul 12 01:23:19 vps200512 sshd\[6391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.117.254 Jul 12 01:23:22 vps200512 sshd\[6391\]: Failed password for invalid user terraria from 120.132.117.254 port 35372 ssh2 Jul 12 01:29:34 vps200512 sshd\[6531\]: Invalid user webapps from 120.132.117.254 Jul 12 01:29:34 vps200512 sshd\[6531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.117.254 |
2019-07-12 13:45:16 |
| 138.255.148.5 | attackbots | 2019-07-12T01:56:53.061091mail01 postfix/smtpd[4414]: warning: 5.148.255.138.clicfacilitb.com.br[138.255.148.5]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-07-12T01:57:00.423487mail01 postfix/smtpd[11248]: warning: 5.148.255.138.clicfacilitb.com.br[138.255.148.5]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-07-12T01:59:48.495639mail01 postfix/smtpd[17219]: warning: 5.148.255.138.clicfacilitb.com.br[138.255.148.5]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-07-12 13:24:38 |