城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.243.117.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;163.243.117.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:40:54 CST 2025
;; MSG SIZE rcvd: 108
Host 134.117.243.163.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 134.117.243.163.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.59.14.136 | attackbots | Jun 26 14:17:08 saturn sshd[434919]: Failed password for root from 139.59.14.136 port 60000 ssh2 Jun 26 14:22:34 saturn sshd[435116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.14.136 user=root Jun 26 14:22:36 saturn sshd[435116]: Failed password for root from 139.59.14.136 port 60530 ssh2 ... |
2020-06-27 00:24:52 |
| 168.138.196.255 | attackspambots | Jun 26 13:00:19 rocket sshd[10873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.196.255 Jun 26 13:00:21 rocket sshd[10873]: Failed password for invalid user ftpuser from 168.138.196.255 port 55490 ssh2 ... |
2020-06-26 23:45:33 |
| 189.4.2.58 | attackspambots | 2020-06-24 23:09:13 server sshd[66701]: Failed password for invalid user juergen from 189.4.2.58 port 45668 ssh2 |
2020-06-26 23:38:44 |
| 80.82.77.245 | attackbots | 80.82.77.245 was recorded 6 times by 5 hosts attempting to connect to the following ports: 120,53. Incident counter (4h, 24h, all-time): 6, 51, 24545 |
2020-06-26 23:38:14 |
| 157.230.112.34 | attackspam | SSH Bruteforce attack |
2020-06-27 00:12:40 |
| 159.65.111.89 | attackspambots | Jun 26 17:48:20 mout sshd[25330]: Invalid user tom from 159.65.111.89 port 33408 |
2020-06-26 23:59:52 |
| 106.243.2.244 | attackspambots | Jun 26 13:22:20 pve1 sshd[1593]: Failed password for root from 106.243.2.244 port 45088 ssh2 ... |
2020-06-27 00:23:10 |
| 39.104.50.53 | attackspambots | 20 attempts against mh-ssh on wheat |
2020-06-26 23:34:21 |
| 145.239.78.59 | attackspambots | $f2bV_matches |
2020-06-27 00:21:16 |
| 200.66.82.250 | attackspambots | Jun 26 15:32:31 vpn01 sshd[13711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.66.82.250 Jun 26 15:32:33 vpn01 sshd[13711]: Failed password for invalid user desarrollo from 200.66.82.250 port 47380 ssh2 ... |
2020-06-26 23:35:12 |
| 210.245.92.228 | attackbots | Jun 26 17:19:26 h2646465 sshd[31622]: Invalid user postgres from 210.245.92.228 Jun 26 17:19:38 h2646465 sshd[31622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.228 Jun 26 17:19:26 h2646465 sshd[31622]: Invalid user postgres from 210.245.92.228 Jun 26 17:19:38 h2646465 sshd[31622]: Failed password for invalid user postgres from 210.245.92.228 port 52206 ssh2 Jun 26 17:27:11 h2646465 sshd[32193]: Invalid user johnny from 210.245.92.228 Jun 26 17:27:11 h2646465 sshd[32193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.92.228 Jun 26 17:27:11 h2646465 sshd[32193]: Invalid user johnny from 210.245.92.228 Jun 26 17:27:14 h2646465 sshd[32193]: Failed password for invalid user johnny from 210.245.92.228 port 59342 ssh2 Jun 26 17:32:41 h2646465 sshd[32581]: Invalid user Ubuntu-4ubuntu2.6 from 210.245.92.228 ... |
2020-06-26 23:35:48 |
| 165.22.77.163 | attack | Jun 26 16:34:54 prox sshd[24478]: Failed password for root from 165.22.77.163 port 60530 ssh2 Jun 26 16:44:03 prox sshd[6952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.77.163 |
2020-06-26 23:31:32 |
| 51.38.129.120 | attack | Jun 26 14:36:35 rocket sshd[18781]: Failed password for root from 51.38.129.120 port 33204 ssh2 Jun 26 14:39:18 rocket sshd[18983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120 ... |
2020-06-26 23:53:05 |
| 122.51.14.236 | attackspam | SSH Brute-Force. Ports scanning. |
2020-06-26 23:33:47 |
| 193.56.28.155 | attack | 2020-06-26 16:59:59 auth_plain authenticator failed for (User) [193.56.28.155]: 535 Incorrect authentication data (set_id=frank@lavrinenko.info,) 2020-06-26 16:59:59 auth_plain authenticator failed for (User) [193.56.28.155]: 535 Incorrect authentication data (set_id=frank@lavrinenko.info,) ... |
2020-06-26 23:32:39 |