城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.139.18.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13757
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.139.18.31. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020101 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 06:27:21 CST 2025
;; MSG SIZE rcvd: 106
Host 31.18.139.164.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 31.18.139.164.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.15.10 | attackspambots | 16.02.2020 14:12:33 SSH access blocked by firewall |
2020-02-16 22:15:57 |
| 5.116.194.47 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:31. |
2020-02-16 22:31:16 |
| 83.135.111.168 | attackspam | Feb 16 14:41:47 srv-ubuntu-dev3 sshd[124040]: Invalid user www from 83.135.111.168 Feb 16 14:41:47 srv-ubuntu-dev3 sshd[124040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.135.111.168 Feb 16 14:41:47 srv-ubuntu-dev3 sshd[124040]: Invalid user www from 83.135.111.168 Feb 16 14:41:48 srv-ubuntu-dev3 sshd[124040]: Failed password for invalid user www from 83.135.111.168 port 46654 ssh2 Feb 16 14:46:22 srv-ubuntu-dev3 sshd[124436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.135.111.168 user=root Feb 16 14:46:23 srv-ubuntu-dev3 sshd[124436]: Failed password for root from 83.135.111.168 port 48710 ssh2 Feb 16 14:50:50 srv-ubuntu-dev3 sshd[124781]: Invalid user test1 from 83.135.111.168 Feb 16 14:50:50 srv-ubuntu-dev3 sshd[124781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.135.111.168 Feb 16 14:50:50 srv-ubuntu-dev3 sshd[124781]: Invalid user test1 ... |
2020-02-16 22:09:59 |
| 106.13.105.88 | attackspam | Feb 16 03:47:21 web1 sshd\[29099\]: Invalid user shawnta from 106.13.105.88 Feb 16 03:47:21 web1 sshd\[29099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.88 Feb 16 03:47:24 web1 sshd\[29099\]: Failed password for invalid user shawnta from 106.13.105.88 port 55964 ssh2 Feb 16 03:50:47 web1 sshd\[29419\]: Invalid user sandmo from 106.13.105.88 Feb 16 03:50:47 web1 sshd\[29419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.88 |
2020-02-16 22:13:55 |
| 138.68.105.194 | attackspam | Feb 16 15:00:53 srv01 sshd[10632]: Invalid user ax from 138.68.105.194 port 55834 Feb 16 15:00:53 srv01 sshd[10632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.105.194 Feb 16 15:00:53 srv01 sshd[10632]: Invalid user ax from 138.68.105.194 port 55834 Feb 16 15:00:55 srv01 sshd[10632]: Failed password for invalid user ax from 138.68.105.194 port 55834 ssh2 Feb 16 15:07:04 srv01 sshd[11079]: Invalid user yun from 138.68.105.194 port 40324 ... |
2020-02-16 22:32:48 |
| 106.52.196.166 | attack | Feb 16 03:45:33 auw2 sshd\[26983\]: Invalid user p@ssw0rd123456 from 106.52.196.166 Feb 16 03:45:33 auw2 sshd\[26983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.196.166 Feb 16 03:45:36 auw2 sshd\[26983\]: Failed password for invalid user p@ssw0rd123456 from 106.52.196.166 port 54362 ssh2 Feb 16 03:51:05 auw2 sshd\[27611\]: Invalid user qwerty from 106.52.196.166 Feb 16 03:51:05 auw2 sshd\[27611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.196.166 |
2020-02-16 22:00:48 |
| 79.127.114.211 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:31. |
2020-02-16 22:30:45 |
| 106.54.225.156 | attackbots | Feb 16 10:50:43 vps46666688 sshd[15334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.225.156 Feb 16 10:50:45 vps46666688 sshd[15334]: Failed password for invalid user pin from 106.54.225.156 port 52908 ssh2 ... |
2020-02-16 22:18:01 |
| 78.187.210.125 | attackbots | Automatic report - Port Scan Attack |
2020-02-16 22:38:00 |
| 185.119.224.2 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-16 22:15:03 |
| 163.172.63.244 | attack | Feb 16 08:51:00 plusreed sshd[26494]: Invalid user mnv from 163.172.63.244 ... |
2020-02-16 22:04:57 |
| 50.63.197.103 | attackspambots | Automatic report - XMLRPC Attack |
2020-02-16 22:19:51 |
| 190.105.71.254 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 16-02-2020 13:50:28. |
2020-02-16 22:38:30 |
| 27.216.245.215 | attack | Automatic report - Port Scan Attack |
2020-02-16 22:44:36 |
| 93.108.30.247 | attackbots | Automatic report - Port Scan Attack |
2020-02-16 21:55:25 |