城市(city): unknown
省份(region): unknown
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.142.138.188
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.142.138.188. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031200 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 12 17:10:39 CST 2025
;; MSG SIZE rcvd: 108
Host 188.138.142.164.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 188.138.142.164.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 52.142.9.75 | attackspam | Invalid user 251 from 52.142.9.75 port 40676 |
2020-09-28 03:08:51 |
| 49.247.135.55 | attackbotsspam | Sep 27 20:51:41 h2865660 sshd[17509]: Invalid user admin from 49.247.135.55 port 53116 Sep 27 20:51:41 h2865660 sshd[17509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.135.55 Sep 27 20:51:41 h2865660 sshd[17509]: Invalid user admin from 49.247.135.55 port 53116 Sep 27 20:51:43 h2865660 sshd[17509]: Failed password for invalid user admin from 49.247.135.55 port 53116 ssh2 Sep 27 20:53:24 h2865660 sshd[17570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.135.55 user=root Sep 27 20:53:26 h2865660 sshd[17570]: Failed password for root from 49.247.135.55 port 51122 ssh2 ... |
2020-09-28 03:06:00 |
| 60.2.10.190 | attackspam | $f2bV_matches |
2020-09-28 02:43:45 |
| 13.92.134.70 | attackbotsspam | Invalid user ubuntu from 13.92.134.70 port 4614 |
2020-09-28 03:03:16 |
| 49.234.96.210 | attackbots | (sshd) Failed SSH login from 49.234.96.210 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 27 14:03:48 server2 sshd[16671]: Invalid user alvin from 49.234.96.210 Sep 27 14:03:48 server2 sshd[16671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210 Sep 27 14:03:51 server2 sshd[16671]: Failed password for invalid user alvin from 49.234.96.210 port 40298 ssh2 Sep 27 14:19:41 server2 sshd[16789]: Invalid user johan from 49.234.96.210 Sep 27 14:19:41 server2 sshd[16789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210 |
2020-09-28 02:48:16 |
| 1.234.217.6 | attack | Automatic report - Banned IP Access |
2020-09-28 03:12:09 |
| 200.194.16.159 | attackspam | Automatic report - Port Scan Attack |
2020-09-28 03:19:24 |
| 112.85.42.74 | attackspambots | Sep 27 18:36:02 staging sshd[121463]: Failed password for root from 112.85.42.74 port 34220 ssh2 Sep 27 18:36:06 staging sshd[121463]: Failed password for root from 112.85.42.74 port 34220 ssh2 Sep 27 18:36:59 staging sshd[121471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.74 user=root Sep 27 18:37:01 staging sshd[121471]: Failed password for root from 112.85.42.74 port 47289 ssh2 ... |
2020-09-28 02:51:13 |
| 159.65.236.182 | attack | Sep 27 20:33:24 vm1 sshd[18330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.236.182 Sep 27 20:33:26 vm1 sshd[18330]: Failed password for invalid user bdc from 159.65.236.182 port 46756 ssh2 ... |
2020-09-28 02:54:32 |
| 87.251.74.18 | attack | Unauthorized connection attempt from IP address 87.251.74.18 on Port 3389(RDP) |
2020-09-28 03:17:33 |
| 161.35.35.23 | attackspambots | Invalid user user from 161.35.35.23 port 33614 |
2020-09-28 03:11:33 |
| 119.96.172.179 | attackbots | Found on CINS badguys / proto=6 . srcport=53760 . dstport=25165 . (2634) |
2020-09-28 02:56:34 |
| 91.225.196.20 | attackspam | 2020-09-27T19:07:28.508125lavrinenko.info sshd[2185]: Invalid user robert from 91.225.196.20 port 36346 2020-09-27T19:07:28.518162lavrinenko.info sshd[2185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.225.196.20 2020-09-27T19:07:28.508125lavrinenko.info sshd[2185]: Invalid user robert from 91.225.196.20 port 36346 2020-09-27T19:07:30.911894lavrinenko.info sshd[2185]: Failed password for invalid user robert from 91.225.196.20 port 36346 ssh2 2020-09-27T19:11:43.591049lavrinenko.info sshd[2302]: Invalid user teamspeak from 91.225.196.20 port 46252 ... |
2020-09-28 02:42:52 |
| 167.71.254.95 | attackbots | (sshd) Failed SSH login from 167.71.254.95 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 27 13:10:28 server5 sshd[5834]: Invalid user administrator from 167.71.254.95 Sep 27 13:10:28 server5 sshd[5834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.254.95 Sep 27 13:10:30 server5 sshd[5834]: Failed password for invalid user administrator from 167.71.254.95 port 35358 ssh2 Sep 27 13:21:43 server5 sshd[10728]: Invalid user teamspeak from 167.71.254.95 Sep 27 13:21:43 server5 sshd[10728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.254.95 |
2020-09-28 02:49:19 |
| 203.172.66.227 | attackspambots | 2020-09-27T05:35:03.090878hostname sshd[9469]: Failed password for invalid user postgres from 203.172.66.227 port 54998 ssh2 ... |
2020-09-28 02:43:03 |