城市(city): Sülzetal
省份(region): Sachsen-Anhalt
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.40.194.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61651
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.40.194.27. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:59:36 CST 2025
;; MSG SIZE rcvd: 106
Host 27.194.40.164.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 27.194.40.164.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 219.129.32.1 | attackspambots | Dec 5 17:34:04 v22018076622670303 sshd\[30991\]: Invalid user lll from 219.129.32.1 port 23214 Dec 5 17:34:04 v22018076622670303 sshd\[30991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.129.32.1 Dec 5 17:34:06 v22018076622670303 sshd\[30991\]: Failed password for invalid user lll from 219.129.32.1 port 23214 ssh2 ... |
2019-12-06 01:09:38 |
| 220.135.48.40 | attack | Dec 5 16:59:56 sd-53420 sshd\[11950\]: Invalid user guest from 220.135.48.40 Dec 5 16:59:56 sd-53420 sshd\[11950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.48.40 Dec 5 16:59:58 sd-53420 sshd\[11950\]: Failed password for invalid user guest from 220.135.48.40 port 57954 ssh2 Dec 5 17:07:28 sd-53420 sshd\[13469\]: User root from 220.135.48.40 not allowed because none of user's groups are listed in AllowGroups Dec 5 17:07:28 sd-53420 sshd\[13469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.48.40 user=root ... |
2019-12-06 01:06:24 |
| 103.254.209.201 | attack | Dec 5 18:09:11 icinga sshd[21151]: Failed password for sshd from 103.254.209.201 port 33943 ssh2 ... |
2019-12-06 01:33:49 |
| 103.125.191.80 | attack | Tried to hack my Yahoo email. |
2019-12-06 01:06:36 |
| 65.49.20.66 | attackbots | SSH brute force |
2019-12-06 01:43:02 |
| 139.59.90.40 | attack | Dec 5 17:47:38 ns41 sshd[25490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.40 |
2019-12-06 01:12:12 |
| 141.98.10.71 | attackspam | Rude login attack (7 tries in 1d) |
2019-12-06 01:15:17 |
| 81.28.100.131 | attack | Dec 5 17:09:17 grey postfix/smtpd\[22086\]: NOQUEUE: reject: RCPT from sudden.shrewdmhealth.com\[81.28.100.131\]: 554 5.7.1 Service unavailable\; Client host \[81.28.100.131\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[81.28.100.131\]\; from=\ |
2019-12-06 01:38:53 |
| 180.250.124.227 | attackbots | 2019-12-05T16:44:53.140377abusebot-8.cloudsearch.cf sshd\[6157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=swift.id user=root |
2019-12-06 01:08:01 |
| 112.85.42.174 | attackbotsspam | Dec 5 07:46:11 sachi sshd\[23640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root Dec 5 07:46:13 sachi sshd\[23640\]: Failed password for root from 112.85.42.174 port 49598 ssh2 Dec 5 07:46:29 sachi sshd\[23648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root Dec 5 07:46:31 sachi sshd\[23648\]: Failed password for root from 112.85.42.174 port 20614 ssh2 Dec 5 07:46:46 sachi sshd\[23648\]: Failed password for root from 112.85.42.174 port 20614 ssh2 |
2019-12-06 01:51:39 |
| 201.218.255.102 | attack | Unauthorized connection attempt from IP address 201.218.255.102 on Port 445(SMB) |
2019-12-06 01:44:14 |
| 187.162.51.63 | attackbotsspam | Dec 5 10:11:10 home sshd[5709]: Invalid user taurai from 187.162.51.63 port 35420 Dec 5 10:11:10 home sshd[5709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.162.51.63 Dec 5 10:11:10 home sshd[5709]: Invalid user taurai from 187.162.51.63 port 35420 Dec 5 10:11:12 home sshd[5709]: Failed password for invalid user taurai from 187.162.51.63 port 35420 ssh2 Dec 5 10:20:53 home sshd[5807]: Invalid user maeva from 187.162.51.63 port 39118 Dec 5 10:20:53 home sshd[5807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.162.51.63 Dec 5 10:20:53 home sshd[5807]: Invalid user maeva from 187.162.51.63 port 39118 Dec 5 10:20:55 home sshd[5807]: Failed password for invalid user maeva from 187.162.51.63 port 39118 ssh2 Dec 5 10:26:13 home sshd[5832]: Invalid user teri from 187.162.51.63 port 44116 Dec 5 10:26:13 home sshd[5832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.162 |
2019-12-06 01:49:08 |
| 49.233.151.172 | attack | Port scan detected on ports: 1433[TCP], 1433[TCP], 1433[TCP] |
2019-12-06 01:39:25 |
| 179.127.70.7 | attackbotsspam | ssh failed login |
2019-12-06 01:16:53 |
| 210.245.52.7 | attack | Unauthorized connection attempt from IP address 210.245.52.7 on Port 445(SMB) |
2019-12-06 01:53:26 |