城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.117.195.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1522
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;166.117.195.82. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 08:24:03 CST 2025
;; MSG SIZE rcvd: 107
82.195.117.166.in-addr.arpa domain name pointer 166-117-195-82.static.pipartners.co.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
82.195.117.166.in-addr.arpa name = 166-117-195-82.static.pipartners.co.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.92.0.195 | attackbots | Apr 18 09:38:23 dcd-gentoo sshd[16252]: User root from 218.92.0.195 not allowed because none of user's groups are listed in AllowGroups Apr 18 09:38:25 dcd-gentoo sshd[16252]: error: PAM: Authentication failure for illegal user root from 218.92.0.195 Apr 18 09:38:23 dcd-gentoo sshd[16252]: User root from 218.92.0.195 not allowed because none of user's groups are listed in AllowGroups Apr 18 09:38:25 dcd-gentoo sshd[16252]: error: PAM: Authentication failure for illegal user root from 218.92.0.195 Apr 18 09:38:23 dcd-gentoo sshd[16252]: User root from 218.92.0.195 not allowed because none of user's groups are listed in AllowGroups Apr 18 09:38:25 dcd-gentoo sshd[16252]: error: PAM: Authentication failure for illegal user root from 218.92.0.195 Apr 18 09:38:25 dcd-gentoo sshd[16252]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.195 port 29440 ssh2 ... |
2020-04-18 15:57:46 |
| 199.195.252.213 | attackspam | Apr 18 04:57:53 web8 sshd\[4978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213 user=root Apr 18 04:57:54 web8 sshd\[4978\]: Failed password for root from 199.195.252.213 port 44526 ssh2 Apr 18 05:01:47 web8 sshd\[7042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213 user=root Apr 18 05:01:49 web8 sshd\[7042\]: Failed password for root from 199.195.252.213 port 56524 ssh2 Apr 18 05:05:31 web8 sshd\[9109\]: Invalid user admin from 199.195.252.213 Apr 18 05:05:31 web8 sshd\[9109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213 |
2020-04-18 15:54:46 |
| 35.231.211.161 | attackspam | Invalid user deploy from 35.231.211.161 port 60892 |
2020-04-18 16:28:12 |
| 139.170.150.251 | attackspam | Invalid user program from 139.170.150.251 port 19830 |
2020-04-18 16:27:53 |
| 51.91.39.131 | attack | Lines containing failures of 51.91.39.131 Apr 17 01:26:57 neweola sshd[19989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.39.131 user=r.r Apr 17 01:26:59 neweola sshd[19989]: Failed password for r.r from 51.91.39.131 port 50860 ssh2 Apr 17 01:27:01 neweola sshd[19989]: Received disconnect from 51.91.39.131 port 50860:11: Bye Bye [preauth] Apr 17 01:27:01 neweola sshd[19989]: Disconnected from authenticating user r.r 51.91.39.131 port 50860 [preauth] Apr 17 01:51:44 neweola sshd[22590]: Invalid user bh from 51.91.39.131 port 55486 Apr 17 01:51:44 neweola sshd[22590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.39.131 Apr 17 01:51:46 neweola sshd[22590]: Failed password for invalid user bh from 51.91.39.131 port 55486 ssh2 Apr 17 01:51:48 neweola sshd[22590]: Received disconnect from 51.91.39.131 port 55486:11: Bye Bye [preauth] Apr 17 01:51:48 neweola sshd[22590]: Discon........ ------------------------------ |
2020-04-18 16:26:39 |
| 193.112.77.212 | attack | Apr 18 07:09:18 santamaria sshd\[18717\]: Invalid user mx from 193.112.77.212 Apr 18 07:09:18 santamaria sshd\[18717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.77.212 Apr 18 07:09:20 santamaria sshd\[18717\]: Failed password for invalid user mx from 193.112.77.212 port 41536 ssh2 ... |
2020-04-18 16:18:40 |
| 182.61.27.149 | attackbotsspam | IP blocked |
2020-04-18 16:11:00 |
| 82.19.173.98 | attackspam | Automatic report - Port Scan Attack |
2020-04-18 15:45:53 |
| 61.12.38.162 | attackspambots | Apr 18 07:15:33 *** sshd[10282]: User root from 61.12.38.162 not allowed because not listed in AllowUsers |
2020-04-18 16:05:43 |
| 80.211.190.224 | attackbots | Invalid user qi from 80.211.190.224 port 58348 |
2020-04-18 16:07:52 |
| 41.215.10.6 | attack | postfix |
2020-04-18 16:26:09 |
| 175.140.138.193 | attackspam | Apr 18 07:37:14 odroid64 sshd\[30762\]: User root from 175.140.138.193 not allowed because not listed in AllowUsers Apr 18 07:37:14 odroid64 sshd\[30762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.140.138.193 user=root ... |
2020-04-18 16:02:52 |
| 222.186.31.83 | attackbots | Apr 18 07:41:05 ip-172-31-61-156 sshd[24342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83 user=root Apr 18 07:41:07 ip-172-31-61-156 sshd[24342]: Failed password for root from 222.186.31.83 port 48095 ssh2 ... |
2020-04-18 15:54:17 |
| 210.21.226.2 | attackspam | 2020-04-17T23:33:33.2515591495-001 sshd[12651]: Invalid user test from 210.21.226.2 port 32600 2020-04-17T23:33:34.8148771495-001 sshd[12651]: Failed password for invalid user test from 210.21.226.2 port 32600 ssh2 2020-04-17T23:37:13.7031591495-001 sshd[12786]: Invalid user oracle from 210.21.226.2 port 1307 2020-04-17T23:37:13.7092131495-001 sshd[12786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2 2020-04-17T23:37:13.7031591495-001 sshd[12786]: Invalid user oracle from 210.21.226.2 port 1307 2020-04-17T23:37:15.7968921495-001 sshd[12786]: Failed password for invalid user oracle from 210.21.226.2 port 1307 ssh2 ... |
2020-04-18 16:19:27 |
| 110.137.44.19 | attack | Unauthorized connection attempt detected from IP address 110.137.44.19 to port 445 |
2020-04-18 15:59:10 |