城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.90.135.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36897
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.90.135.142. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 18:52:01 CST 2025
;; MSG SIZE rcvd: 107
Host 142.135.90.169.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.135.90.169.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
49.88.112.77 | attackspam | May 31 07:52:28 pkdns2 sshd\[49662\]: Failed password for root from 49.88.112.77 port 61175 ssh2May 31 07:53:45 pkdns2 sshd\[49693\]: Failed password for root from 49.88.112.77 port 32098 ssh2May 31 07:55:45 pkdns2 sshd\[49806\]: Failed password for root from 49.88.112.77 port 22421 ssh2May 31 07:56:23 pkdns2 sshd\[49837\]: Failed password for root from 49.88.112.77 port 39417 ssh2May 31 07:59:46 pkdns2 sshd\[49945\]: Failed password for root from 49.88.112.77 port 53490 ssh2May 31 08:00:27 pkdns2 sshd\[50019\]: Failed password for root from 49.88.112.77 port 16951 ssh2 ... |
2020-05-31 13:17:44 |
203.106.41.154 | attackspam | May 31 05:56:18 ArkNodeAT sshd\[21236\]: Invalid user ferwerda from 203.106.41.154 May 31 05:56:18 ArkNodeAT sshd\[21236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.106.41.154 May 31 05:56:21 ArkNodeAT sshd\[21236\]: Failed password for invalid user ferwerda from 203.106.41.154 port 48458 ssh2 |
2020-05-31 12:58:38 |
118.25.188.118 | attackspambots | May 31 06:28:48 localhost sshd\[26938\]: Invalid user student from 118.25.188.118 May 31 06:28:48 localhost sshd\[26938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.188.118 May 31 06:28:49 localhost sshd\[26938\]: Failed password for invalid user student from 118.25.188.118 port 43556 ssh2 May 31 06:35:16 localhost sshd\[27356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.188.118 user=root May 31 06:35:18 localhost sshd\[27356\]: Failed password for root from 118.25.188.118 port 59578 ssh2 ... |
2020-05-31 12:56:30 |
222.186.31.166 | attack | 2020-05-31T07:03:20.264471mail.broermann.family sshd[5482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166 user=root 2020-05-31T07:03:22.277750mail.broermann.family sshd[5482]: Failed password for root from 222.186.31.166 port 26685 ssh2 2020-05-31T07:03:20.264471mail.broermann.family sshd[5482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166 user=root 2020-05-31T07:03:22.277750mail.broermann.family sshd[5482]: Failed password for root from 222.186.31.166 port 26685 ssh2 2020-05-31T07:03:24.822687mail.broermann.family sshd[5482]: Failed password for root from 222.186.31.166 port 26685 ssh2 ... |
2020-05-31 13:22:26 |
195.158.26.238 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-05-31 12:42:21 |
159.203.35.141 | attack | $f2bV_matches |
2020-05-31 13:23:10 |
159.203.57.1 | attackbots | 20 attempts against mh-ssh on cloud |
2020-05-31 13:03:39 |
185.73.207.28 | attack | May 31 07:49:43 journals sshd\[89387\]: Invalid user johnlencicki from 185.73.207.28 May 31 07:49:43 journals sshd\[89387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.73.207.28 May 31 07:49:45 journals sshd\[89387\]: Failed password for invalid user johnlencicki from 185.73.207.28 port 39028 ssh2 May 31 07:52:43 journals sshd\[89690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.73.207.28 user=root May 31 07:52:44 journals sshd\[89690\]: Failed password for root from 185.73.207.28 port 34290 ssh2 ... |
2020-05-31 13:09:10 |
103.105.128.194 | attackbots | May 31 06:55:11 pve1 sshd[10687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.128.194 May 31 06:55:13 pve1 sshd[10687]: Failed password for invalid user bahram from 103.105.128.194 port 16794 ssh2 ... |
2020-05-31 12:57:57 |
134.122.3.6 | attackbots | May 31 05:33:41 xxx sshd[24056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.3.6 user=r.r May 31 05:47:59 xxx sshd[25314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.3.6 user=backup May 31 05:51:37 xxx sshd[25507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.3.6 user=r.r May 31 05:55:14 xxx sshd[25708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.3.6 user=r.r May 31 05:58:56 xxx sshd[25840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.3.6 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=134.122.3.6 |
2020-05-31 13:02:46 |
80.82.65.74 | attackbots | [H1.VM8] Blocked by UFW |
2020-05-31 13:00:59 |
139.199.157.235 | attack | May 31 03:52:25 onepixel sshd[2471685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.157.235 May 31 03:52:25 onepixel sshd[2471685]: Invalid user tplink from 139.199.157.235 port 42548 May 31 03:52:27 onepixel sshd[2471685]: Failed password for invalid user tplink from 139.199.157.235 port 42548 ssh2 May 31 03:56:02 onepixel sshd[2472087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.157.235 user=root May 31 03:56:04 onepixel sshd[2472087]: Failed password for root from 139.199.157.235 port 54110 ssh2 |
2020-05-31 13:09:33 |
113.162.105.188 | attackbotsspam | trying to access non-authorized port |
2020-05-31 13:13:00 |
106.51.50.2 | attackbots | May 31 06:27:01 abendstille sshd\[29248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.50.2 user=root May 31 06:27:04 abendstille sshd\[29248\]: Failed password for root from 106.51.50.2 port 59984 ssh2 May 31 06:30:55 abendstille sshd\[32605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.50.2 user=root May 31 06:30:57 abendstille sshd\[32605\]: Failed password for root from 106.51.50.2 port 22940 ssh2 May 31 06:34:50 abendstille sshd\[3948\]: Invalid user laverne from 106.51.50.2 May 31 06:34:50 abendstille sshd\[3948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.50.2 ... |
2020-05-31 12:43:55 |
187.204.207.105 | attackbots | Unauthorised access (May 31) SRC=187.204.207.105 LEN=48 TTL=110 ID=14724 DF TCP DPT=445 WINDOW=8192 SYN |
2020-05-31 12:57:32 |