城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 174.138.42.143 | attackbots | DATE:2020-09-20 15:49:05,IP:174.138.42.143,MATCHES:10,PORT:ssh |
2020-09-20 22:28:49 |
| 174.138.42.143 | attackbotsspam | firewall-block, port(s): 29183/tcp |
2020-09-20 14:20:11 |
| 174.138.42.143 | attackbotsspam | Invalid user suser from 174.138.42.143 port 53068 |
2020-09-20 06:19:38 |
| 174.138.42.143 | attackspam | Invalid user admin from 174.138.42.143 port 35190 |
2020-08-23 05:33:28 |
| 174.138.42.143 | attackbotsspam | Aug 21 14:38:37 abendstille sshd\[17124\]: Invalid user ubuntu from 174.138.42.143 Aug 21 14:38:37 abendstille sshd\[17124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143 Aug 21 14:38:40 abendstille sshd\[17124\]: Failed password for invalid user ubuntu from 174.138.42.143 port 41806 ssh2 Aug 21 14:43:18 abendstille sshd\[21525\]: Invalid user lazaro from 174.138.42.143 Aug 21 14:43:18 abendstille sshd\[21525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143 ... |
2020-08-21 20:54:23 |
| 174.138.42.143 | attack | Aug 15 15:11:25 journals sshd\[103829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143 user=root Aug 15 15:11:27 journals sshd\[103829\]: Failed password for root from 174.138.42.143 port 58914 ssh2 Aug 15 15:16:02 journals sshd\[104244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143 user=root Aug 15 15:16:04 journals sshd\[104244\]: Failed password for root from 174.138.42.143 port 38464 ssh2 Aug 15 15:20:20 journals sshd\[104618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143 user=root ... |
2020-08-16 00:26:03 |
| 174.138.42.143 | attack | Aug 7 06:52:27 ovpn sshd\[32736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143 user=root Aug 7 06:52:29 ovpn sshd\[32736\]: Failed password for root from 174.138.42.143 port 48568 ssh2 Aug 7 07:05:18 ovpn sshd\[5314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143 user=root Aug 7 07:05:20 ovpn sshd\[5314\]: Failed password for root from 174.138.42.143 port 34304 ssh2 Aug 7 07:07:23 ovpn sshd\[6145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143 user=root |
2020-08-07 13:17:39 |
| 174.138.42.143 | attack | $f2bV_matches |
2020-08-05 15:38:50 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.138.42.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46859
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;174.138.42.119. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 14:57:59 CST 2022
;; MSG SIZE rcvd: 107
Host 119.42.138.174.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 119.42.138.174.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.89.124.170 | attackspam | Oct 9 17:58:36 vpn01 sshd[22920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.124.170 Oct 9 17:58:37 vpn01 sshd[22920]: Failed password for invalid user P4ssw0rt12345 from 103.89.124.170 port 46996 ssh2 ... |
2019-10-10 01:06:32 |
| 14.0.19.179 | attackbots | Unauthorized connection attempt from IP address 14.0.19.179 on Port 445(SMB) |
2019-10-10 00:49:10 |
| 67.207.91.133 | attackbotsspam | Oct 9 12:41:26 ny01 sshd[2538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.91.133 Oct 9 12:41:29 ny01 sshd[2538]: Failed password for invalid user Original@2017 from 67.207.91.133 port 37328 ssh2 Oct 9 12:45:59 ny01 sshd[2946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.91.133 |
2019-10-10 00:47:13 |
| 91.121.210.168 | attack | Oct 07 20:21:53 host sshd[15933]: Invalid user system from 91.121.210.168 port 39017 |
2019-10-10 00:56:32 |
| 113.189.83.40 | attackspam | Unauthorized connection attempt from IP address 113.189.83.40 on Port 445(SMB) |
2019-10-10 01:21:38 |
| 167.114.157.86 | attack | Oct 9 07:06:09 web1 sshd\[6077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.157.86 user=root Oct 9 07:06:10 web1 sshd\[6077\]: Failed password for root from 167.114.157.86 port 46880 ssh2 Oct 9 07:09:47 web1 sshd\[6408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.157.86 user=root Oct 9 07:09:49 web1 sshd\[6408\]: Failed password for root from 167.114.157.86 port 37040 ssh2 Oct 9 07:13:23 web1 sshd\[6702\]: Invalid user 123 from 167.114.157.86 Oct 9 07:13:23 web1 sshd\[6702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.157.86 |
2019-10-10 01:23:10 |
| 80.82.67.230 | attack | SSH bruteforce |
2019-10-10 01:17:47 |
| 43.229.90.1 | attackbots | Unauthorized connection attempt from IP address 43.229.90.1 on Port 445(SMB) |
2019-10-10 01:22:20 |
| 115.73.30.250 | attack | Unauthorized connection attempt from IP address 115.73.30.250 on Port 445(SMB) |
2019-10-10 01:00:30 |
| 36.91.75.125 | attack | Unauthorized connection attempt from IP address 36.91.75.125 on Port 445(SMB) |
2019-10-10 01:20:17 |
| 81.139.60.251 | attackbotsspam | 2019-10-09T13:32:47.087835homeassistant sshd[24423]: Unable to negotiate with 81.139.60.251 port 45790: no matching host key type found. Their offer: ssh-dss [preauth] 2019-10-09T13:32:47.300966homeassistant sshd[24425]: Invalid user NULL from 81.139.60.251 port 45808 ... |
2019-10-10 00:57:18 |
| 176.59.34.71 | attackbots | Unauthorized connection attempt from IP address 176.59.34.71 on Port 445(SMB) |
2019-10-10 01:15:15 |
| 51.75.170.13 | attackbotsspam | Oct 9 12:58:52 localhost sshd\[83216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.13 user=root Oct 9 12:58:54 localhost sshd\[83216\]: Failed password for root from 51.75.170.13 port 44150 ssh2 Oct 9 13:02:54 localhost sshd\[83322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.13 user=root Oct 9 13:02:56 localhost sshd\[83322\]: Failed password for root from 51.75.170.13 port 55584 ssh2 Oct 9 13:06:54 localhost sshd\[83454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.13 user=root ... |
2019-10-10 01:28:53 |
| 95.0.60.168 | attackspambots | Unauthorized connection attempt from IP address 95.0.60.168 on Port 445(SMB) |
2019-10-10 00:59:16 |
| 89.218.254.162 | attackspambots | Unauthorized connection attempt from IP address 89.218.254.162 on Port 445(SMB) |
2019-10-10 01:05:34 |