城市(city): unknown
省份(region): unknown
国家(country): Singapore
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.142.199.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.142.199.245. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 13:51:55 CST 2025
;; MSG SIZE rcvd: 107
245.199.142.18.in-addr.arpa domain name pointer ec2-18-142-199-245.ap-southeast-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.199.142.18.in-addr.arpa name = ec2-18-142-199-245.ap-southeast-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 132.145.170.174 | attackbotsspam | Oct 4 16:28:13 mail sshd\[39775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.170.174 user=root ... |
2019-10-05 04:59:13 |
| 185.222.211.62 | attackbotsspam | 3389BruteforceStormFW21 |
2019-10-05 05:32:56 |
| 167.99.68.233 | attack | Automatic report - XMLRPC Attack |
2019-10-05 05:29:47 |
| 188.214.255.241 | attackbotsspam | 2019-10-04T16:48:54.9487901495-001 sshd\[21000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.214.255.241 user=root 2019-10-04T16:48:57.2380521495-001 sshd\[21000\]: Failed password for root from 188.214.255.241 port 51574 ssh2 2019-10-04T16:52:45.7496171495-001 sshd\[21259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.214.255.241 user=root 2019-10-04T16:52:47.4167531495-001 sshd\[21259\]: Failed password for root from 188.214.255.241 port 59686 ssh2 2019-10-04T16:56:32.9876631495-001 sshd\[21493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.214.255.241 user=root 2019-10-04T16:56:34.4834521495-001 sshd\[21493\]: Failed password for root from 188.214.255.241 port 39556 ssh2 ... |
2019-10-05 05:11:23 |
| 129.226.56.22 | attack | 2019-10-04T23:58:53.582146tmaserv sshd\[13673\]: Invalid user Compilern123 from 129.226.56.22 port 35066 2019-10-04T23:58:53.586397tmaserv sshd\[13673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.56.22 2019-10-04T23:58:55.774902tmaserv sshd\[13673\]: Failed password for invalid user Compilern123 from 129.226.56.22 port 35066 ssh2 2019-10-05T00:03:27.520994tmaserv sshd\[16423\]: Invalid user Jelszo_111 from 129.226.56.22 port 47138 2019-10-05T00:03:27.525311tmaserv sshd\[16423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.56.22 2019-10-05T00:03:28.995964tmaserv sshd\[16423\]: Failed password for invalid user Jelszo_111 from 129.226.56.22 port 47138 ssh2 ... |
2019-10-05 05:20:53 |
| 211.117.121.54 | attackbots | (sshd) Failed SSH login from 211.117.121.54 (-): 5 in the last 3600 secs |
2019-10-05 05:03:09 |
| 206.189.167.53 | attackbots | Oct 4 22:57:24 jane sshd[25005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.167.53 Oct 4 22:57:26 jane sshd[25005]: Failed password for invalid user admin from 206.189.167.53 port 58874 ssh2 ... |
2019-10-05 05:22:27 |
| 77.247.108.225 | attack | 10/04/2019-22:27:40.288395 77.247.108.225 Protocol: 17 ET SCAN Sipvicious Scan |
2019-10-05 05:19:10 |
| 79.137.33.20 | attack | Oct 4 23:50:18 pkdns2 sshd\[61168\]: Invalid user Album@123 from 79.137.33.20Oct 4 23:50:20 pkdns2 sshd\[61168\]: Failed password for invalid user Album@123 from 79.137.33.20 port 58384 ssh2Oct 4 23:54:01 pkdns2 sshd\[61253\]: Invalid user Album@123 from 79.137.33.20Oct 4 23:54:04 pkdns2 sshd\[61253\]: Failed password for invalid user Album@123 from 79.137.33.20 port 50134 ssh2Oct 4 23:57:43 pkdns2 sshd\[61416\]: Invalid user Isabella1@3 from 79.137.33.20Oct 4 23:57:46 pkdns2 sshd\[61416\]: Failed password for invalid user Isabella1@3 from 79.137.33.20 port 41884 ssh2 ... |
2019-10-05 05:20:05 |
| 193.70.114.154 | attack | Oct 4 10:44:19 eddieflores sshd\[2652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.ip-193-70-114.eu user=root Oct 4 10:44:21 eddieflores sshd\[2652\]: Failed password for root from 193.70.114.154 port 49444 ssh2 Oct 4 10:48:10 eddieflores sshd\[3014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.ip-193-70-114.eu user=root Oct 4 10:48:13 eddieflores sshd\[3014\]: Failed password for root from 193.70.114.154 port 41179 ssh2 Oct 4 10:51:56 eddieflores sshd\[3317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.ip-193-70-114.eu user=root |
2019-10-05 05:06:14 |
| 189.90.255.208 | attackspam | Automatic report - XMLRPC Attack |
2019-10-05 05:23:31 |
| 51.75.64.96 | attackspam | Oct 4 10:39:31 sachi sshd\[2078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.ip-51-75-64.eu user=root Oct 4 10:39:33 sachi sshd\[2078\]: Failed password for root from 51.75.64.96 port 40416 ssh2 Oct 4 10:43:24 sachi sshd\[2393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.ip-51-75-64.eu user=root Oct 4 10:43:26 sachi sshd\[2393\]: Failed password for root from 51.75.64.96 port 53518 ssh2 Oct 4 10:47:14 sachi sshd\[2702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.ip-51-75-64.eu user=root |
2019-10-05 05:01:51 |
| 46.101.17.215 | attackbotsspam | 2019-10-04T22:39:54.0090461240 sshd\[11554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215 user=root 2019-10-04T22:39:56.0274791240 sshd\[11554\]: Failed password for root from 46.101.17.215 port 33356 ssh2 2019-10-04T22:43:26.5647351240 sshd\[11738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.17.215 user=root ... |
2019-10-05 04:58:22 |
| 118.89.156.217 | attack | Oct 4 20:28:10 venus sshd\[17775\]: Invalid user P4ssword2019 from 118.89.156.217 port 33272 Oct 4 20:28:10 venus sshd\[17775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.156.217 Oct 4 20:28:12 venus sshd\[17775\]: Failed password for invalid user P4ssword2019 from 118.89.156.217 port 33272 ssh2 ... |
2019-10-05 05:00:31 |
| 49.234.62.163 | attackspambots | Oct 4 10:54:11 eddieflores sshd\[3549\]: Invalid user 123Mac from 49.234.62.163 Oct 4 10:54:11 eddieflores sshd\[3549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.62.163 Oct 4 10:54:13 eddieflores sshd\[3549\]: Failed password for invalid user 123Mac from 49.234.62.163 port 43428 ssh2 Oct 4 10:57:53 eddieflores sshd\[3892\]: Invalid user ZaqXsw\#123 from 49.234.62.163 Oct 4 10:57:53 eddieflores sshd\[3892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.62.163 |
2019-10-05 05:02:18 |