城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.109.53.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;182.109.53.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110602 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 07:46:02 CST 2025
;; MSG SIZE rcvd: 107
Host 214.53.109.182.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 214.53.109.182.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.42.7 | attack | Aug 6 00:02:27 dignus sshd[4685]: Failed password for root from 222.186.42.7 port 24773 ssh2 Aug 6 00:02:34 dignus sshd[4696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7 user=root Aug 6 00:02:35 dignus sshd[4696]: Failed password for root from 222.186.42.7 port 49966 ssh2 Aug 6 00:02:38 dignus sshd[4696]: Failed password for root from 222.186.42.7 port 49966 ssh2 Aug 6 00:02:40 dignus sshd[4696]: Failed password for root from 222.186.42.7 port 49966 ssh2 ... |
2020-08-06 15:05:46 |
| 106.53.20.226 | attackspam | $f2bV_matches |
2020-08-06 15:26:30 |
| 46.101.143.148 | attack | Aug 6 08:35:08 eventyay sshd[28387]: Failed password for root from 46.101.143.148 port 48156 ssh2 Aug 6 08:40:00 eventyay sshd[28498]: Failed password for root from 46.101.143.148 port 60142 ssh2 ... |
2020-08-06 15:00:49 |
| 51.77.66.36 | attackbotsspam | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-06T04:34:31Z and 2020-08-06T05:23:28Z |
2020-08-06 15:22:12 |
| 222.186.175.151 | attackspam | Aug 6 11:56:15 gw1 sshd[18091]: Failed password for root from 222.186.175.151 port 37336 ssh2 Aug 6 11:56:28 gw1 sshd[18091]: error: maximum authentication attempts exceeded for root from 222.186.175.151 port 37336 ssh2 [preauth] ... |
2020-08-06 14:57:04 |
| 210.183.21.48 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-06T05:23:12Z and 2020-08-06T05:32:15Z |
2020-08-06 15:18:41 |
| 94.102.53.112 | attack | [MK-VM2] Blocked by UFW |
2020-08-06 15:23:16 |
| 134.17.94.158 | attackbotsspam | Aug 5 20:54:14 web9 sshd\[20993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.158 user=root Aug 5 20:54:17 web9 sshd\[20993\]: Failed password for root from 134.17.94.158 port 5568 ssh2 Aug 5 20:57:36 web9 sshd\[21428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.158 user=root Aug 5 20:57:39 web9 sshd\[21428\]: Failed password for root from 134.17.94.158 port 5569 ssh2 Aug 5 21:01:02 web9 sshd\[21907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.158 user=root |
2020-08-06 15:04:07 |
| 45.248.69.92 | attack | Aug 6 08:22:26 *hidden* sshd[1902]: Failed password for *hidden* from 45.248.69.92 port 36864 ssh2 Aug 6 08:25:07 *hidden* sshd[8370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.69.92 user=root Aug 6 08:25:09 *hidden* sshd[8370]: Failed password for *hidden* from 45.248.69.92 port 53244 ssh2 Aug 6 08:28:04 *hidden* sshd[15641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.69.92 user=root Aug 6 08:28:06 *hidden* sshd[15641]: Failed password for *hidden* from 45.248.69.92 port 41394 ssh2 |
2020-08-06 15:27:50 |
| 122.226.73.22 | attackspam | port scan and connect, tcp 1433 (ms-sql-s) |
2020-08-06 14:50:31 |
| 144.168.57.40 | attackbotsspam | Aug 6 09:13:43 cosmoit sshd[16493]: Failed password for root from 144.168.57.40 port 35112 ssh2 |
2020-08-06 15:29:57 |
| 176.117.39.44 | attack | Aug 5 20:13:04 php1 sshd\[31569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.117.39.44 user=root Aug 5 20:13:06 php1 sshd\[31569\]: Failed password for root from 176.117.39.44 port 47496 ssh2 Aug 5 20:17:06 php1 sshd\[31927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.117.39.44 user=root Aug 5 20:17:08 php1 sshd\[31927\]: Failed password for root from 176.117.39.44 port 59284 ssh2 Aug 5 20:21:06 php1 sshd\[32426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.117.39.44 user=root |
2020-08-06 15:24:28 |
| 45.124.146.195 | attack | $f2bV_matches |
2020-08-06 15:34:13 |
| 51.68.44.154 | attack | leo_www |
2020-08-06 15:27:17 |
| 95.252.242.8 | attackspambots | Automatic report - Port Scan Attack |
2020-08-06 15:24:52 |