城市(city): North Bergen
省份(region): New Jersey
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.81.208.44 | attackspambots | Fail2Ban Ban Triggered |
2020-09-23 01:16:10 |
| 192.81.208.44 | attack | Listed on zen-spamhaus also abuseat.org / proto=6 . srcport=58199 . dstport=22702 . (326) |
2020-09-22 17:19:13 |
| 192.81.208.44 | attackbotsspam | detected by Fail2Ban |
2020-09-16 23:21:12 |
| 192.81.208.44 | attackbotsspam | (sshd) Failed SSH login from 192.81.208.44 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 16 02:45:46 server sshd[13592]: Invalid user ts3srv from 192.81.208.44 port 57700 Sep 16 02:45:48 server sshd[13592]: Failed password for invalid user ts3srv from 192.81.208.44 port 57700 ssh2 Sep 16 02:54:00 server sshd[15890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.208.44 user=root Sep 16 02:54:02 server sshd[15890]: Failed password for root from 192.81.208.44 port 59165 ssh2 Sep 16 02:58:15 server sshd[17039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.208.44 user=root |
2020-09-16 15:38:11 |
| 192.81.208.44 | attackspambots | srv02 Mass scanning activity detected Target: 13565 .. |
2020-09-16 07:36:59 |
| 192.81.208.44 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2020-09-15 02:56:58 |
| 192.81.208.44 | attackspam | Sep 14 12:38:58 electroncash sshd[49671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.208.44 Sep 14 12:38:58 electroncash sshd[49671]: Invalid user yang from 192.81.208.44 port 41964 Sep 14 12:39:00 electroncash sshd[49671]: Failed password for invalid user yang from 192.81.208.44 port 41964 ssh2 Sep 14 12:42:34 electroncash sshd[50998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.81.208.44 user=root Sep 14 12:42:36 electroncash sshd[50998]: Failed password for root from 192.81.208.44 port 44211 ssh2 ... |
2020-09-14 18:47:39 |
| 192.81.208.44 | attackspambots | 19046/tcp 2756/tcp 21091/tcp... [2020-07-08/09-07]188pkt,70pt.(tcp) |
2020-09-08 20:41:44 |
| 192.81.208.44 | attackbots | 2020-09-08T05:08:14+0200 Failed SSH Authentication/Brute Force Attack. (Server 5) |
2020-09-08 12:34:52 |
| 192.81.208.44 | attackbotsspam | Sep 7 23:00:07 lnxded64 sshd[16417]: Failed password for root from 192.81.208.44 port 54622 ssh2 Sep 7 23:00:07 lnxded64 sshd[16417]: Failed password for root from 192.81.208.44 port 54622 ssh2 |
2020-09-08 05:12:08 |
| 192.81.208.44 | attack | Invalid user steam from 192.81.208.44 port 44930 |
2020-09-04 21:08:47 |
| 192.81.208.44 | attackbots |
|
2020-09-04 12:48:23 |
| 192.81.208.44 | attackspam | $lgm |
2020-09-04 05:18:57 |
| 192.81.208.44 | attackspambots | " " |
2020-08-31 16:11:39 |
| 192.81.208.44 | attackspam | Aug 24 05:49:10 vserver sshd\[30502\]: Invalid user ansible from 192.81.208.44Aug 24 05:49:13 vserver sshd\[30502\]: Failed password for invalid user ansible from 192.81.208.44 port 57726 ssh2Aug 24 05:53:13 vserver sshd\[30590\]: Failed password for root from 192.81.208.44 port 34396 ssh2Aug 24 05:57:09 vserver sshd\[30691\]: Invalid user wrf from 192.81.208.44 ... |
2020-08-24 12:09:19 |
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 192.81.208.0 - 192.81.223.255
CIDR: 192.81.208.0/20
NetName: DIGITALOCEAN-192-81-208-0
NetHandle: NET-192-81-208-0-1
Parent: NET192 (NET-192-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: DigitalOcean, LLC (DO-13)
RegDate: 2013-01-17
Updated: 2013-01-17
Comment: Routing and Peering Policy can be found at https://www.as14061.net
Comment:
Comment: Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref: https://rdap.arin.net/registry/ip/192.81.208.0
OrgName: DigitalOcean, LLC
OrgId: DO-13
Address: 105 Edgeview Drive, Suite 425
City: Broomfield
StateProv: CO
PostalCode: 80021
Country: US
RegDate: 2012-05-14
Updated: 2025-04-11
Ref: https://rdap.arin.net/registry/entity/DO-13
OrgNOCHandle: NOC32014-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-646-827-4366
OrgNOCEmail: noc@digitalocean.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName: DigitalOcean Abuse
OrgAbusePhone: +1-646-827-4366
OrgAbuseEmail: abuse@digitalocean.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/DIGIT19-ARIN
OrgTechHandle: NOC32014-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-646-827-4366
OrgTechEmail: noc@digitalocean.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.81.208.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.81.208.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025120903 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 10 08:00:35 CST 2025
;; MSG SIZE rcvd: 107
Host 214.208.81.192.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 214.208.81.192.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.142.195.5 | attack | Oct 18 21:12:59 heicom postfix/smtpd\[22505\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure Oct 18 21:13:48 heicom postfix/smtpd\[22558\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure Oct 18 21:14:36 heicom postfix/smtpd\[22505\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure Oct 18 21:15:26 heicom postfix/smtpd\[22558\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure Oct 18 21:16:15 heicom postfix/smtpd\[22505\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: authentication failure ... |
2019-10-19 05:26:06 |
| 217.20.119.16 | attackspam | Chat Spam |
2019-10-19 05:10:00 |
| 221.229.219.188 | attackspam | Oct 18 22:55:02 * sshd[32760]: Failed password for root from 221.229.219.188 port 60255 ssh2 |
2019-10-19 05:04:34 |
| 106.12.212.139 | attackbots | Oct 18 10:38:47 php1 sshd\[15408\]: Invalid user dnflskfk from 106.12.212.139 Oct 18 10:38:47 php1 sshd\[15408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.139 Oct 18 10:38:49 php1 sshd\[15408\]: Failed password for invalid user dnflskfk from 106.12.212.139 port 41434 ssh2 Oct 18 10:43:08 php1 sshd\[15904\]: Invalid user qwe123 from 106.12.212.139 Oct 18 10:43:08 php1 sshd\[15904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.212.139 |
2019-10-19 05:20:23 |
| 111.207.49.183 | attackspambots | RDP Brute-Force (Grieskirchen RZ2) |
2019-10-19 05:31:15 |
| 129.154.67.65 | attackbots | Oct 18 10:49:49 php1 sshd\[32194\]: Invalid user fc from 129.154.67.65 Oct 18 10:49:49 php1 sshd\[32194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-154-67-65.compute.oraclecloud.com Oct 18 10:49:51 php1 sshd\[32194\]: Failed password for invalid user fc from 129.154.67.65 port 39947 ssh2 Oct 18 10:54:41 php1 sshd\[32746\]: Invalid user dominic from 129.154.67.65 Oct 18 10:54:41 php1 sshd\[32746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=oc-129-154-67-65.compute.oraclecloud.com |
2019-10-19 05:08:27 |
| 68.183.236.92 | attackspambots | Oct 18 22:57:02 markkoudstaal sshd[15723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92 Oct 18 22:57:04 markkoudstaal sshd[15723]: Failed password for invalid user distcache from 68.183.236.92 port 35000 ssh2 Oct 18 23:01:41 markkoudstaal sshd[16137]: Failed password for root from 68.183.236.92 port 46770 ssh2 |
2019-10-19 05:07:36 |
| 87.106.41.83 | attackbots | Lines containing failures of 87.106.41.83 Oct 18 19:48:07 shared09 sshd[23911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.106.41.83 user=r.r Oct 18 19:48:09 shared09 sshd[23911]: Failed password for r.r from 87.106.41.83 port 38858 ssh2 Oct 18 19:48:09 shared09 sshd[23911]: Received disconnect from 87.106.41.83 port 38858:11: Bye Bye [preauth] Oct 18 19:48:09 shared09 sshd[23911]: Disconnected from authenticating user r.r 87.106.41.83 port 38858 [preauth] Oct 18 20:56:48 shared09 sshd[12282]: Invalid user share from 87.106.41.83 port 56450 Oct 18 20:56:48 shared09 sshd[12282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.106.41.83 Oct 18 20:56:50 shared09 sshd[12282]: Failed password for invalid user share from 87.106.41.83 port 56450 ssh2 Oct 18 20:56:50 shared09 sshd[12282]: Received disconnect from 87.106.41.83 port 56450:11: Bye Bye [preauth] Oct 18 20:56:50 shared09 sshd[........ ------------------------------ |
2019-10-19 05:18:55 |
| 61.133.232.253 | attack | 2019-10-18T21:08:01.564475abusebot-5.cloudsearch.cf sshd\[25729\]: Invalid user yjlo from 61.133.232.253 port 5662 2019-10-18T21:08:01.569928abusebot-5.cloudsearch.cf sshd\[25729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.253 |
2019-10-19 05:31:36 |
| 222.180.168.38 | attack | Oct 18 23:09:22 andromeda postfix/smtpd\[19669\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:24 andromeda postfix/smtpd\[19669\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:28 andromeda postfix/smtpd\[25199\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:48 andromeda postfix/smtpd\[25199\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure Oct 18 23:09:54 andromeda postfix/smtpd\[29621\]: warning: unknown\[222.180.168.38\]: SASL LOGIN authentication failed: authentication failure |
2019-10-19 05:22:41 |
| 106.12.179.35 | attack | 2019-10-19T02:51:14.754093enmeeting.mahidol.ac.th sshd\[1938\]: Invalid user openvpn_as from 106.12.179.35 port 58714 2019-10-19T02:51:14.767237enmeeting.mahidol.ac.th sshd\[1938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.35 2019-10-19T02:51:17.074253enmeeting.mahidol.ac.th sshd\[1938\]: Failed password for invalid user openvpn_as from 106.12.179.35 port 58714 ssh2 ... |
2019-10-19 05:44:49 |
| 182.177.202.31 | attackbotsspam | Oct 18 21:32:51 mxgate1 postfix/postscreen[19432]: CONNECT from [182.177.202.31]:63001 to [176.31.12.44]:25 Oct 18 21:32:51 mxgate1 postfix/dnsblog[19433]: addr 182.177.202.31 listed by domain zen.spamhaus.org as 127.0.0.11 Oct 18 21:32:51 mxgate1 postfix/dnsblog[19433]: addr 182.177.202.31 listed by domain zen.spamhaus.org as 127.0.0.4 Oct 18 21:32:51 mxgate1 postfix/dnsblog[19482]: addr 182.177.202.31 listed by domain cbl.abuseat.org as 127.0.0.2 Oct 18 21:32:51 mxgate1 postfix/dnsblog[19437]: addr 182.177.202.31 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Oct 18 21:32:51 mxgate1 postfix/dnsblog[19436]: addr 182.177.202.31 listed by domain b.barracudacentral.org as 127.0.0.2 Oct 18 21:32:51 mxgate1 postfix/postscreen[19432]: PREGREET 23 after 0.21 from [182.177.202.31]:63001: EHLO [182.177.197.22] Oct 18 21:32:51 mxgate1 postfix/postscreen[19432]: DNSBL rank 5 for [182.177.202.31]:63001 Oct x@x Oct 18 21:32:53 mxgate1 postfix/postscreen[19432]: HANGUP after 1.7........ ------------------------------- |
2019-10-19 05:21:08 |
| 73.59.165.164 | attackspambots | Oct 18 23:19:56 dedicated sshd[5062]: Failed password for invalid user ddddd from 73.59.165.164 port 59330 ssh2 Oct 18 23:23:55 dedicated sshd[5550]: Invalid user oracle from 73.59.165.164 port 49478 Oct 18 23:23:55 dedicated sshd[5550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.59.165.164 Oct 18 23:23:55 dedicated sshd[5550]: Invalid user oracle from 73.59.165.164 port 49478 Oct 18 23:23:57 dedicated sshd[5550]: Failed password for invalid user oracle from 73.59.165.164 port 49478 ssh2 |
2019-10-19 05:38:26 |
| 49.88.112.116 | attackspambots | Oct 18 23:14:12 localhost sshd\[7229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116 user=root Oct 18 23:14:15 localhost sshd\[7229\]: Failed password for root from 49.88.112.116 port 59943 ssh2 Oct 18 23:14:17 localhost sshd\[7229\]: Failed password for root from 49.88.112.116 port 59943 ssh2 |
2019-10-19 05:25:47 |
| 213.229.1.12 | attack | Oct 19 00:00:31 taivassalofi sshd[100323]: Failed password for root from 213.229.1.12 port 33546 ssh2 Oct 19 00:04:11 taivassalofi sshd[100378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.229.1.12 ... |
2019-10-19 05:06:41 |