城市(city): unknown
省份(region): unknown
国家(country): Egypt
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.57.207.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;197.57.207.31. IN A
;; AUTHORITY SECTION:
. 311 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 20:43:08 CST 2022
;; MSG SIZE rcvd: 106
31.207.57.197.in-addr.arpa domain name pointer host-197.57.207.31.tedata.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
31.207.57.197.in-addr.arpa name = host-197.57.207.31.tedata.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.235.76.69 | attackspambots | Dec 6 07:24:42 h2177944 kernel: \[8488656.019133\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=49.235.76.69 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=1608 DF PROTO=TCP SPT=59761 DPT=40 WINDOW=8192 RES=0x00 SYN URGP=0 Dec 6 07:24:42 h2177944 kernel: \[8488656.060932\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=49.235.76.69 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=109 ID=1615 DF PROTO=TCP SPT=59765 DPT=40 WINDOW=8192 RES=0x00 SYN URGP=0 Dec 6 07:24:42 h2177944 kernel: \[8488656.083372\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=49.235.76.69 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=1624 DF PROTO=TCP SPT=59810 DPT=248 WINDOW=8192 RES=0x00 SYN URGP=0 Dec 6 07:24:42 h2177944 kernel: \[8488656.097555\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=49.235.76.69 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=1633 DF PROTO=TCP SPT=59814 DPT=248 WINDOW=8192 RES=0x00 SYN URGP=0 Dec 6 07:24:42 h2177944 kernel: \[8488656.113718\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=49.235.76.69 DST=85.214.117.9 LE |
2019-12-06 20:07:50 |
| 167.172.181.86 | attackspam | Scanning |
2019-12-06 19:59:53 |
| 180.66.207.67 | attackspambots | Dec 6 16:52:57 webhost01 sshd[19824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.66.207.67 Dec 6 16:52:59 webhost01 sshd[19824]: Failed password for invalid user wayne from 180.66.207.67 port 48734 ssh2 ... |
2019-12-06 19:45:06 |
| 217.238.181.182 | attackspambots | Dec 6 03:01:18 fwservlet sshd[21735]: Invalid user http from 217.238.181.182 Dec 6 03:01:18 fwservlet sshd[21735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.238.181.182 Dec 6 03:01:20 fwservlet sshd[21735]: Failed password for invalid user http from 217.238.181.182 port 46116 ssh2 Dec 6 03:01:20 fwservlet sshd[21735]: Received disconnect from 217.238.181.182 port 46116:11: Bye Bye [preauth] Dec 6 03:01:20 fwservlet sshd[21735]: Disconnected from 217.238.181.182 port 46116 [preauth] Dec 6 03:08:26 fwservlet sshd[22059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.238.181.182 user=r.r Dec 6 03:08:28 fwservlet sshd[22059]: Failed password for r.r from 217.238.181.182 port 55044 ssh2 Dec 6 03:08:28 fwservlet sshd[22059]: Received disconnect from 217.238.181.182 port 55044:11: Bye Bye [preauth] Dec 6 03:08:28 fwservlet sshd[22059]: Disconnected from 217.238.181.182 por........ ------------------------------- |
2019-12-06 20:10:18 |
| 188.165.193.140 | attackbots | Port scan on 1 port(s): 445 |
2019-12-06 19:42:09 |
| 177.92.144.90 | attackbotsspam | Dec 6 12:41:30 sso sshd[18441]: Failed password for root from 177.92.144.90 port 48264 ssh2 ... |
2019-12-06 20:03:16 |
| 140.246.207.140 | attackbotsspam | detected by Fail2Ban |
2019-12-06 20:14:16 |
| 218.92.0.180 | attackspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.180 user=root Failed password for root from 218.92.0.180 port 33413 ssh2 Failed password for root from 218.92.0.180 port 33413 ssh2 Failed password for root from 218.92.0.180 port 33413 ssh2 Failed password for root from 218.92.0.180 port 33413 ssh2 |
2019-12-06 19:48:38 |
| 92.116.134.0 | attackspam | Dec 6 01:04:43 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.116.134.0 port 47222 ssh2 (target: 158.69.100.138:22, password: dogg1xvoao) Dec 6 01:05:05 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.116.134.0 port 33862 ssh2 (target: 158.69.100.138:22, password: r.r) Dec 6 01:05:21 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.116.134.0 port 44878 ssh2 (target: 158.69.100.138:22, password: password) Dec 6 01:05:36 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.116.134.0 port 52344 ssh2 (target: 158.69.100.138:22, password: 123456) Dec 6 01:06:00 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.116.134.0 port 60328 ssh2 (target: 158.69.100.138:22, password: r.r123) Dec 6 01:06:23 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 92.116.134.0 port 43532 ssh2 (target: 158.69.100.138:22, password: 123456789) Dec 6 01:06:44 wildwolf ssh-honeypotd[26164]: Failed password for r.r fr........ ------------------------------ |
2019-12-06 20:06:24 |
| 122.14.228.229 | attack | detected by Fail2Ban |
2019-12-06 20:13:13 |
| 14.116.192.199 | attack | Host Scan |
2019-12-06 19:45:56 |
| 106.13.109.19 | attack | Dec 6 08:05:43 game-panel sshd[5646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.109.19 Dec 6 08:05:45 game-panel sshd[5646]: Failed password for invalid user joslyn from 106.13.109.19 port 47970 ssh2 Dec 6 08:11:51 game-panel sshd[5935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.109.19 |
2019-12-06 19:33:58 |
| 5.196.29.194 | attackbots | 2019-12-06T05:43:25.894356ns547587 sshd\[13830\]: Invalid user admin from 5.196.29.194 port 34781 2019-12-06T05:43:25.900185ns547587 sshd\[13830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-5-196-29.eu 2019-12-06T05:43:28.410016ns547587 sshd\[13830\]: Failed password for invalid user admin from 5.196.29.194 port 34781 ssh2 2019-12-06T05:51:09.220105ns547587 sshd\[23934\]: Invalid user test from 5.196.29.194 port 33419 ... |
2019-12-06 19:37:15 |
| 77.220.48.163 | attackspam | port scan and connect, tcp 22 (ssh) |
2019-12-06 19:40:04 |
| 152.67.67.89 | attack | Dec 6 07:14:13 mail1 sshd\[28313\]: Invalid user tn from 152.67.67.89 port 57422 Dec 6 07:14:13 mail1 sshd\[28313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.67.89 Dec 6 07:14:15 mail1 sshd\[28313\]: Failed password for invalid user tn from 152.67.67.89 port 57422 ssh2 Dec 6 07:25:06 mail1 sshd\[767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.67.89 user=daemon Dec 6 07:25:08 mail1 sshd\[767\]: Failed password for daemon from 152.67.67.89 port 59336 ssh2 ... |
2019-12-06 19:40:57 |