城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.18.102.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20476
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.18.102.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024120900 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 01:22:17 CST 2024
;; MSG SIZE rcvd: 107
Host 134.102.18.199.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.102.18.199.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.1.100 | attack | Jul 28 17:04:44 mail sshd\[29990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100 user=root Jul 28 17:04:47 mail sshd\[29990\]: Failed password for root from 142.93.1.100 port 50428 ssh2 Jul 28 17:09:33 mail sshd\[30733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100 user=root Jul 28 17:09:35 mail sshd\[30733\]: Failed password for root from 142.93.1.100 port 45022 ssh2 Jul 28 17:14:31 mail sshd\[31364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100 user=root |
2019-07-28 23:36:29 |
| 195.206.105.217 | attackspam | Jul 28 07:54:34 cac1d2 sshd\[26423\]: Invalid user admin from 195.206.105.217 port 50736 Jul 28 07:54:34 cac1d2 sshd\[26423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.206.105.217 Jul 28 07:54:36 cac1d2 sshd\[26423\]: Failed password for invalid user admin from 195.206.105.217 port 50736 ssh2 ... |
2019-07-28 23:32:25 |
| 45.224.129.190 | attack | SSH Bruteforce @ SigaVPN honeypot |
2019-07-29 00:12:22 |
| 119.28.73.77 | attackspam | Jul 28 16:19:19 dedicated sshd[9241]: Invalid user idctest!@# from 119.28.73.77 port 51676 |
2019-07-28 23:51:02 |
| 122.195.200.36 | attackbotsspam | 2019-07-28T15:52:51.558430abusebot-6.cloudsearch.cf sshd\[2479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.36 user=root |
2019-07-28 23:53:50 |
| 89.46.74.105 | attackspam | Jul 28 18:10:42 apollo sshd\[6992\]: Failed password for root from 89.46.74.105 port 34934 ssh2Jul 28 18:15:05 apollo sshd\[6994\]: Failed password for root from 89.46.74.105 port 58118 ssh2Jul 28 18:19:39 apollo sshd\[7001\]: Failed password for root from 89.46.74.105 port 53078 ssh2 ... |
2019-07-29 00:45:34 |
| 121.144.118.2 | attackspam | Jul 28 10:15:00 aat-srv002 sshd[14001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.144.118.2 Jul 28 10:15:02 aat-srv002 sshd[14001]: Failed password for invalid user chinas from 121.144.118.2 port 56778 ssh2 Jul 28 10:20:31 aat-srv002 sshd[14122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.144.118.2 Jul 28 10:20:32 aat-srv002 sshd[14122]: Failed password for invalid user ifidc@info7799 from 121.144.118.2 port 51338 ssh2 ... |
2019-07-28 23:40:06 |
| 141.8.196.131 | attackspam | Lines containing failures of 141.8.196.131 Jul 28 05:00:49 kopano sshd[21334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.8.196.131 user=r.r Jul 28 05:00:51 kopano sshd[21334]: Failed password for r.r from 141.8.196.131 port 48316 ssh2 Jul 28 05:00:51 kopano sshd[21334]: Received disconnect from 141.8.196.131 port 48316:11: Bye Bye [preauth] Jul 28 05:00:51 kopano sshd[21334]: Disconnected from authenticating user r.r 141.8.196.131 port 48316 [preauth] Jul 28 05:19:55 kopano sshd[22826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.8.196.131 user=r.r Jul 28 05:19:57 kopano sshd[22826]: Failed password for r.r from 141.8.196.131 port 52777 ssh2 Jul 28 05:19:57 kopano sshd[22826]: Received disconnect from 141.8.196.131 port 52777:11: Bye Bye [preauth] Jul 28 05:19:57 kopano sshd[22826]: Disconnected from authenticating user r.r 141.8.196.131 port 52777 [preauth] Jul 28 05:32:3........ ------------------------------ |
2019-07-29 00:19:09 |
| 110.80.25.13 | attackspambots | 404 NOT FOUND |
2019-07-28 23:56:41 |
| 216.218.206.107 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2019-07-28 23:45:38 |
| 104.231.97.127 | attackspam | DATE:2019-07-28 17:34:16, IP:104.231.97.127, PORT:ssh brute force auth on SSH service (patata) |
2019-07-29 00:24:07 |
| 52.63.48.248 | attack | xmlrpc attack |
2019-07-29 00:32:16 |
| 134.73.129.107 | attackspam | 2019-07-28T11:24:41.648249abusebot-2.cloudsearch.cf sshd\[27587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.129.107 user=root |
2019-07-29 00:21:08 |
| 178.254.25.136 | attackbotsspam | Jul 28 17:26:22 dedicated sshd[15270]: Failed password for invalid user desih from 178.254.25.136 port 37334 ssh2 Jul 28 17:26:19 dedicated sshd[15270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.254.25.136 Jul 28 17:26:19 dedicated sshd[15270]: Invalid user desih from 178.254.25.136 port 37334 Jul 28 17:26:22 dedicated sshd[15270]: Failed password for invalid user desih from 178.254.25.136 port 37334 ssh2 Jul 28 17:30:34 dedicated sshd[15700]: Invalid user @mima from 178.254.25.136 port 36748 |
2019-07-28 23:35:41 |
| 216.75.6.218 | attackspambots | Jul 28 06:34:52 xb3 sshd[29826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.75.6.218 user=r.r Jul 28 06:34:53 xb3 sshd[29826]: Failed password for r.r from 216.75.6.218 port 47552 ssh2 Jul 28 06:34:54 xb3 sshd[29826]: Received disconnect from 216.75.6.218: 11: Bye Bye [preauth] Jul 28 06:39:33 xb3 sshd[26505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.75.6.218 user=r.r Jul 28 06:39:35 xb3 sshd[26505]: Failed password for r.r from 216.75.6.218 port 43952 ssh2 Jul 28 06:39:35 xb3 sshd[26505]: Received disconnect from 216.75.6.218: 11: Bye Bye [preauth] Jul 28 06:44:19 xb3 sshd[26112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.75.6.218 user=r.r Jul 28 06:44:21 xb3 sshd[26112]: Failed password for r.r from 216.75.6.218 port 40344 ssh2 Jul 28 06:44:21 xb3 sshd[26112]: Received disconnect from 216.75.6.218: 11: Bye Bye [preaut........ ------------------------------- |
2019-07-29 00:23:36 |