城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.214.140.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41759
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.214.140.240. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 13:44:53 CST 2025
;; MSG SIZE rcvd: 106
240.140.214.2.in-addr.arpa domain name pointer dynamic-002-214-140-240.2.214.pool.telefonica.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
240.140.214.2.in-addr.arpa name = dynamic-002-214-140-240.2.214.pool.telefonica.de.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 223.223.194.101 | attack | Brute%20Force%20SSH |
2020-09-28 19:34:59 |
| 49.235.144.143 | attackbots | Sep 28 12:11:58 rocket sshd[9650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.144.143 Sep 28 12:12:00 rocket sshd[9650]: Failed password for invalid user easy from 49.235.144.143 port 36412 ssh2 ... |
2020-09-28 19:29:15 |
| 207.6.31.101 | attackbots | 2020-09-27T20:33:58.651167vps1033 sshd[20175]: Invalid user admin from 207.6.31.101 port 59981 2020-09-27T20:33:58.745400vps1033 sshd[20175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.6.31.101 2020-09-27T20:33:58.651167vps1033 sshd[20175]: Invalid user admin from 207.6.31.101 port 59981 2020-09-27T20:34:00.621372vps1033 sshd[20175]: Failed password for invalid user admin from 207.6.31.101 port 59981 ssh2 2020-09-27T20:34:01.733732vps1033 sshd[20375]: Invalid user admin from 207.6.31.101 port 60155 ... |
2020-09-28 19:43:20 |
| 34.87.115.177 | attack | Sep 28 03:45:59 ny01 sshd[9695]: Failed password for root from 34.87.115.177 port 1118 ssh2 Sep 28 03:50:04 ny01 sshd[10242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.115.177 Sep 28 03:50:06 ny01 sshd[10242]: Failed password for invalid user ubuntu from 34.87.115.177 port 1103 ssh2 |
2020-09-28 19:55:25 |
| 106.13.75.154 | attackbots | Sep 28 07:34:33 Tower sshd[4949]: Connection from 106.13.75.154 port 46886 on 192.168.10.220 port 22 rdomain "" Sep 28 07:34:35 Tower sshd[4949]: Invalid user miguel from 106.13.75.154 port 46886 Sep 28 07:34:35 Tower sshd[4949]: error: Could not get shadow information for NOUSER Sep 28 07:34:35 Tower sshd[4949]: Failed password for invalid user miguel from 106.13.75.154 port 46886 ssh2 Sep 28 07:34:36 Tower sshd[4949]: Received disconnect from 106.13.75.154 port 46886:11: Bye Bye [preauth] Sep 28 07:34:36 Tower sshd[4949]: Disconnected from invalid user miguel 106.13.75.154 port 46886 [preauth] |
2020-09-28 19:41:39 |
| 218.92.0.251 | attackspam | $f2bV_matches |
2020-09-28 19:25:31 |
| 60.220.185.61 | attackbots | Sep 28 12:45:15 inter-technics sshd[9079]: Invalid user gaurav from 60.220.185.61 port 57262 Sep 28 12:45:15 inter-technics sshd[9079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.185.61 Sep 28 12:45:15 inter-technics sshd[9079]: Invalid user gaurav from 60.220.185.61 port 57262 Sep 28 12:45:17 inter-technics sshd[9079]: Failed password for invalid user gaurav from 60.220.185.61 port 57262 ssh2 Sep 28 12:49:23 inter-technics sshd[9452]: Invalid user itsupport from 60.220.185.61 port 33766 ... |
2020-09-28 19:48:14 |
| 154.8.151.81 | attackbots | Sep 28 03:50:41 plex-server sshd[3599411]: Invalid user gerald from 154.8.151.81 port 44038 Sep 28 03:50:41 plex-server sshd[3599411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.151.81 Sep 28 03:50:41 plex-server sshd[3599411]: Invalid user gerald from 154.8.151.81 port 44038 Sep 28 03:50:43 plex-server sshd[3599411]: Failed password for invalid user gerald from 154.8.151.81 port 44038 ssh2 Sep 28 03:54:13 plex-server sshd[3600847]: Invalid user gavin from 154.8.151.81 port 33104 ... |
2020-09-28 19:54:13 |
| 117.211.192.70 | attackbotsspam | 2020-09-28T11:41:27.127881shield sshd\[1881\]: Invalid user dayz from 117.211.192.70 port 46856 2020-09-28T11:41:27.138196shield sshd\[1881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.192.70 2020-09-28T11:41:29.578866shield sshd\[1881\]: Failed password for invalid user dayz from 117.211.192.70 port 46856 ssh2 2020-09-28T11:46:31.006158shield sshd\[2756\]: Invalid user rick from 117.211.192.70 port 57344 2020-09-28T11:46:31.015443shield sshd\[2756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.211.192.70 |
2020-09-28 19:56:07 |
| 148.66.132.190 | attackbotsspam | Sep 28 07:57:34 nextcloud sshd\[8903\]: Invalid user guest from 148.66.132.190 Sep 28 07:57:34 nextcloud sshd\[8903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 Sep 28 07:57:36 nextcloud sshd\[8903\]: Failed password for invalid user guest from 148.66.132.190 port 55886 ssh2 |
2020-09-28 19:37:03 |
| 134.175.161.251 | attackspambots | Cluster member 67.227.229.95 (US/United States/host.cjthedj97.me) said, DENY 134.175.161.251, Reason:[(sshd) Failed SSH login from 134.175.161.251 (CN/China/-): 1 in the last 3600 secs]; Ports: *; Direction: inout; Trigger: LF_CLUSTER |
2020-09-28 19:55:53 |
| 122.51.72.249 | attack | Sep 28 12:55:23 h2863602 sshd[11165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.72.249 Sep 28 12:55:26 h2863602 sshd[11165]: Failed password for invalid user jeremy from 122.51.72.249 port 53556 ssh2 ... |
2020-09-28 19:47:13 |
| 41.66.227.88 | attackbots | Lines containing failures of 41.66.227.88 Sep 27 22:34:49 shared10 sshd[19356]: Invalid user admin from 41.66.227.88 port 35708 Sep 27 22:34:49 shared10 sshd[19356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.66.227.88 Sep 27 22:34:51 shared10 sshd[19356]: Failed password for invalid user admin from 41.66.227.88 port 35708 ssh2 Sep 27 22:34:51 shared10 sshd[19356]: Connection closed by invalid user admin 41.66.227.88 port 35708 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=41.66.227.88 |
2020-09-28 19:57:44 |
| 201.80.21.131 | attack | $f2bV_matches |
2020-09-28 19:45:47 |
| 101.96.133.238 | attackspam | Sep 28 05:45:26 ws22vmsma01 sshd[146919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.96.133.238 Sep 28 05:45:27 ws22vmsma01 sshd[146919]: Failed password for invalid user tst from 101.96.133.238 port 42086 ssh2 ... |
2020-09-28 19:22:30 |