城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.20.255.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;207.20.255.34. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 08:47:33 CST 2025
;; MSG SIZE rcvd: 106
Host 34.255.20.207.in-addr.arpa not found: 2(SERVFAIL)
server can't find 207.20.255.34.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 144.217.162.95 | attackbotsspam | FTP Brute-force |
2020-01-10 01:34:58 |
| 159.203.201.47 | attack | 53265/tcp 31371/tcp 17990/tcp... [2019-11-09/2020-01-09]54pkt,43pt.(tcp),5pt.(udp) |
2020-01-10 01:41:57 |
| 202.163.126.134 | attackbotsspam | Jan 9 13:55:19 firewall sshd[1842]: Invalid user wokani from 202.163.126.134 Jan 9 13:55:21 firewall sshd[1842]: Failed password for invalid user wokani from 202.163.126.134 port 51154 ssh2 Jan 9 13:58:45 firewall sshd[1940]: Invalid user ts3 from 202.163.126.134 ... |
2020-01-10 01:48:48 |
| 183.166.136.63 | attackbots | 2020-01-09 07:04:24 dovecot_login authenticator failed for (sltoy) [183.166.136.63]:61959 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangna@lerctr.org) 2020-01-09 07:04:32 dovecot_login authenticator failed for (vkfmg) [183.166.136.63]:61959 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangna@lerctr.org) 2020-01-09 07:04:43 dovecot_login authenticator failed for (jskjh) [183.166.136.63]:61959 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangna@lerctr.org) ... |
2020-01-10 02:04:08 |
| 119.29.65.240 | attackbotsspam | Jan 9 21:03:48 gw1 sshd[8608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.65.240 Jan 9 21:03:50 gw1 sshd[8608]: Failed password for invalid user love from 119.29.65.240 port 57888 ssh2 ... |
2020-01-10 01:45:11 |
| 106.111.139.82 | attackspambots | Telnet/23 MH Probe, BF, Hack - |
2020-01-10 01:59:46 |
| 93.119.134.79 | attack | Telnet/23 MH Probe, BF, Hack - |
2020-01-10 01:47:56 |
| 60.254.40.190 | attackspam | Jan 9 17:27:12 ns382633 sshd\[32264\]: Invalid user pi from 60.254.40.190 port 37596 Jan 9 17:27:12 ns382633 sshd\[32264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.254.40.190 Jan 9 17:27:12 ns382633 sshd\[32263\]: Invalid user pi from 60.254.40.190 port 37592 Jan 9 17:27:12 ns382633 sshd\[32263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.254.40.190 Jan 9 17:27:14 ns382633 sshd\[32264\]: Failed password for invalid user pi from 60.254.40.190 port 37596 ssh2 Jan 9 17:27:14 ns382633 sshd\[32263\]: Failed password for invalid user pi from 60.254.40.190 port 37592 ssh2 |
2020-01-10 01:44:59 |
| 183.80.228.1 | attackbotsspam | Telnet/23 MH Probe, BF, Hack - |
2020-01-10 02:02:38 |
| 91.207.66.152 | attack | Telnet/23 MH Probe, BF, Hack - |
2020-01-10 01:43:47 |
| 54.36.163.141 | attack | Jan 9 15:05:48 SilenceServices sshd[16780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.141 Jan 9 15:05:49 SilenceServices sshd[16780]: Failed password for invalid user leibovitz from 54.36.163.141 port 41586 ssh2 Jan 9 15:08:09 SilenceServices sshd[17728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.163.141 |
2020-01-10 01:39:17 |
| 145.220.24.215 | attack | " " |
2020-01-10 02:11:35 |
| 193.192.97.154 | attackbots | Jan 9 15:52:39 localhost sshd\[14573\]: Invalid user gku from 193.192.97.154 port 54010 Jan 9 15:52:39 localhost sshd\[14573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.192.97.154 Jan 9 15:52:41 localhost sshd\[14573\]: Failed password for invalid user gku from 193.192.97.154 port 54010 ssh2 |
2020-01-10 01:31:47 |
| 176.31.244.63 | attackspambots | Jan 9 14:21:22 ns381471 sshd[25219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.244.63 Jan 9 14:21:24 ns381471 sshd[25219]: Failed password for invalid user znd from 176.31.244.63 port 60689 ssh2 |
2020-01-10 01:49:16 |
| 153.122.84.178 | attackbotsspam | Jan 9 01:50:13 penfold sshd[20212]: Invalid user samba from 153.122.84.178 port 60892 Jan 9 01:50:13 penfold sshd[20212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.122.84.178 Jan 9 01:50:16 penfold sshd[20212]: Failed password for invalid user samba from 153.122.84.178 port 60892 ssh2 Jan 9 01:50:16 penfold sshd[20212]: Received disconnect from 153.122.84.178 port 60892:11: Bye Bye [preauth] Jan 9 01:50:16 penfold sshd[20212]: Disconnected from 153.122.84.178 port 60892 [preauth] Jan 9 02:04:48 penfold sshd[20742]: Invalid user teamspeak1 from 153.122.84.178 port 34120 Jan 9 02:04:48 penfold sshd[20742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.122.84.178 Jan 9 02:04:51 penfold sshd[20742]: Failed password for invalid user teamspeak1 from 153.122.84.178 port 34120 ssh2 Jan 9 02:04:51 penfold sshd[20742]: Received disconnect from 153.122.84.178 port 34120:11: B........ ------------------------------- |
2020-01-10 02:04:42 |