城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.134.139.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37643
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;21.134.139.153. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 07:06:04 CST 2025
;; MSG SIZE rcvd: 107
Host 153.139.134.21.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 153.139.134.21.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 110.164.189.53 | attackbots | Aug 5 23:49:38 vps639187 sshd\[18741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.189.53 user=root Aug 5 23:49:40 vps639187 sshd\[18741\]: Failed password for root from 110.164.189.53 port 51478 ssh2 Aug 5 23:53:50 vps639187 sshd\[18862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.164.189.53 user=root ... |
2020-08-06 06:25:08 |
| 223.4.66.84 | attackbotsspam | 2020-08-05T15:39:43.112157morrigan.ad5gb.com sshd[3553452]: Failed password for root from 223.4.66.84 port 11298 ssh2 2020-08-05T15:39:45.490429morrigan.ad5gb.com sshd[3553452]: Disconnected from authenticating user root 223.4.66.84 port 11298 [preauth] |
2020-08-06 06:19:43 |
| 49.235.37.232 | attackspam | Failed password for root from 49.235.37.232 port 46376 ssh2 |
2020-08-06 06:44:31 |
| 37.201.193.174 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2020-08-06 06:09:50 |
| 45.55.219.114 | attackbots | Aug 5 22:39:23 mout sshd[22265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.219.114 user=root Aug 5 22:39:24 mout sshd[22265]: Failed password for root from 45.55.219.114 port 40792 ssh2 Aug 5 22:39:25 mout sshd[22265]: Disconnected from authenticating user root 45.55.219.114 port 40792 [preauth] |
2020-08-06 06:32:30 |
| 13.81.248.153 | attackbots | Aug 5 16:39:29 mail sshd\[9307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.81.248.153 user=root ... |
2020-08-06 06:27:10 |
| 132.232.68.172 | attackbotsspam | Multiple web server 500 error code (Internal Error). |
2020-08-06 06:22:44 |
| 122.114.239.22 | attack | Aug 5 21:09:27 plex-server sshd[29095]: Failed password for root from 122.114.239.22 port 38608 ssh2 Aug 5 21:10:39 plex-server sshd[29165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.239.22 user=root Aug 5 21:10:41 plex-server sshd[29165]: Failed password for root from 122.114.239.22 port 53702 ssh2 Aug 5 21:11:53 plex-server sshd[29275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.239.22 user=root Aug 5 21:11:55 plex-server sshd[29275]: Failed password for root from 122.114.239.22 port 40556 ssh2 ... |
2020-08-06 06:12:00 |
| 49.235.83.156 | attack | Aug 5 23:38:23 rancher-0 sshd[821936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.83.156 user=root Aug 5 23:38:25 rancher-0 sshd[821936]: Failed password for root from 49.235.83.156 port 59638 ssh2 ... |
2020-08-06 06:33:08 |
| 150.95.31.150 | attackspambots | Aug 6 03:39:10 itv-usvr-01 sshd[28278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.31.150 user=root Aug 6 03:39:12 itv-usvr-01 sshd[28278]: Failed password for root from 150.95.31.150 port 60502 ssh2 Aug 6 03:41:51 itv-usvr-01 sshd[28374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.31.150 user=root Aug 6 03:41:53 itv-usvr-01 sshd[28374]: Failed password for root from 150.95.31.150 port 60344 ssh2 Aug 6 03:44:44 itv-usvr-01 sshd[28495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.31.150 user=root Aug 6 03:44:46 itv-usvr-01 sshd[28495]: Failed password for root from 150.95.31.150 port 34222 ssh2 |
2020-08-06 06:17:11 |
| 51.77.146.156 | attackspambots | Aug 6 00:15:38 vserver sshd\[17364\]: Failed password for root from 51.77.146.156 port 43126 ssh2Aug 6 00:17:50 vserver sshd\[17390\]: Failed password for root from 51.77.146.156 port 48192 ssh2Aug 6 00:19:56 vserver sshd\[17404\]: Failed password for root from 51.77.146.156 port 53256 ssh2Aug 6 00:22:06 vserver sshd\[17424\]: Failed password for root from 51.77.146.156 port 58344 ssh2 ... |
2020-08-06 06:37:11 |
| 148.251.195.14 | attack | 20 attempts against mh-misbehave-ban on flare |
2020-08-06 06:17:40 |
| 175.24.81.123 | attackspam | 2020-08-06T00:15:22.706175+02:00 |
2020-08-06 06:29:58 |
| 177.128.216.5 | attackbotsspam | Aug 5 22:28:43 xeon sshd[25894]: Failed password for root from 177.128.216.5 port 48697 ssh2 |
2020-08-06 06:07:32 |
| 194.26.29.12 | attackspambots | Multiport scan : 83 ports scanned 10(x2) 20(x2) 60 70 80 101 123 200 202 303 333 500 606 800 888 909 999 1000 1001 1010 2000 2020 2222 3030 3333 3344 3380 3383 3385 3386 3387 3390(x2) 3393(x2) 3394 3395 3396(x2) 3399(x2) 3400 3401 4000 4004(x2) 4040 4321 4433 4444 5000 5005 5050 5544 5555 5566 6000 6006(x2) 6655 6666(x2) 6677(x2) 7000 7007(x2) 7070 7766 7777 7788 8000 8008(x2) 8080 8899 9090 9988 9999 10001 11000(x2) 11111 12000 13000 ..... |
2020-08-06 06:29:34 |