城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.34.84.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22745
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.34.84.158. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 02:43:39 CST 2025
;; MSG SIZE rcvd: 106
b'Host 158.84.34.214.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 214.34.84.158.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 187.189.11.49 | attack | Dec 12 07:43:11 sauna sshd[216055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.11.49 Dec 12 07:43:13 sauna sshd[216055]: Failed password for invalid user support from 187.189.11.49 port 56898 ssh2 ... |
2019-12-12 14:04:27 |
| 103.108.74.91 | attack | Dec 12 05:36:54 zeus sshd[19316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.108.74.91 Dec 12 05:36:56 zeus sshd[19316]: Failed password for invalid user hduser from 103.108.74.91 port 22776 ssh2 Dec 12 05:44:41 zeus sshd[19673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.108.74.91 Dec 12 05:44:44 zeus sshd[19673]: Failed password for invalid user hickox from 103.108.74.91 port 53091 ssh2 |
2019-12-12 14:01:37 |
| 58.250.44.53 | attackspambots | Dec 11 18:48:14 php1 sshd\[1944\]: Invalid user test from 58.250.44.53 Dec 11 18:48:14 php1 sshd\[1944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.44.53 Dec 11 18:48:16 php1 sshd\[1944\]: Failed password for invalid user test from 58.250.44.53 port 24637 ssh2 Dec 11 18:55:18 php1 sshd\[2650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.250.44.53 user=root Dec 11 18:55:20 php1 sshd\[2650\]: Failed password for root from 58.250.44.53 port 49502 ssh2 |
2019-12-12 13:51:22 |
| 46.32.70.248 | attack | Dec 11 19:24:18 web1 sshd\[31075\]: Invalid user napolitano from 46.32.70.248 Dec 11 19:24:18 web1 sshd\[31075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.32.70.248 Dec 11 19:24:20 web1 sshd\[31075\]: Failed password for invalid user napolitano from 46.32.70.248 port 37202 ssh2 Dec 11 19:30:00 web1 sshd\[31629\]: Invalid user guest from 46.32.70.248 Dec 11 19:30:00 web1 sshd\[31629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.32.70.248 |
2019-12-12 13:30:27 |
| 222.186.173.180 | attackspam | Dec 12 06:47:31 dcd-gentoo sshd[1312]: User root from 222.186.173.180 not allowed because none of user's groups are listed in AllowGroups Dec 12 06:47:34 dcd-gentoo sshd[1312]: error: PAM: Authentication failure for illegal user root from 222.186.173.180 Dec 12 06:47:31 dcd-gentoo sshd[1312]: User root from 222.186.173.180 not allowed because none of user's groups are listed in AllowGroups Dec 12 06:47:34 dcd-gentoo sshd[1312]: error: PAM: Authentication failure for illegal user root from 222.186.173.180 Dec 12 06:47:31 dcd-gentoo sshd[1312]: User root from 222.186.173.180 not allowed because none of user's groups are listed in AllowGroups Dec 12 06:47:34 dcd-gentoo sshd[1312]: error: PAM: Authentication failure for illegal user root from 222.186.173.180 Dec 12 06:47:34 dcd-gentoo sshd[1312]: Failed keyboard-interactive/pam for invalid user root from 222.186.173.180 port 34252 ssh2 ... |
2019-12-12 13:49:26 |
| 190.60.75.134 | attack | SSH bruteforce |
2019-12-12 13:42:12 |
| 211.157.179.38 | attackspam | Dec 12 00:09:59 TORMINT sshd\[32606\]: Invalid user kasra from 211.157.179.38 Dec 12 00:09:59 TORMINT sshd\[32606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.157.179.38 Dec 12 00:10:01 TORMINT sshd\[32606\]: Failed password for invalid user kasra from 211.157.179.38 port 48641 ssh2 ... |
2019-12-12 13:37:27 |
| 45.80.64.127 | attackspambots | Dec 12 06:25:20 markkoudstaal sshd[27090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.127 Dec 12 06:25:21 markkoudstaal sshd[27090]: Failed password for invalid user gdm from 45.80.64.127 port 41254 ssh2 Dec 12 06:31:04 markkoudstaal sshd[27814]: Failed password for games from 45.80.64.127 port 44270 ssh2 |
2019-12-12 13:46:27 |
| 159.203.201.124 | attack | " " |
2019-12-12 13:58:26 |
| 77.42.75.218 | attack | " " |
2019-12-12 13:42:49 |
| 39.105.208.39 | attackbotsspam | Dec 11 23:35:39 host sshd\[14497\]: Invalid user test2 from 39.105.208.39Dec 11 23:42:18 host sshd\[17823\]: Invalid user guest from 39.105.208.39Dec 11 23:55:47 host sshd\[23416\]: Invalid user cinstall from 39.105.208.39 ... |
2019-12-12 13:28:58 |
| 125.234.101.33 | attackspambots | Lines containing failures of 125.234.101.33 (max 1000) Dec 12 00:24:38 localhost sshd[24519]: Invalid user rest from 125.234.101.33 port 59162 Dec 12 00:24:38 localhost sshd[24519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.234.101.33 Dec 12 00:24:40 localhost sshd[24519]: Failed password for invalid user rest from 125.234.101.33 port 59162 ssh2 Dec 12 00:24:40 localhost sshd[24519]: Received disconnect from 125.234.101.33 port 59162:11: Bye Bye [preauth] Dec 12 00:24:40 localhost sshd[24519]: Disconnected from invalid user rest 125.234.101.33 port 59162 [preauth] Dec 12 00:50:08 localhost sshd[6252]: User r.r from 125.234.101.33 not allowed because listed in DenyUsers Dec 12 00:50:08 localhost sshd[6252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.234.101.33 user=r.r Dec 12 00:50:09 localhost sshd[6252]: Failed password for invalid user r.r from 125.234.101.33 port 46321........ ------------------------------ |
2019-12-12 13:50:06 |
| 222.186.175.183 | attackbots | Dec 12 11:14:10 vibhu-HP-Z238-Microtower-Workstation sshd\[29076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Dec 12 11:14:12 vibhu-HP-Z238-Microtower-Workstation sshd\[29076\]: Failed password for root from 222.186.175.183 port 22920 ssh2 Dec 12 11:14:30 vibhu-HP-Z238-Microtower-Workstation sshd\[29098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Dec 12 11:14:32 vibhu-HP-Z238-Microtower-Workstation sshd\[29098\]: Failed password for root from 222.186.175.183 port 61902 ssh2 Dec 12 11:14:35 vibhu-HP-Z238-Microtower-Workstation sshd\[29098\]: Failed password for root from 222.186.175.183 port 61902 ssh2 ... |
2019-12-12 13:47:58 |
| 92.137.12.215 | attackspambots | Automatic report - Banned IP Access |
2019-12-12 13:28:09 |
| 180.93.54.211 | attackspam | Unauthorized connection attempt detected from IP address 180.93.54.211 to port 445 |
2019-12-12 13:57:57 |