城市(city): Abilene
省份(region): Texas
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.76.118.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.76.118.197. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:00:52 CST 2025
;; MSG SIZE rcvd: 107
Host 197.118.76.214.in-addr.arpa not found: 2(SERVFAIL)
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
197.118.76.214.in-addr.arpa name = dha-118-197.health.mil.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.199.185.42 | attack | Aug 28 08:24:25 dev0-dcfr-rnet sshd[10467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.185.42 Aug 28 08:24:27 dev0-dcfr-rnet sshd[10467]: Failed password for invalid user b2b from 128.199.185.42 port 57396 ssh2 Aug 28 08:29:03 dev0-dcfr-rnet sshd[10485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.185.42 |
2019-08-28 15:11:24 |
| 159.65.152.201 | attackspambots | Invalid user martin from 159.65.152.201 port 52350 |
2019-08-28 15:17:52 |
| 80.234.44.81 | attackspambots | Aug 28 02:57:15 ny01 sshd[25652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.234.44.81 Aug 28 02:57:17 ny01 sshd[25652]: Failed password for invalid user agenda from 80.234.44.81 port 48922 ssh2 Aug 28 03:01:14 ny01 sshd[26448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.234.44.81 |
2019-08-28 15:15:37 |
| 5.249.145.73 | attack | Aug 28 07:49:54 DAAP sshd[23760]: Invalid user nginx from 5.249.145.73 port 56285 Aug 28 07:49:54 DAAP sshd[23760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.145.73 Aug 28 07:49:54 DAAP sshd[23760]: Invalid user nginx from 5.249.145.73 port 56285 Aug 28 07:49:56 DAAP sshd[23760]: Failed password for invalid user nginx from 5.249.145.73 port 56285 ssh2 Aug 28 07:53:59 DAAP sshd[23817]: Invalid user philip from 5.249.145.73 port 50564 ... |
2019-08-28 15:05:49 |
| 46.101.11.213 | attack | Aug 27 21:28:37 php2 sshd\[14032\]: Invalid user jasmine from 46.101.11.213 Aug 27 21:28:37 php2 sshd\[14032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.11.213 Aug 27 21:28:39 php2 sshd\[14032\]: Failed password for invalid user jasmine from 46.101.11.213 port 56618 ssh2 Aug 27 21:32:33 php2 sshd\[14382\]: Invalid user carla from 46.101.11.213 Aug 27 21:32:33 php2 sshd\[14382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.11.213 |
2019-08-28 15:36:49 |
| 138.36.107.73 | attackbots | Aug 28 09:34:28 plex sshd[14258]: Invalid user tommy from 138.36.107.73 port 46938 |
2019-08-28 15:40:07 |
| 106.12.132.187 | attack | Aug 28 08:38:24 v22019058497090703 sshd[16597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187 Aug 28 08:38:26 v22019058497090703 sshd[16597]: Failed password for invalid user sergey from 106.12.132.187 port 33764 ssh2 Aug 28 08:44:59 v22019058497090703 sshd[17208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187 ... |
2019-08-28 15:03:02 |
| 45.245.46.1 | attack | Aug 28 13:32:27 itv-usvr-01 sshd[17225]: Invalid user toni from 45.245.46.1 Aug 28 13:32:27 itv-usvr-01 sshd[17225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.245.46.1 Aug 28 13:32:27 itv-usvr-01 sshd[17225]: Invalid user toni from 45.245.46.1 Aug 28 13:32:28 itv-usvr-01 sshd[17225]: Failed password for invalid user toni from 45.245.46.1 port 59173 ssh2 Aug 28 13:37:49 itv-usvr-01 sshd[17394]: Invalid user auditor from 45.245.46.1 |
2019-08-28 15:42:33 |
| 92.253.52.54 | attackbots | Aug 27 18:22:23 localhost kernel: [682358.597586] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=92.253.52.54 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=24866 PROTO=TCP SPT=37968 DPT=52869 WINDOW=48253 RES=0x00 SYN URGP=0 Aug 27 18:22:23 localhost kernel: [682358.597617] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=92.253.52.54 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=24866 PROTO=TCP SPT=37968 DPT=52869 SEQ=758669438 ACK=0 WINDOW=48253 RES=0x00 SYN URGP=0 Aug 28 00:26:20 localhost kernel: [704196.206198] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=92.253.52.54 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=23815 PROTO=TCP SPT=37968 DPT=52869 WINDOW=48253 RES=0x00 SYN URGP=0 Aug 28 00:26:20 localhost kernel: [704196.206230] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=92.253.52.54 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 |
2019-08-28 15:35:19 |
| 43.227.66.152 | attack | Aug 28 09:19:24 vps01 sshd[2818]: Failed password for root from 43.227.66.152 port 54162 ssh2 |
2019-08-28 15:38:16 |
| 104.236.2.45 | attackspambots | Aug 27 20:48:40 aiointranet sshd\[7116\]: Invalid user kwan from 104.236.2.45 Aug 27 20:48:40 aiointranet sshd\[7116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.2.45 Aug 27 20:48:43 aiointranet sshd\[7116\]: Failed password for invalid user kwan from 104.236.2.45 port 49310 ssh2 Aug 27 20:52:53 aiointranet sshd\[7434\]: Invalid user mopps from 104.236.2.45 Aug 27 20:52:53 aiointranet sshd\[7434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.2.45 |
2019-08-28 14:54:25 |
| 37.187.46.74 | attack | Aug 27 21:00:55 lcdev sshd\[28624\]: Invalid user odoo10 from 37.187.46.74 Aug 27 21:00:55 lcdev sshd\[28624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.ip-37-187-46.eu Aug 27 21:00:57 lcdev sshd\[28624\]: Failed password for invalid user odoo10 from 37.187.46.74 port 49784 ssh2 Aug 27 21:07:16 lcdev sshd\[29219\]: Invalid user gabe from 37.187.46.74 Aug 27 21:07:16 lcdev sshd\[29219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.ip-37-187-46.eu |
2019-08-28 15:16:44 |
| 200.29.32.143 | attackbots | Aug 28 02:11:56 aat-srv002 sshd[3233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.32.143 Aug 28 02:11:58 aat-srv002 sshd[3233]: Failed password for invalid user mysquel from 200.29.32.143 port 44400 ssh2 Aug 28 02:17:04 aat-srv002 sshd[3342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.32.143 Aug 28 02:17:06 aat-srv002 sshd[3342]: Failed password for invalid user vincent from 200.29.32.143 port 60956 ssh2 ... |
2019-08-28 15:39:33 |
| 42.159.87.72 | attackspam | Aug 28 08:39:44 SilenceServices sshd[24947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.87.72 Aug 28 08:39:45 SilenceServices sshd[24947]: Failed password for invalid user drive from 42.159.87.72 port 59550 ssh2 Aug 28 08:44:31 SilenceServices sshd[26797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.159.87.72 |
2019-08-28 15:31:28 |
| 51.75.29.61 | attackbotsspam | Aug 28 05:16:09 work-partkepr sshd\[18145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.29.61 user=root Aug 28 05:16:11 work-partkepr sshd\[18145\]: Failed password for root from 51.75.29.61 port 42674 ssh2 ... |
2019-08-28 15:12:01 |