城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.146.91.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40707
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;217.146.91.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121700 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 17 14:42:07 CST 2025
;; MSG SIZE rcvd: 105
1.91.146.217.in-addr.arpa domain name pointer sw-r9.u7-8.ldn.as25369.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
1.91.146.217.in-addr.arpa name = sw-r9.u7-8.ldn.as25369.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 129.211.38.207 | attack | May 26 19:59:35 legacy sshd[1458]: Failed password for root from 129.211.38.207 port 47232 ssh2 May 26 20:03:26 legacy sshd[1562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.38.207 May 26 20:03:28 legacy sshd[1562]: Failed password for invalid user hellinga from 129.211.38.207 port 37604 ssh2 ... |
2020-05-27 04:03:36 |
| 185.175.93.24 | attackbotsspam | firewall-block, port(s): 5900/tcp, 5912/tcp, 5914/tcp, 5915/tcp |
2020-05-27 04:02:00 |
| 37.49.226.32 | attackspam | May 26 **REMOVED** sshd\[24020\]: Invalid user "root from 37.49.226.32 May 26 **REMOVED** sshd\[24022\]: Invalid user "default from 37.49.226.32 May 26 **REMOVED** sshd\[24024\]: Invalid user "support from 37.49.226.32 |
2020-05-27 04:29:59 |
| 51.83.42.66 | attackbots | 2020-05-26T18:38:14.340936abusebot-7.cloudsearch.cf sshd[29582]: Invalid user butter from 51.83.42.66 port 51089 2020-05-26T18:38:14.348117abusebot-7.cloudsearch.cf sshd[29582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.ip-51-83-42.eu 2020-05-26T18:38:14.340936abusebot-7.cloudsearch.cf sshd[29582]: Invalid user butter from 51.83.42.66 port 51089 2020-05-26T18:38:16.085417abusebot-7.cloudsearch.cf sshd[29582]: Failed password for invalid user butter from 51.83.42.66 port 51089 ssh2 2020-05-26T18:41:34.740526abusebot-7.cloudsearch.cf sshd[29804]: Invalid user admin from 51.83.42.66 port 46842 2020-05-26T18:41:34.746485abusebot-7.cloudsearch.cf sshd[29804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.ip-51-83-42.eu 2020-05-26T18:41:34.740526abusebot-7.cloudsearch.cf sshd[29804]: Invalid user admin from 51.83.42.66 port 46842 2020-05-26T18:41:37.105252abusebot-7.cloudsearch.cf sshd[29804]: Faile ... |
2020-05-27 04:22:56 |
| 96.114.71.146 | attackbots | May 26 20:42:34 vserver sshd\[13453\]: Failed password for root from 96.114.71.146 port 34428 ssh2May 26 20:47:13 vserver sshd\[13521\]: Invalid user muonline from 96.114.71.146May 26 20:47:15 vserver sshd\[13521\]: Failed password for invalid user muonline from 96.114.71.146 port 43062 ssh2May 26 20:51:52 vserver sshd\[13633\]: Failed password for root from 96.114.71.146 port 51660 ssh2 ... |
2020-05-27 04:22:43 |
| 182.75.139.26 | attackspambots | May 26 21:01:11 s1 sshd\[10817\]: User root from 182.75.139.26 not allowed because not listed in AllowUsers May 26 21:01:11 s1 sshd\[10817\]: Failed password for invalid user root from 182.75.139.26 port 64070 ssh2 May 26 21:02:55 s1 sshd\[11830\]: User root from 182.75.139.26 not allowed because not listed in AllowUsers May 26 21:02:55 s1 sshd\[11830\]: Failed password for invalid user root from 182.75.139.26 port 47157 ssh2 May 26 21:04:40 s1 sshd\[12087\]: Invalid user test from 182.75.139.26 port 47705 May 26 21:04:40 s1 sshd\[12087\]: Failed password for invalid user test from 182.75.139.26 port 47705 ssh2 ... |
2020-05-27 04:04:34 |
| 79.251.155.214 | attack | Automatic report - Port Scan Attack |
2020-05-27 04:11:12 |
| 139.59.13.53 | attackspambots | SSH fail RA |
2020-05-27 04:35:36 |
| 123.207.235.247 | attackbotsspam | May 26 13:42:38 NPSTNNYC01T sshd[9201]: Failed password for root from 123.207.235.247 port 42128 ssh2 May 26 13:45:47 NPSTNNYC01T sshd[9529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.235.247 May 26 13:45:49 NPSTNNYC01T sshd[9529]: Failed password for invalid user cisco from 123.207.235.247 port 55086 ssh2 ... |
2020-05-27 04:26:03 |
| 196.52.43.95 | attackbotsspam |
|
2020-05-27 04:29:03 |
| 119.207.126.21 | attackspambots | 2020-05-26T15:43:15.378169abusebot-3.cloudsearch.cf sshd[8538]: Invalid user ftp_test from 119.207.126.21 port 60896 2020-05-26T15:43:15.387534abusebot-3.cloudsearch.cf sshd[8538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.126.21 2020-05-26T15:43:15.378169abusebot-3.cloudsearch.cf sshd[8538]: Invalid user ftp_test from 119.207.126.21 port 60896 2020-05-26T15:43:17.624280abusebot-3.cloudsearch.cf sshd[8538]: Failed password for invalid user ftp_test from 119.207.126.21 port 60896 ssh2 2020-05-26T15:47:34.564567abusebot-3.cloudsearch.cf sshd[8757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.126.21 user=root 2020-05-26T15:47:36.690779abusebot-3.cloudsearch.cf sshd[8757]: Failed password for root from 119.207.126.21 port 39250 ssh2 2020-05-26T15:51:37.124190abusebot-3.cloudsearch.cf sshd[9014]: Invalid user aorban from 119.207.126.21 port 45768 ... |
2020-05-27 04:19:22 |
| 52.185.166.168 | attackbotsspam | User authentication failed- attempting to login to web dim |
2020-05-27 04:01:03 |
| 206.189.26.231 | attackbotsspam | [Tue May 26 10:49:17.312760 2020] [php7:error] [pid 81163] [client 206.189.26.231:54174] script /Library/Server/Web/Data/Sites/interfaithministryservices.com/wp-login.php not found or unable to stat, referer: http://rhondaschienle.com/wp-login.php |
2020-05-27 04:38:11 |
| 49.233.24.148 | attack | May 26 19:58:40 pve1 sshd[5221]: Failed password for root from 49.233.24.148 port 39850 ssh2 May 26 20:03:23 pve1 sshd[7251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.24.148 ... |
2020-05-27 04:07:40 |
| 118.89.229.84 | attack | 2020-05-26T17:43:06.066401sd-86998 sshd[20747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.84 user=root 2020-05-26T17:43:07.399796sd-86998 sshd[20747]: Failed password for root from 118.89.229.84 port 40872 ssh2 2020-05-26T17:47:13.191588sd-86998 sshd[21312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.84 user=root 2020-05-26T17:47:14.434681sd-86998 sshd[21312]: Failed password for root from 118.89.229.84 port 55702 ssh2 2020-05-26T17:51:21.865834sd-86998 sshd[22149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.229.84 user=root 2020-05-26T17:51:23.821552sd-86998 sshd[22149]: Failed password for root from 118.89.229.84 port 42308 ssh2 ... |
2020-05-27 04:27:47 |