城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.11.68.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;245.11.68.145. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 04:41:56 CST 2025
;; MSG SIZE rcvd: 106
Host 145.68.11.245.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 145.68.11.245.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.74.67.144 | attackbots | 2019-10-01T09:39:51.473601tmaserv sshd\[26514\]: Invalid user support from 49.74.67.144 port 1523 2019-10-01T09:39:51.478712tmaserv sshd\[26514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.67.144 2019-10-01T09:39:53.534909tmaserv sshd\[26514\]: Failed password for invalid user support from 49.74.67.144 port 1523 ssh2 2019-10-01T09:52:33.509658tmaserv sshd\[27275\]: Invalid user temp from 49.74.67.144 port 3144 2019-10-01T09:52:33.515708tmaserv sshd\[27275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.67.144 2019-10-01T09:52:35.180521tmaserv sshd\[27275\]: Failed password for invalid user temp from 49.74.67.144 port 3144 ssh2 ... |
2019-10-01 15:07:40 |
| 222.186.169.192 | attackbotsspam | Oct 1 08:53:09 dcd-gentoo sshd[20573]: User root from 222.186.169.192 not allowed because none of user's groups are listed in AllowGroups Oct 1 08:53:14 dcd-gentoo sshd[20573]: error: PAM: Authentication failure for illegal user root from 222.186.169.192 Oct 1 08:53:09 dcd-gentoo sshd[20573]: User root from 222.186.169.192 not allowed because none of user's groups are listed in AllowGroups Oct 1 08:53:14 dcd-gentoo sshd[20573]: error: PAM: Authentication failure for illegal user root from 222.186.169.192 Oct 1 08:53:09 dcd-gentoo sshd[20573]: User root from 222.186.169.192 not allowed because none of user's groups are listed in AllowGroups Oct 1 08:53:14 dcd-gentoo sshd[20573]: error: PAM: Authentication failure for illegal user root from 222.186.169.192 Oct 1 08:53:14 dcd-gentoo sshd[20573]: Failed keyboard-interactive/pam for invalid user root from 222.186.169.192 port 36682 ssh2 ... |
2019-10-01 14:53:33 |
| 83.166.251.37 | attackspambots | Sep 30 18:03:53 hanapaa sshd\[1459\]: Invalid user nn from 83.166.251.37 Sep 30 18:03:53 hanapaa sshd\[1459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.166.251.37 Sep 30 18:03:56 hanapaa sshd\[1459\]: Failed password for invalid user nn from 83.166.251.37 port 35772 ssh2 Sep 30 18:08:05 hanapaa sshd\[1794\]: Invalid user csgosrv from 83.166.251.37 Sep 30 18:08:05 hanapaa sshd\[1794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.166.251.37 |
2019-10-01 15:13:51 |
| 37.49.227.12 | attackbots | 10/01/2019-06:56:24.204883 37.49.227.12 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-01 15:01:26 |
| 51.77.192.227 | attackspambots | Oct 1 07:59:43 MK-Soft-Root1 sshd[28660]: Failed password for root from 51.77.192.227 port 44074 ssh2 ... |
2019-10-01 14:34:07 |
| 111.230.110.87 | attack | Oct 1 07:10:38 www2 sshd\[64003\]: Invalid user amavis from 111.230.110.87Oct 1 07:10:40 www2 sshd\[64003\]: Failed password for invalid user amavis from 111.230.110.87 port 51948 ssh2Oct 1 07:14:26 www2 sshd\[64306\]: Invalid user design from 111.230.110.87 ... |
2019-10-01 14:50:55 |
| 116.196.82.52 | attackspam | ssh intrusion attempt |
2019-10-01 14:29:51 |
| 148.70.11.98 | attackbots | Sep 30 20:15:32 php1 sshd\[10185\]: Invalid user usuario1 from 148.70.11.98 Sep 30 20:15:32 php1 sshd\[10185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.11.98 Sep 30 20:15:34 php1 sshd\[10185\]: Failed password for invalid user usuario1 from 148.70.11.98 port 53676 ssh2 Sep 30 20:20:51 php1 sshd\[10626\]: Invalid user ioshua from 148.70.11.98 Sep 30 20:20:51 php1 sshd\[10626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.11.98 |
2019-10-01 14:35:18 |
| 159.203.122.149 | attackbots | Oct 1 04:08:14 unicornsoft sshd\[23044\]: Invalid user cactiuser from 159.203.122.149 Oct 1 04:08:14 unicornsoft sshd\[23044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.122.149 Oct 1 04:08:16 unicornsoft sshd\[23044\]: Failed password for invalid user cactiuser from 159.203.122.149 port 54130 ssh2 |
2019-10-01 14:44:01 |
| 79.137.34.248 | attackbotsspam | Sep 30 02:33:42 plesk sshd[16762]: Failed password for sshd from 79.137.34.248 port 42085 ssh2 Sep 30 02:33:42 plesk sshd[16762]: Received disconnect from 79.137.34.248: 11: Bye Bye [preauth] Sep 30 02:41:11 plesk sshd[17291]: Invalid user fabrizio from 79.137.34.248 Sep 30 02:41:13 plesk sshd[17291]: Failed password for invalid user fabrizio from 79.137.34.248 port 50408 ssh2 Sep 30 02:41:13 plesk sshd[17291]: Received disconnect from 79.137.34.248: 11: Bye Bye [preauth] Sep 30 02:44:35 plesk sshd[17432]: Invalid user service from 79.137.34.248 Sep 30 02:44:37 plesk sshd[17432]: Failed password for invalid user service from 79.137.34.248 port 42957 ssh2 Sep 30 02:44:37 plesk sshd[17432]: Received disconnect from 79.137.34.248: 11: Bye Bye [preauth] Sep 30 02:47:59 plesk sshd[17608]: Invalid user user from 79.137.34.248 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=79.137.34.248 |
2019-10-01 14:56:51 |
| 190.217.9.210 | attackbots | Oct 1 05:52:23 [munged] sshd[756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.217.9.210 |
2019-10-01 14:39:14 |
| 178.62.76.138 | attack | kidness.family 178.62.76.138 \[01/Oct/2019:06:57:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 5615 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" kidness.family 178.62.76.138 \[01/Oct/2019:06:57:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 5569 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-01 14:32:10 |
| 145.239.82.192 | attack | 2019-10-01T02:11:15.609906ns525875 sshd\[31780\]: Invalid user romanova from 145.239.82.192 port 36926 2019-10-01T02:11:15.617735ns525875 sshd\[31780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-145-239-82.eu 2019-10-01T02:11:17.097996ns525875 sshd\[31780\]: Failed password for invalid user romanova from 145.239.82.192 port 36926 ssh2 2019-10-01T02:14:57.746629ns525875 sshd\[2998\]: Invalid user b from 145.239.82.192 port 49246 ... |
2019-10-01 14:44:20 |
| 106.12.219.163 | attackspam | 2019-09-30T23:42:57.2735481495-001 sshd\[38920\]: Failed password for invalid user webmast from 106.12.219.163 port 38440 ssh2 2019-09-30T23:55:55.8471421495-001 sshd\[40026\]: Invalid user ftpuser from 106.12.219.163 port 57812 2019-09-30T23:55:55.8524731495-001 sshd\[40026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.219.163 2019-09-30T23:55:57.5986801495-001 sshd\[40026\]: Failed password for invalid user ftpuser from 106.12.219.163 port 57812 ssh2 2019-10-01T00:00:18.2555171495-001 sshd\[40340\]: Invalid user gerrit2 from 106.12.219.163 port 36032 2019-10-01T00:00:18.2639741495-001 sshd\[40340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.219.163 ... |
2019-10-01 14:58:06 |
| 159.65.112.93 | attackbots | Oct 1 05:52:17 srv206 sshd[3761]: Invalid user dtacplayapi from 159.65.112.93 ... |
2019-10-01 14:47:22 |