城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.198.104.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30787
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;252.198.104.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:45:04 CST 2025
;; MSG SIZE rcvd: 108
Host 134.104.198.252.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.104.198.252.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 152.32.191.57 | attackbotsspam | Sep 16 20:25:10 web8 sshd\[15990\]: Invalid user wf from 152.32.191.57 Sep 16 20:25:10 web8 sshd\[15990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.191.57 Sep 16 20:25:12 web8 sshd\[15990\]: Failed password for invalid user wf from 152.32.191.57 port 41560 ssh2 Sep 16 20:29:52 web8 sshd\[18138\]: Invalid user an from 152.32.191.57 Sep 16 20:29:52 web8 sshd\[18138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.191.57 |
2019-09-17 04:45:32 |
| 129.146.168.196 | attackspam | Sep 16 16:31:17 ny01 sshd[27237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.168.196 Sep 16 16:31:18 ny01 sshd[27237]: Failed password for invalid user csgo1 from 129.146.168.196 port 58553 ssh2 Sep 16 16:34:35 ny01 sshd[27808]: Failed password for gnats from 129.146.168.196 port 47989 ssh2 |
2019-09-17 04:39:49 |
| 213.148.198.36 | attackbots | Sep 16 16:29:50 plusreed sshd[23116]: Invalid user nathaniel from 213.148.198.36 ... |
2019-09-17 04:33:52 |
| 37.130.229.2 | attackspambots | Sep 16 19:45:52 game-panel sshd[30401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.130.229.2 Sep 16 19:45:54 game-panel sshd[30401]: Failed password for invalid user Administrator from 37.130.229.2 port 51106 ssh2 Sep 16 19:50:09 game-panel sshd[30587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.130.229.2 |
2019-09-17 04:01:16 |
| 122.195.200.148 | attack | Sep 16 16:12:43 ny01 sshd[23205]: Failed password for root from 122.195.200.148 port 40478 ssh2 Sep 16 16:12:43 ny01 sshd[23203]: Failed password for root from 122.195.200.148 port 43961 ssh2 Sep 16 16:12:44 ny01 sshd[23205]: Failed password for root from 122.195.200.148 port 40478 ssh2 Sep 16 16:12:45 ny01 sshd[23203]: Failed password for root from 122.195.200.148 port 43961 ssh2 |
2019-09-17 04:15:08 |
| 103.115.227.2 | attack | Sep 16 22:35:20 vps647732 sshd[32596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.227.2 Sep 16 22:35:22 vps647732 sshd[32596]: Failed password for invalid user postgres from 103.115.227.2 port 37090 ssh2 ... |
2019-09-17 04:43:34 |
| 138.186.1.26 | attack | Sep 16 22:27:12 dedicated sshd[22563]: Invalid user yau from 138.186.1.26 port 43206 Sep 16 22:27:12 dedicated sshd[22563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.186.1.26 Sep 16 22:27:12 dedicated sshd[22563]: Invalid user yau from 138.186.1.26 port 43206 Sep 16 22:27:14 dedicated sshd[22563]: Failed password for invalid user yau from 138.186.1.26 port 43206 ssh2 Sep 16 22:31:31 dedicated sshd[23128]: Invalid user admin from 138.186.1.26 port 27949 |
2019-09-17 04:43:00 |
| 106.13.150.14 | attackspambots | Sep 16 10:31:21 hiderm sshd\[3738\]: Invalid user hadoop from 106.13.150.14 Sep 16 10:31:21 hiderm sshd\[3738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.150.14 Sep 16 10:31:22 hiderm sshd\[3738\]: Failed password for invalid user hadoop from 106.13.150.14 port 49082 ssh2 Sep 16 10:34:33 hiderm sshd\[4030\]: Invalid user splunk from 106.13.150.14 Sep 16 10:34:33 hiderm sshd\[4030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.150.14 |
2019-09-17 04:46:04 |
| 212.129.128.249 | attackbotsspam | Sep 16 15:50:29 xtremcommunity sshd\[154528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.128.249 user=root Sep 16 15:50:30 xtremcommunity sshd\[154528\]: Failed password for root from 212.129.128.249 port 55329 ssh2 Sep 16 15:55:17 xtremcommunity sshd\[154646\]: Invalid user svnroot from 212.129.128.249 port 49901 Sep 16 15:55:17 xtremcommunity sshd\[154646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.128.249 Sep 16 15:55:19 xtremcommunity sshd\[154646\]: Failed password for invalid user svnroot from 212.129.128.249 port 49901 ssh2 ... |
2019-09-17 04:02:21 |
| 125.130.110.20 | attackbots | Sep 16 09:59:13 web9 sshd\[26345\]: Invalid user 12345 from 125.130.110.20 Sep 16 09:59:13 web9 sshd\[26345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20 Sep 16 09:59:14 web9 sshd\[26345\]: Failed password for invalid user 12345 from 125.130.110.20 port 36792 ssh2 Sep 16 10:03:15 web9 sshd\[27094\]: Invalid user melitta from 125.130.110.20 Sep 16 10:03:15 web9 sshd\[27094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20 |
2019-09-17 04:03:52 |
| 114.246.11.178 | attack | Sep 16 22:22:39 lnxmysql61 sshd[362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.246.11.178 |
2019-09-17 04:28:52 |
| 197.248.16.118 | attackspambots | Sep 16 20:58:22 pornomens sshd\[30114\]: Invalid user eoffice from 197.248.16.118 port 38816 Sep 16 20:58:22 pornomens sshd\[30114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118 Sep 16 20:58:24 pornomens sshd\[30114\]: Failed password for invalid user eoffice from 197.248.16.118 port 38816 ssh2 ... |
2019-09-17 04:13:48 |
| 174.138.27.16 | attack | Sep 16 10:08:14 friendsofhawaii sshd\[19991\]: Invalid user amarco from 174.138.27.16 Sep 16 10:08:14 friendsofhawaii sshd\[19991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.27.16 Sep 16 10:08:16 friendsofhawaii sshd\[19991\]: Failed password for invalid user amarco from 174.138.27.16 port 57674 ssh2 Sep 16 10:12:54 friendsofhawaii sshd\[20525\]: Invalid user biable from 174.138.27.16 Sep 16 10:12:54 friendsofhawaii sshd\[20525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.27.16 |
2019-09-17 04:14:37 |
| 14.204.136.125 | attack | Sep 16 22:02:00 s64-1 sshd[15259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.136.125 Sep 16 22:02:02 s64-1 sshd[15259]: Failed password for invalid user chrome from 14.204.136.125 port 33391 ssh2 Sep 16 22:06:20 s64-1 sshd[15354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.136.125 ... |
2019-09-17 04:17:08 |
| 49.64.187.51 | attackbotsspam | Telnet Server BruteForce Attack |
2019-09-17 04:23:22 |