城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.55.119.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50246
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;253.55.119.227. IN A
;; AUTHORITY SECTION:
. 470 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023052300 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 00:32:18 CST 2023
;; MSG SIZE rcvd: 107
Host 227.119.55.253.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 227.119.55.253.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.166.232.29 | attack | srv02 Mass scanning activity detected Target: 18508 .. |
2020-07-13 05:27:23 |
| 212.64.54.49 | attackspambots | Jul 12 23:07:34 srv-ubuntu-dev3 sshd[114667]: Invalid user nj from 212.64.54.49 Jul 12 23:07:34 srv-ubuntu-dev3 sshd[114667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.54.49 Jul 12 23:07:34 srv-ubuntu-dev3 sshd[114667]: Invalid user nj from 212.64.54.49 Jul 12 23:07:36 srv-ubuntu-dev3 sshd[114667]: Failed password for invalid user nj from 212.64.54.49 port 57600 ssh2 Jul 12 23:10:14 srv-ubuntu-dev3 sshd[115094]: Invalid user eda from 212.64.54.49 Jul 12 23:10:14 srv-ubuntu-dev3 sshd[115094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.54.49 Jul 12 23:10:14 srv-ubuntu-dev3 sshd[115094]: Invalid user eda from 212.64.54.49 Jul 12 23:10:15 srv-ubuntu-dev3 sshd[115094]: Failed password for invalid user eda from 212.64.54.49 port 36430 ssh2 Jul 12 23:13:01 srv-ubuntu-dev3 sshd[115481]: Invalid user zhangb from 212.64.54.49 ... |
2020-07-13 05:26:55 |
| 213.45.105.233 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-07-13 04:55:16 |
| 40.118.226.96 | attack | Jul 12 22:29:29 buvik sshd[23895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.118.226.96 Jul 12 22:29:31 buvik sshd[23895]: Failed password for invalid user ase from 40.118.226.96 port 38614 ssh2 Jul 12 22:32:52 buvik sshd[24500]: Invalid user eyal from 40.118.226.96 ... |
2020-07-13 04:48:15 |
| 190.144.182.85 | attackspambots | Lines containing failures of 190.144.182.85 Jul 12 21:48:25 icinga sshd[13444]: Invalid user postgres from 190.144.182.85 port 34347 Jul 12 21:48:25 icinga sshd[13444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.182.85 Jul 12 21:48:27 icinga sshd[13444]: Failed password for invalid user postgres from 190.144.182.85 port 34347 ssh2 Jul 12 21:48:27 icinga sshd[13444]: Received disconnect from 190.144.182.85 port 34347:11: Bye Bye [preauth] Jul 12 21:48:27 icinga sshd[13444]: Disconnected from invalid user postgres 190.144.182.85 port 34347 [preauth] Jul 12 21:51:40 icinga sshd[14272]: Invalid user hwz from 190.144.182.85 port 45105 Jul 12 21:51:40 icinga sshd[14272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.182.85 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=190.144.182.85 |
2020-07-13 05:01:11 |
| 129.213.107.56 | attackbots | 2020-07-12T21:57:10.791650ns386461 sshd\[31529\]: Invalid user oracle from 129.213.107.56 port 52738 2020-07-12T21:57:10.796246ns386461 sshd\[31529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.107.56 2020-07-12T21:57:13.315341ns386461 sshd\[31529\]: Failed password for invalid user oracle from 129.213.107.56 port 52738 ssh2 2020-07-12T22:02:18.215019ns386461 sshd\[3739\]: Invalid user xhu from 129.213.107.56 port 44064 2020-07-12T22:02:18.219587ns386461 sshd\[3739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.107.56 ... |
2020-07-13 05:12:48 |
| 51.79.142.79 | attack | Port Scan ... |
2020-07-13 05:28:11 |
| 213.6.239.82 | attackspambots | Jul 12 22:03:22 serwer sshd\[8364\]: Invalid user foo from 213.6.239.82 port 45734 Jul 12 22:03:22 serwer sshd\[8364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.239.82 Jul 12 22:03:24 serwer sshd\[8364\]: Failed password for invalid user foo from 213.6.239.82 port 45734 ssh2 ... |
2020-07-13 04:49:28 |
| 45.252.249.73 | attackspam | Jul 12 17:10:08 george sshd[20499]: Failed password for invalid user admin from 45.252.249.73 port 52896 ssh2 Jul 12 17:12:30 george sshd[20521]: Invalid user oks from 45.252.249.73 port 32882 Jul 12 17:12:30 george sshd[20521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.252.249.73 Jul 12 17:12:32 george sshd[20521]: Failed password for invalid user oks from 45.252.249.73 port 32882 ssh2 Jul 12 17:14:56 george sshd[20539]: Invalid user jv from 45.252.249.73 port 40982 ... |
2020-07-13 05:26:19 |
| 219.250.188.106 | attackspam | Jul 12 20:00:13 onepixel sshd[3873366]: Invalid user student from 219.250.188.106 port 44055 Jul 12 20:00:13 onepixel sshd[3873366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.106 Jul 12 20:00:13 onepixel sshd[3873366]: Invalid user student from 219.250.188.106 port 44055 Jul 12 20:00:14 onepixel sshd[3873366]: Failed password for invalid user student from 219.250.188.106 port 44055 ssh2 Jul 12 20:02:17 onepixel sshd[3874457]: Invalid user exim from 219.250.188.106 port 59609 |
2020-07-13 05:14:12 |
| 120.70.103.27 | attackspam | Jul 12 14:46:13 server1 sshd\[6072\]: Invalid user pe from 120.70.103.27 Jul 12 14:46:13 server1 sshd\[6072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.103.27 Jul 12 14:46:14 server1 sshd\[6072\]: Failed password for invalid user pe from 120.70.103.27 port 37189 ssh2 Jul 12 14:50:52 server1 sshd\[7621\]: Invalid user casino from 120.70.103.27 Jul 12 14:50:52 server1 sshd\[7621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.103.27 ... |
2020-07-13 04:59:43 |
| 58.250.164.246 | attack | Jul 12 21:50:14 mail sshd[16881]: Failed password for invalid user joao from 58.250.164.246 port 56406 ssh2 ... |
2020-07-13 05:13:17 |
| 200.229.194.158 | attack | Jul 12 22:02:19 mailserver sshd\[23124\]: Invalid user admin from 200.229.194.158 ... |
2020-07-13 05:07:35 |
| 222.186.190.2 | attackspambots | Jul 12 22:17:56 ajax sshd[31113]: Failed password for root from 222.186.190.2 port 55076 ssh2 Jul 12 22:18:00 ajax sshd[31113]: Failed password for root from 222.186.190.2 port 55076 ssh2 |
2020-07-13 05:18:19 |
| 222.186.180.142 | attackspambots | Failed password for invalid user from 222.186.180.142 port 15504 ssh2 |
2020-07-13 05:08:30 |