城市(city): unknown
省份(region): unknown
国家(country): IANA Special-Purpose Address
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.100.150.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;254.100.150.54. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 11:39:03 CST 2025
;; MSG SIZE rcvd: 107
Host 54.150.100.254.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 54.150.100.254.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 124.248.48.105 | attackspam | May 28 06:23:01 www sshd[1910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.248.48.105 user=r.r May 28 06:23:03 www sshd[1910]: Failed password for r.r from 124.248.48.105 port 46590 ssh2 May 28 06:49:27 www sshd[8283]: Invalid user david from 124.248.48.105 May 28 06:49:27 www sshd[8283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.248.48.105 May 28 06:49:29 www sshd[8283]: Failed password for invalid user david from 124.248.48.105 port 43030 ssh2 May 28 06:52:24 www sshd[9077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.248.48.105 user=r.r May 28 06:52:26 www sshd[9077]: Failed password for r.r from 124.248.48.105 port 60276 ssh2 May 28 06:55:28 www sshd[9797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.248.48.105 user=nobody May 28 06:55:30 www sshd[9797]: Failed password ........ ------------------------------- |
2020-06-01 01:43:14 |
| 106.53.2.93 | attackbots | May 28 01:46:30 clarabelen sshd[14382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.2.93 user=r.r May 28 01:46:32 clarabelen sshd[14382]: Failed password for r.r from 106.53.2.93 port 50418 ssh2 May 28 01:46:33 clarabelen sshd[14382]: Received disconnect from 106.53.2.93: 11: Bye Bye [preauth] May 28 01:57:22 clarabelen sshd[15009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.2.93 user=r.r May 28 01:57:24 clarabelen sshd[15009]: Failed password for r.r from 106.53.2.93 port 35914 ssh2 May 28 01:57:24 clarabelen sshd[15009]: Received disconnect from 106.53.2.93: 11: Bye Bye [preauth] May 28 02:00:47 clarabelen sshd[15222]: Invalid user kelly from 106.53.2.93 May 28 02:00:47 clarabelen sshd[15222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.2.93 May 28 02:00:49 clarabelen sshd[15222]: Failed password for invalid user ........ ------------------------------- |
2020-06-01 01:40:02 |
| 185.121.69.4 | attackbotsspam | xmlrpc attack |
2020-06-01 01:20:40 |
| 46.101.73.64 | attackbotsspam | May 31 12:04:52 game-panel sshd[26107]: Failed password for root from 46.101.73.64 port 52322 ssh2 May 31 12:09:34 game-panel sshd[26453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.73.64 May 31 12:09:35 game-panel sshd[26453]: Failed password for invalid user admin from 46.101.73.64 port 55502 ssh2 |
2020-06-01 01:21:42 |
| 35.231.211.161 | attackspambots | May 31 19:14:25 abendstille sshd\[1141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161 user=root May 31 19:14:27 abendstille sshd\[1141\]: Failed password for root from 35.231.211.161 port 34648 ssh2 May 31 19:17:52 abendstille sshd\[4263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161 user=root May 31 19:17:55 abendstille sshd\[4263\]: Failed password for root from 35.231.211.161 port 37516 ssh2 May 31 19:21:04 abendstille sshd\[7571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161 user=root ... |
2020-06-01 01:40:24 |
| 14.29.184.152 | attackbotsspam | 2020-05-31T06:09:07.043116linuxbox-skyline sshd[45883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.184.152 user=root 2020-05-31T06:09:09.548895linuxbox-skyline sshd[45883]: Failed password for root from 14.29.184.152 port 58524 ssh2 ... |
2020-06-01 01:37:00 |
| 77.42.83.15 | attackspambots | Port probing on unauthorized port 23 |
2020-06-01 01:29:06 |
| 134.209.7.179 | attackspambots | (sshd) Failed SSH login from 134.209.7.179 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 31 17:42:37 srv sshd[7340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.7.179 user=root May 31 17:42:39 srv sshd[7340]: Failed password for root from 134.209.7.179 port 50732 ssh2 May 31 17:44:51 srv sshd[7366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.7.179 user=root May 31 17:44:52 srv sshd[7366]: Failed password for root from 134.209.7.179 port 52604 ssh2 May 31 17:46:15 srv sshd[7391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.7.179 user=root |
2020-06-01 01:49:33 |
| 112.85.42.178 | attack | May 31 19:22:51 vpn01 sshd[22701]: Failed password for root from 112.85.42.178 port 16102 ssh2 May 31 19:23:04 vpn01 sshd[22701]: error: maximum authentication attempts exceeded for root from 112.85.42.178 port 16102 ssh2 [preauth] ... |
2020-06-01 01:35:30 |
| 186.10.125.209 | attack | 2020-05-31T16:49:11.183822server.espacesoutien.com sshd[16855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 user=root 2020-05-31T16:49:13.252205server.espacesoutien.com sshd[16855]: Failed password for root from 186.10.125.209 port 5006 ssh2 2020-05-31T16:49:55.091120server.espacesoutien.com sshd[16875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 user=root 2020-05-31T16:49:57.535446server.espacesoutien.com sshd[16875]: Failed password for root from 186.10.125.209 port 29229 ssh2 ... |
2020-06-01 01:15:46 |
| 98.142.96.42 | attack | MLV GET /blogs/wp-includes/wlwmanifest.xml |
2020-06-01 01:24:16 |
| 209.105.243.145 | attack | 2020-05-31T12:09:17.874712homeassistant sshd[31706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.105.243.145 user=root 2020-05-31T12:09:20.086699homeassistant sshd[31706]: Failed password for root from 209.105.243.145 port 58074 ssh2 ... |
2020-06-01 01:30:00 |
| 150.109.47.167 | attackbotsspam |
|
2020-06-01 01:52:38 |
| 185.143.74.73 | attackspambots | May 31 19:44:58 vmanager6029 postfix/smtpd\[16353\]: warning: unknown\[185.143.74.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 31 19:46:35 vmanager6029 postfix/smtpd\[16353\]: warning: unknown\[185.143.74.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-06-01 01:48:16 |
| 1.22.124.94 | attackbots | May 31 14:05:13 sip sshd[479517]: Failed password for root from 1.22.124.94 port 54716 ssh2 May 31 14:08:53 sip sshd[479539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.22.124.94 user=root May 31 14:08:55 sip sshd[479539]: Failed password for root from 1.22.124.94 port 52700 ssh2 ... |
2020-06-01 01:44:12 |