城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.138.91.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.138.91.135. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:18:41 CST 2025
;; MSG SIZE rcvd: 105
135.91.138.3.in-addr.arpa domain name pointer ec2-3-138-91-135.us-east-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
135.91.138.3.in-addr.arpa name = ec2-3-138-91-135.us-east-2.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 5.186.71.78 | attack | Jul 3 03:47:21 tuxlinux sshd[30792]: Invalid user pi from 5.186.71.78 port 40893 Jul 3 03:47:21 tuxlinux sshd[30793]: Invalid user pi from 5.186.71.78 port 47222 Jul 3 03:47:21 tuxlinux sshd[30792]: Invalid user pi from 5.186.71.78 port 40893 Jul 3 03:47:21 tuxlinux sshd[30792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.186.71.78 ... |
2020-07-04 02:07:56 |
| 104.248.243.202 | attackbotsspam | Jun 30 01:07:23 nbi10206 sshd[26252]: Invalid user python from 104.248.243.202 port 50720 Jun 30 01:07:25 nbi10206 sshd[26252]: Failed password for invalid user python from 104.248.243.202 port 50720 ssh2 Jun 30 01:07:25 nbi10206 sshd[26252]: Received disconnect from 104.248.243.202 port 50720:11: Bye Bye [preauth] Jun 30 01:07:25 nbi10206 sshd[26252]: Disconnected from 104.248.243.202 port 50720 [preauth] Jun 30 01:14:44 nbi10206 sshd[28119]: User r.r from 104.248.243.202 not allowed because not listed in AllowUsers Jun 30 01:14:44 nbi10206 sshd[28119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.243.202 user=r.r Jun 30 01:14:46 nbi10206 sshd[28119]: Failed password for invalid user r.r from 104.248.243.202 port 53158 ssh2 Jun 30 01:14:46 nbi10206 sshd[28119]: Received disconnect from 104.248.243.202 port 53158:11: Bye Bye [preauth] Jun 30 01:14:46 nbi10206 sshd[28119]: Disconnected from 104.248.243.202 port 53158 [p........ ------------------------------- |
2020-07-04 02:10:28 |
| 222.186.190.2 | attack | 2020-07-03T20:31:43.512557sd-86998 sshd[2036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root 2020-07-03T20:31:45.244439sd-86998 sshd[2036]: Failed password for root from 222.186.190.2 port 45746 ssh2 2020-07-03T20:31:48.733434sd-86998 sshd[2036]: Failed password for root from 222.186.190.2 port 45746 ssh2 2020-07-03T20:31:43.512557sd-86998 sshd[2036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root 2020-07-03T20:31:45.244439sd-86998 sshd[2036]: Failed password for root from 222.186.190.2 port 45746 ssh2 2020-07-03T20:31:48.733434sd-86998 sshd[2036]: Failed password for root from 222.186.190.2 port 45746 ssh2 2020-07-03T20:31:43.512557sd-86998 sshd[2036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root 2020-07-03T20:31:45.244439sd-86998 sshd[2036]: Failed password for root from 222.186.190.2 p ... |
2020-07-04 02:34:36 |
| 134.17.94.214 | attack | 2020-07-02T14:01:18.208406hostname sshd[93826]: Failed password for invalid user infa from 134.17.94.214 port 11559 ssh2 ... |
2020-07-04 02:30:17 |
| 103.219.141.4 | attackspambots | 2020-07-0303:46:131jrAmK-0005s1-Oh\<=info@whatsup2013.chH=\(localhost\)[222.175.5.114]:40353P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4984id=2e24e8b8b3984dbe9d6395c6cd19208caf4db27116@whatsup2013.chT="Meetupwithrealladiesforsexnow"forervin.v0211@gmail.comluis76051@gmail.comomgspongebob1@gmail.com2020-07-0303:46:371jrAmi-0005uI-Ps\<=info@whatsup2013.chH=\(localhost\)[195.209.48.1]:56392P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4937id=a55cf2a1aa8154587f3a8cdf2bec666a51a2245a@whatsup2013.chT="Screwahoenearyou"foryjoshua500@gmail.compleitezmike83@yahoo.comharveyben1947@gmail.com2020-07-0303:45:461jrAlu-0005ob-6r\<=info@whatsup2013.chH=224.sub-166-149-245.myvzw.com\(localhost\)[166.149.245.224]:31800P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=4962id=a852e4b7bc97bdb5292c9a36d1a58f9b237fc2@whatsup2013.chT="Signuprightnowtodiscoverbeavertonite"forscrivenswaste@bellsout |
2020-07-04 02:05:06 |
| 36.94.50.106 | attack | port scan and connect, tcp 80 (http) |
2020-07-04 02:06:57 |
| 110.147.213.70 | attackspambots | 2020-07-03T13:15:45.585947mail.thespaminator.com sshd[8496]: Failed password for root from 110.147.213.70 port 55568 ssh2 2020-07-03T13:21:12.519095mail.thespaminator.com sshd[9123]: Invalid user tech from 110.147.213.70 port 56115 ... |
2020-07-04 02:04:48 |
| 60.6.57.239 | attackspam | Jul 1 00:06:01 extapp sshd[21931]: Invalid user umar from 60.6.57.239 Jul 1 00:06:03 extapp sshd[21931]: Failed password for invalid user umar from 60.6.57.239 port 38688 ssh2 Jul 1 00:08:44 extapp sshd[23998]: Invalid user thiago from 60.6.57.239 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=60.6.57.239 |
2020-07-04 02:25:14 |
| 218.92.0.148 | attack | Jul 3 11:06:20 ws24vmsma01 sshd[21457]: Failed password for root from 218.92.0.148 port 25581 ssh2 Jul 3 15:11:32 ws24vmsma01 sshd[186069]: Failed password for root from 218.92.0.148 port 51155 ssh2 Jul 3 15:11:34 ws24vmsma01 sshd[186069]: Failed password for root from 218.92.0.148 port 51155 ssh2 Jul 3 15:11:37 ws24vmsma01 sshd[186069]: Failed password for root from 218.92.0.148 port 51155 ssh2 ... |
2020-07-04 02:11:57 |
| 194.182.75.170 | attackbots | 194.182.75.170 - - [03/Jul/2020:19:30:42 +0100] "POST /wp-login.php HTTP/1.1" 200 2178 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 194.182.75.170 - - [03/Jul/2020:19:31:16 +0100] "POST /wp-login.php HTTP/1.1" 200 2154 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 194.182.75.170 - - [03/Jul/2020:19:31:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2157 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-04 02:35:55 |
| 5.135.94.191 | attack | 2020-07-01 18:25:28 server sshd[70664]: Failed password for invalid user sato from 5.135.94.191 port 35954 ssh2 |
2020-07-04 02:23:43 |
| 81.68.100.51 | attack | Jun 30 00:54:48 xxx sshd[6313]: Invalid user diradmin from 81.68.100.51 port 49402 Jun 30 00:54:48 xxx sshd[6313]: Failed password for invalid user diradmin from 81.68.100.51 port 49402 ssh2 Jun 30 00:54:48 xxx sshd[6313]: Received disconnect from 81.68.100.51 port 49402:11: Bye Bye [preauth] Jun 30 00:54:48 xxx sshd[6313]: Disconnected from 81.68.100.51 port 49402 [preauth] Jun 30 01:04:26 xxx sshd[11478]: Failed password for r.r from 81.68.100.51 port 52562 ssh2 Jun 30 01:04:26 xxx sshd[11478]: Received disconnect from 81.68.100.51 port 52562:11: Bye Bye [preauth] Jun 30 01:04:26 xxx sshd[11478]: Disconnected from 81.68.100.51 port 52562 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=81.68.100.51 |
2020-07-04 02:08:43 |
| 180.242.182.166 | attackbotsspam | 1593740726 - 07/03/2020 03:45:26 Host: 180.242.182.166/180.242.182.166 Port: 445 TCP Blocked |
2020-07-04 02:24:53 |
| 1.53.199.189 | attackbots | 1593740865 - 07/03/2020 03:47:45 Host: 1.53.199.189/1.53.199.189 Port: 445 TCP Blocked |
2020-07-04 02:01:13 |
| 213.217.1.32 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort |
2020-07-04 02:21:16 |