城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.137.216.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;30.137.216.94. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:02:06 CST 2025
;; MSG SIZE rcvd: 106
Host 94.216.137.30.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 94.216.137.30.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 221.156.126.1 | attackspambots | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-08-26 00:51:48 |
| 165.22.186.178 | attack | Invalid user ftpuser from 165.22.186.178 port 34536 |
2020-08-26 01:02:07 |
| 190.151.105.182 | attackbotsspam | 20 attempts against mh-ssh on echoip |
2020-08-26 00:57:15 |
| 182.61.43.202 | attack | Invalid user ucpss from 182.61.43.202 port 36730 |
2020-08-26 01:00:14 |
| 1.186.57.150 | attack | Aug 25 09:51:53 Host-KLAX-C sshd[24652]: Invalid user edp from 1.186.57.150 port 35880 ... |
2020-08-26 00:08:42 |
| 13.68.137.194 | attackbots | 2020-08-25T15:41:57.206111n23.at sshd[2128985]: Invalid user plaza from 13.68.137.194 port 38748 2020-08-25T15:41:58.889897n23.at sshd[2128985]: Failed password for invalid user plaza from 13.68.137.194 port 38748 ssh2 2020-08-25T15:46:11.708438n23.at sshd[2132854]: Invalid user test1 from 13.68.137.194 port 52074 ... |
2020-08-26 00:50:50 |
| 195.154.114.117 | attackspam | Aug 25 07:08:43 mockhub sshd[13226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.114.117 Aug 25 07:08:44 mockhub sshd[13226]: Failed password for invalid user nvidia from 195.154.114.117 port 50274 ssh2 ... |
2020-08-26 00:55:51 |
| 83.48.101.184 | attackbotsspam | Repeated brute force against a port |
2020-08-25 23:58:42 |
| 109.227.63.3 | attackbotsspam | Aug 25 15:58:32 django-0 sshd[4660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3 user=root Aug 25 15:58:35 django-0 sshd[4660]: Failed password for root from 109.227.63.3 port 49902 ssh2 ... |
2020-08-26 01:13:35 |
| 138.68.67.96 | attackbotsspam | Bruteforce detected by fail2ban |
2020-08-26 01:07:12 |
| 5.196.94.68 | attack | (sshd) Failed SSH login from 5.196.94.68 (FR/France/ns377894.ip-5-196-94.eu): 5 in the last 3600 secs |
2020-08-26 00:07:58 |
| 188.0.128.53 | attack | Aug 25 18:35:33 marvibiene sshd[7792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.0.128.53 Aug 25 18:35:35 marvibiene sshd[7792]: Failed password for invalid user anjana from 188.0.128.53 port 44312 ssh2 Aug 25 18:51:53 marvibiene sshd[9100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.0.128.53 |
2020-08-26 00:58:25 |
| 221.6.105.62 | attack | Aug 25 15:41:45 nuernberg-4g-01 sshd[29365]: Failed password for root from 221.6.105.62 port 14354 ssh2 Aug 25 15:46:19 nuernberg-4g-01 sshd[32584]: Failed password for root from 221.6.105.62 port 31779 ssh2 |
2020-08-26 00:09:57 |
| 118.163.101.206 | attackbots | 2020-08-25T14:50:46.942660vps751288.ovh.net sshd\[27691\]: Invalid user titan from 118.163.101.206 port 54914 2020-08-25T14:50:46.952478vps751288.ovh.net sshd\[27691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.101.206 2020-08-25T14:50:49.034833vps751288.ovh.net sshd\[27691\]: Failed password for invalid user titan from 118.163.101.206 port 54914 ssh2 2020-08-25T14:55:00.735446vps751288.ovh.net sshd\[27709\]: Invalid user michael01 from 118.163.101.206 port 34406 2020-08-25T14:55:00.745439vps751288.ovh.net sshd\[27709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.101.206 |
2020-08-26 01:10:11 |
| 129.204.208.34 | attackbots | Aug 25 15:14:39 ovpn sshd\[18833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.208.34 user=root Aug 25 15:14:41 ovpn sshd\[18833\]: Failed password for root from 129.204.208.34 port 44140 ssh2 Aug 25 15:18:59 ovpn sshd\[19857\]: Invalid user ty from 129.204.208.34 Aug 25 15:18:59 ovpn sshd\[19857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.208.34 Aug 25 15:19:01 ovpn sshd\[19857\]: Failed password for invalid user ty from 129.204.208.34 port 34066 ssh2 |
2020-08-26 01:08:20 |