城市(city): unknown
省份(region): unknown
国家(country): United Arab Emirates
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.57.147.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9026
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;31.57.147.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101001 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 11 13:01:18 CST 2025
;; MSG SIZE rcvd: 106
Host 142.147.57.31.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.147.57.31.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.68.136.168 | attackbotsspam | Oct 9 09:08:44 vps01 sshd[27425]: Failed password for root from 51.68.136.168 port 44610 ssh2 |
2019-10-09 15:13:48 |
| 144.217.214.100 | attackspam | Oct 9 08:40:43 vps647732 sshd[32139]: Failed password for root from 144.217.214.100 port 55682 ssh2 ... |
2019-10-09 15:41:28 |
| 203.110.179.26 | attack | Tried sshing with brute force. |
2019-10-09 15:49:04 |
| 140.143.206.71 | attackspambots | Oct 9 09:09:09 nginx sshd[97205]: Invalid user usuario from 140.143.206.71 Oct 9 09:09:09 nginx sshd[97205]: Received disconnect from 140.143.206.71 port 36360:11: Normal Shutdown, Thank you for playing [preauth] |
2019-10-09 15:32:43 |
| 164.132.230.244 | attackbots | Apr 14 06:35:12 server sshd\[223741\]: Invalid user test7 from 164.132.230.244 Apr 14 06:35:12 server sshd\[223741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.230.244 Apr 14 06:35:13 server sshd\[223741\]: Failed password for invalid user test7 from 164.132.230.244 port 42527 ssh2 ... |
2019-10-09 15:28:25 |
| 222.91.151.175 | attackspambots | Oct 8 01:37:37 km20725 sshd[14449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.151.175 user=r.r Oct 8 01:37:39 km20725 sshd[14449]: Failed password for r.r from 222.91.151.175 port 9247 ssh2 Oct 8 01:37:39 km20725 sshd[14449]: Received disconnect from 222.91.151.175: 11: Bye Bye [preauth] Oct 8 02:07:55 km20725 sshd[16331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.151.175 user=r.r Oct 8 02:07:57 km20725 sshd[16331]: Failed password for r.r from 222.91.151.175 port 10324 ssh2 Oct 8 02:07:57 km20725 sshd[16331]: Received disconnect from 222.91.151.175: 11: Bye Bye [preauth] Oct 8 02:11:41 km20725 sshd[16732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.151.175 user=r.r Oct 8 02:11:42 km20725 sshd[16732]: Failed password for r.r from 222.91.151.175 port 9779 ssh2 Oct 8 02:11:43 km20725 sshd[16732]: Received........ ------------------------------- |
2019-10-09 15:28:57 |
| 222.186.175.183 | attackbots | Brute force attempt |
2019-10-09 15:32:59 |
| 163.172.217.172 | attack | Jul 11 13:13:42 server sshd\[70886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.217.172 user=root Jul 11 13:13:44 server sshd\[70886\]: Failed password for root from 163.172.217.172 port 60582 ssh2 Jul 11 13:13:44 server sshd\[70893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.217.172 user=root Jul 11 13:13:44 server sshd\[70895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.217.172 user=root Jul 11 13:13:46 server sshd\[70893\]: Failed password for root from 163.172.217.172 port 34324 ssh2 Jul 11 13:13:46 server sshd\[70895\]: Failed password for root from 163.172.217.172 port 35706 ssh2 ... |
2019-10-09 15:43:58 |
| 164.132.80.137 | attackspambots | May 10 19:38:23 server sshd\[68647\]: Invalid user fv from 164.132.80.137 May 10 19:38:23 server sshd\[68647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137 May 10 19:38:25 server sshd\[68647\]: Failed password for invalid user fv from 164.132.80.137 port 54106 ssh2 ... |
2019-10-09 15:23:14 |
| 163.172.117.140 | attackbotsspam | Jul 30 16:05:25 server sshd\[45744\]: Invalid user murat from 163.172.117.140 Jul 30 16:05:25 server sshd\[45744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.117.140 Jul 30 16:05:27 server sshd\[45744\]: Failed password for invalid user murat from 163.172.117.140 port 58980 ssh2 ... |
2019-10-09 15:50:32 |
| 69.171.206.254 | attackbotsspam | Oct 8 17:47:42 auw2 sshd\[21690\]: Invalid user Heslo1q from 69.171.206.254 Oct 8 17:47:42 auw2 sshd\[21690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.171.206.254 Oct 8 17:47:45 auw2 sshd\[21690\]: Failed password for invalid user Heslo1q from 69.171.206.254 port 6238 ssh2 Oct 8 17:55:04 auw2 sshd\[22374\]: Invalid user Inferno@123 from 69.171.206.254 Oct 8 17:55:04 auw2 sshd\[22374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.171.206.254 |
2019-10-09 15:17:25 |
| 164.132.192.5 | attackspambots | Jun 28 22:01:16 server sshd\[9387\]: Invalid user rene from 164.132.192.5 Jun 28 22:01:16 server sshd\[9387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.192.5 Jun 28 22:01:18 server sshd\[9387\]: Failed password for invalid user rene from 164.132.192.5 port 58966 ssh2 ... |
2019-10-09 15:31:45 |
| 47.17.177.110 | attackspambots | 2019-10-09T07:07:43.261559abusebot-8.cloudsearch.cf sshd\[25951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ool-2f11b16e.dyn.optonline.net user=root |
2019-10-09 15:14:01 |
| 164.163.99.10 | attackspambots | May 18 20:36:07 server sshd\[195685\]: Invalid user anastacia from 164.163.99.10 May 18 20:36:07 server sshd\[195685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.99.10 May 18 20:36:08 server sshd\[195685\]: Failed password for invalid user anastacia from 164.163.99.10 port 46792 ssh2 ... |
2019-10-09 15:18:10 |
| 164.132.196.182 | attackspambots | May 23 19:38:51 server sshd\[145523\]: Invalid user admin from 164.132.196.182 May 23 19:38:51 server sshd\[145523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.196.182 May 23 19:38:53 server sshd\[145523\]: Failed password for invalid user admin from 164.132.196.182 port 46936 ssh2 ... |
2019-10-09 15:31:22 |