城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.161.140.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33230
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;38.161.140.35. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025051700 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 17 23:53:23 CST 2025
;; MSG SIZE rcvd: 106
Host 35.140.161.38.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 35.140.161.38.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 78.109.71.193 | attackspambots | 1584047261 - 03/12/2020 22:07:41 Host: 78.109.71.193/78.109.71.193 Port: 445 TCP Blocked |
2020-03-13 08:34:30 |
| 103.206.246.38 | attack | Mar 12 23:30:55 ns3042688 sshd\[9393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.246.38 user=root Mar 12 23:30:57 ns3042688 sshd\[9393\]: Failed password for root from 103.206.246.38 port 53980 ssh2 Mar 12 23:36:04 ns3042688 sshd\[9771\]: Invalid user home from 103.206.246.38 Mar 12 23:36:04 ns3042688 sshd\[9771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.206.246.38 Mar 12 23:36:05 ns3042688 sshd\[9771\]: Failed password for invalid user home from 103.206.246.38 port 58112 ssh2 ... |
2020-03-13 08:20:42 |
| 3.12.123.59 | attack | 2020-03-13T00:20:28.525637shield sshd\[22152\]: Invalid user paul from 3.12.123.59 port 50090 2020-03-13T00:20:28.534026shield sshd\[22152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-12-123-59.us-east-2.compute.amazonaws.com 2020-03-13T00:20:30.268867shield sshd\[22152\]: Failed password for invalid user paul from 3.12.123.59 port 50090 ssh2 2020-03-13T00:22:49.503725shield sshd\[22444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-12-123-59.us-east-2.compute.amazonaws.com user=root 2020-03-13T00:22:51.584407shield sshd\[22444\]: Failed password for root from 3.12.123.59 port 38580 ssh2 |
2020-03-13 08:28:07 |
| 185.37.117.121 | attackspam | Automatic report - Port Scan Attack |
2020-03-13 08:31:38 |
| 180.109.164.207 | attackbots | Mar 12 15:09:38 home sshd[13880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.109.164.207 user=root Mar 12 15:09:40 home sshd[13880]: Failed password for root from 180.109.164.207 port 54740 ssh2 Mar 12 15:16:22 home sshd[13978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.109.164.207 user=root Mar 12 15:16:24 home sshd[13978]: Failed password for root from 180.109.164.207 port 54476 ssh2 Mar 12 15:18:12 home sshd[14033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.109.164.207 user=root Mar 12 15:18:13 home sshd[14033]: Failed password for root from 180.109.164.207 port 40002 ssh2 Mar 12 15:19:58 home sshd[14086]: Invalid user redmine from 180.109.164.207 port 53766 Mar 12 15:19:58 home sshd[14086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.109.164.207 Mar 12 15:19:58 home sshd[14086]: Invalid user redmine from 180. |
2020-03-13 08:44:40 |
| 5.89.35.84 | attackspambots | Invalid user cpanelconnecttrack from 5.89.35.84 port 52602 |
2020-03-13 08:41:05 |
| 94.181.235.8 | attackspam | Web form spam |
2020-03-13 08:42:16 |
| 95.181.131.153 | attackbotsspam | Mar 13 01:05:11 vmd26974 sshd[1802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.131.153 Mar 13 01:05:12 vmd26974 sshd[1802]: Failed password for invalid user ts3 from 95.181.131.153 port 33868 ssh2 ... |
2020-03-13 08:18:04 |
| 183.134.91.158 | attackbots | Mar 12 19:11:06 firewall sshd[7194]: Invalid user dev from 183.134.91.158 Mar 12 19:11:08 firewall sshd[7194]: Failed password for invalid user dev from 183.134.91.158 port 36932 ssh2 Mar 12 19:14:46 firewall sshd[7362]: Invalid user git from 183.134.91.158 ... |
2020-03-13 08:05:41 |
| 49.235.16.103 | attackspambots | Mar 12 22:03:36 srv-ubuntu-dev3 sshd[60088]: Invalid user at from 49.235.16.103 Mar 12 22:03:36 srv-ubuntu-dev3 sshd[60088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.16.103 Mar 12 22:03:36 srv-ubuntu-dev3 sshd[60088]: Invalid user at from 49.235.16.103 Mar 12 22:03:38 srv-ubuntu-dev3 sshd[60088]: Failed password for invalid user at from 49.235.16.103 port 43374 ssh2 Mar 12 22:05:52 srv-ubuntu-dev3 sshd[60418]: Invalid user testuser from 49.235.16.103 Mar 12 22:05:52 srv-ubuntu-dev3 sshd[60418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.16.103 Mar 12 22:05:52 srv-ubuntu-dev3 sshd[60418]: Invalid user testuser from 49.235.16.103 Mar 12 22:05:54 srv-ubuntu-dev3 sshd[60418]: Failed password for invalid user testuser from 49.235.16.103 port 42756 ssh2 ... |
2020-03-13 08:09:22 |
| 140.143.155.172 | attack | Lines containing failures of 140.143.155.172 Mar 11 05:28:32 shared07 sshd[19803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.155.172 user=r.r Mar 11 05:28:34 shared07 sshd[19803]: Failed password for r.r from 140.143.155.172 port 55602 ssh2 Mar 11 05:28:35 shared07 sshd[19803]: Received disconnect from 140.143.155.172 port 55602:11: Bye Bye [preauth] Mar 11 05:28:35 shared07 sshd[19803]: Disconnected from authenticating user r.r 140.143.155.172 port 55602 [preauth] Mar 11 05:44:46 shared07 sshd[25752]: Invalid user com from 140.143.155.172 port 39424 Mar 11 05:44:46 shared07 sshd[25752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.155.172 Mar 11 05:44:47 shared07 sshd[25752]: Failed password for invalid user com from 140.143.155.172 port 39424 ssh2 Mar 11 05:44:48 shared07 sshd[25752]: Received disconnect from 140.143.155.172 port 39424:11: Bye Bye [preauth] Mar 11 ........ ------------------------------ |
2020-03-13 08:36:34 |
| 192.241.254.155 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-03-13 08:16:54 |
| 104.167.106.40 | attackspambots | port |
2020-03-13 08:44:12 |
| 198.108.66.231 | attack | Portscan or hack attempt detected by psad/fwsnort |
2020-03-13 08:21:48 |
| 94.191.84.38 | attack | Mar 12 19:40:24 NPSTNNYC01T sshd[11987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.84.38 Mar 12 19:40:26 NPSTNNYC01T sshd[11987]: Failed password for invalid user oracle from 94.191.84.38 port 55432 ssh2 Mar 12 19:45:20 NPSTNNYC01T sshd[12197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.84.38 ... |
2020-03-13 08:24:50 |