城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.149.227.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;4.149.227.194. IN A
;; AUTHORITY SECTION:
. 461 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010502 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 06:34:57 CST 2022
;; MSG SIZE rcvd: 106
Host 194.227.149.4.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 194.227.149.4.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
154.92.72.230 | attackbotsspam | Jan 23 06:33:15 roadrisk sshd[23811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.72.230 user=r.r Jan 23 06:33:16 roadrisk sshd[23811]: Failed password for r.r from 154.92.72.230 port 33203 ssh2 Jan 23 06:33:16 roadrisk sshd[23811]: Received disconnect from 154.92.72.230: 11: Bye Bye [preauth] Jan 23 06:42:22 roadrisk sshd[24370]: Failed password for invalid user test from 154.92.72.230 port 58379 ssh2 Jan 23 06:42:23 roadrisk sshd[24370]: Received disconnect from 154.92.72.230: 11: Bye Bye [preauth] Jan 23 06:43:58 roadrisk sshd[24404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.92.72.230 user=r.r Jan 23 06:44:00 roadrisk sshd[24404]: Failed password for r.r from 154.92.72.230 port 37521 ssh2 Jan 23 06:44:00 roadrisk sshd[24404]: Received disconnect from 154.92.72.230: 11: Bye Bye [preauth] Jan 23 06:45:29 roadrisk sshd[24462]: pam_unix(sshd:auth): authentication failu........ ------------------------------- |
2020-01-26 16:25:12 |
80.82.77.243 | attackbots | Jan 26 08:55:22 h2177944 kernel: \[3223575.324070\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.77.243 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=11003 PROTO=TCP SPT=55395 DPT=16526 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 26 08:55:22 h2177944 kernel: \[3223575.324083\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.77.243 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=11003 PROTO=TCP SPT=55395 DPT=16526 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 26 09:36:03 h2177944 kernel: \[3226015.846055\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.77.243 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=12609 PROTO=TCP SPT=55395 DPT=16538 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 26 09:36:03 h2177944 kernel: \[3226015.846070\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.77.243 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=12609 PROTO=TCP SPT=55395 DPT=16538 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 26 09:46:54 h2177944 kernel: \[3226666.116252\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.77.243 DST=85.214.117.9 |
2020-01-26 16:47:33 |
58.214.255.41 | attackspam | Jan 25 22:33:08 php1 sshd\[14858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.214.255.41 user=root Jan 25 22:33:11 php1 sshd\[14858\]: Failed password for root from 58.214.255.41 port 44404 ssh2 Jan 25 22:37:01 php1 sshd\[15282\]: Invalid user foo from 58.214.255.41 Jan 25 22:37:01 php1 sshd\[15282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.214.255.41 Jan 25 22:37:02 php1 sshd\[15282\]: Failed password for invalid user foo from 58.214.255.41 port 63587 ssh2 |
2020-01-26 16:51:07 |
51.38.186.180 | attack | Jan 25 11:11:59 server2101 sshd[27374]: Invalid user panda from 51.38.186.180 port 45127 Jan 25 11:12:00 server2101 sshd[27374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180 Jan 25 11:12:02 server2101 sshd[27374]: Failed password for invalid user panda from 51.38.186.180 port 45127 ssh2 Jan 25 11:12:02 server2101 sshd[27374]: Received disconnect from 51.38.186.180 port 45127:11: Bye Bye [preauth] Jan 25 11:12:02 server2101 sshd[27374]: Disconnected from 51.38.186.180 port 45127 [preauth] Jan 25 11:31:49 server2101 sshd[27679]: Invalid user future from 51.38.186.180 port 46178 Jan 25 11:31:49 server2101 sshd[27679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180 Jan 25 11:31:51 server2101 sshd[27679]: Failed password for invalid user future from 51.38.186.180 port 46178 ssh2 Jan 25 11:31:51 server2101 sshd[27679]: Received disconnect from 51.38.186.180 port 461........ ------------------------------- |
2020-01-26 16:56:35 |
45.65.196.14 | attackspambots | Unauthorized connection attempt detected from IP address 45.65.196.14 to port 2220 [J] |
2020-01-26 16:31:29 |
77.42.107.182 | attack | unauthorized connection attempt |
2020-01-26 16:26:09 |
139.99.180.165 | attackbots | Unauthorized connection attempt detected from IP address 139.99.180.165 to port 2220 [J] |
2020-01-26 16:53:25 |
121.165.73.1 | attack | Unauthorized connection attempt detected from IP address 121.165.73.1 to port 2220 [J] |
2020-01-26 16:46:58 |
106.12.56.143 | attackspam | Jan 26 07:51:22 MainVPS sshd[26851]: Invalid user bella from 106.12.56.143 port 54140 Jan 26 07:51:22 MainVPS sshd[26851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.143 Jan 26 07:51:22 MainVPS sshd[26851]: Invalid user bella from 106.12.56.143 port 54140 Jan 26 07:51:24 MainVPS sshd[26851]: Failed password for invalid user bella from 106.12.56.143 port 54140 ssh2 Jan 26 07:54:38 MainVPS sshd[32696]: Invalid user yang from 106.12.56.143 port 50138 ... |
2020-01-26 16:50:20 |
90.51.66.105 | attackspambots | Jan 26 05:48:33 roki sshd[25695]: Invalid user pi from 90.51.66.105 Jan 26 05:48:33 roki sshd[25696]: Invalid user pi from 90.51.66.105 Jan 26 05:48:33 roki sshd[25695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.51.66.105 Jan 26 05:48:34 roki sshd[25696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.51.66.105 Jan 26 05:48:35 roki sshd[25696]: Failed password for invalid user pi from 90.51.66.105 port 46282 ssh2 Jan 26 05:48:35 roki sshd[25695]: Failed password for invalid user pi from 90.51.66.105 port 46280 ssh2 ... |
2020-01-26 16:44:32 |
185.216.140.6 | attackbotsspam | Unauthorized connection attempt detected from IP address 185.216.140.6 to port 8009 [T] |
2020-01-26 16:32:34 |
36.53.205.68 | attackbots | Unauthorized connection attempt detected from IP address 36.53.205.68 to port 23 [T] |
2020-01-26 16:27:43 |
207.200.8.182 | attackbotsspam | Automated report (2020-01-26T06:59:12+00:00). Misbehaving bot detected at this address. |
2020-01-26 16:58:07 |
129.226.129.144 | attack | 2020-01-26T04:59:50.941102shield sshd\[27307\]: Invalid user test from 129.226.129.144 port 36232 2020-01-26T04:59:50.948683shield sshd\[27307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.144 2020-01-26T04:59:53.015183shield sshd\[27307\]: Failed password for invalid user test from 129.226.129.144 port 36232 ssh2 2020-01-26T05:02:20.229249shield sshd\[27818\]: Invalid user aria from 129.226.129.144 port 56746 2020-01-26T05:02:20.235453shield sshd\[27818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.144 |
2020-01-26 16:49:13 |
222.186.19.221 | attackspambots | Port 8082 scan denied |
2020-01-26 16:48:04 |