城市(city): unknown
省份(region): unknown
国家(country): Viet Nam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.114.139.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.114.139.92. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 02:03:55 CST 2025
;; MSG SIZE rcvd: 106
Host 92.139.114.42.in-addr.arpa not found: 2(SERVFAIL)
server can't find 42.114.139.92.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 157.245.213.209 | attackbots | Aug 16 14:31:49 django-0 sshd[12049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.213.209 Aug 16 14:31:49 django-0 sshd[12049]: Invalid user oracle from 157.245.213.209 Aug 16 14:31:51 django-0 sshd[12049]: Failed password for invalid user oracle from 157.245.213.209 port 44974 ssh2 ... |
2020-08-16 22:58:26 |
| 52.175.17.119 | attackspambots | DATE:2020-08-16 14:24:15, IP:52.175.17.119, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2020-08-16 23:07:59 |
| 42.118.242.189 | attackspambots | Aug 16 16:05:11 [host] sshd[12689]: pam_unix(sshd: Aug 16 16:05:13 [host] sshd[12689]: Failed passwor Aug 16 16:10:08 [host] sshd[13145]: Invalid user y |
2020-08-16 22:55:11 |
| 218.92.0.219 | attack | 2020-08-16T15:20:07.129776vps1033 sshd[32006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.219 user=root 2020-08-16T15:20:09.798433vps1033 sshd[32006]: Failed password for root from 218.92.0.219 port 30141 ssh2 2020-08-16T15:20:07.129776vps1033 sshd[32006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.219 user=root 2020-08-16T15:20:09.798433vps1033 sshd[32006]: Failed password for root from 218.92.0.219 port 30141 ssh2 2020-08-16T15:20:11.465862vps1033 sshd[32006]: Failed password for root from 218.92.0.219 port 30141 ssh2 ... |
2020-08-16 23:23:38 |
| 162.241.149.130 | attackspam | 2020-08-16T19:22:38.754082hostname sshd[23423]: Invalid user admin from 162.241.149.130 port 44010 2020-08-16T19:22:40.533574hostname sshd[23423]: Failed password for invalid user admin from 162.241.149.130 port 44010 ssh2 2020-08-16T19:26:42.462637hostname sshd[25076]: Invalid user mr from 162.241.149.130 port 55886 ... |
2020-08-16 22:42:23 |
| 143.202.209.47 | attack | Aug 16 14:24:29 [host] sshd[7326]: Invalid user ri Aug 16 14:24:29 [host] sshd[7326]: pam_unix(sshd:a Aug 16 14:24:31 [host] sshd[7326]: Failed password |
2020-08-16 22:43:44 |
| 62.28.217.62 | attackspambots | Brute-force attempt banned |
2020-08-16 22:49:17 |
| 178.128.103.151 | attackspam | 178.128.103.151 - - [16/Aug/2020:15:56:43 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 178.128.103.151 - - [16/Aug/2020:16:00:03 +0200] "POST /xmlrpc.php HTTP/1.1" 403 12787 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-16 23:14:20 |
| 119.29.2.157 | attack | Fail2Ban - SSH Bruteforce Attempt |
2020-08-16 22:54:24 |
| 111.231.198.139 | attackbotsspam | Aug 16 14:24:26 ip106 sshd[2998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.198.139 Aug 16 14:24:27 ip106 sshd[2998]: Failed password for invalid user alfredo from 111.231.198.139 port 33195 ssh2 ... |
2020-08-16 22:51:54 |
| 112.85.42.176 | attackspambots | Aug 16 15:07:38 localhost sshd\[32339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root Aug 16 15:07:41 localhost sshd\[32339\]: Failed password for root from 112.85.42.176 port 11810 ssh2 Aug 16 15:07:44 localhost sshd\[32339\]: Failed password for root from 112.85.42.176 port 11810 ssh2 ... |
2020-08-16 23:09:03 |
| 191.233.198.99 | attackbots | (sshd) Failed SSH login from 191.233.198.99 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 16 17:27:02 s1 sshd[30103]: Invalid user event from 191.233.198.99 port 49320 Aug 16 17:27:05 s1 sshd[30103]: Failed password for invalid user event from 191.233.198.99 port 49320 ssh2 Aug 16 17:53:56 s1 sshd[30554]: Invalid user liwl from 191.233.198.99 port 53304 Aug 16 17:53:58 s1 sshd[30554]: Failed password for invalid user liwl from 191.233.198.99 port 53304 ssh2 Aug 16 17:55:39 s1 sshd[30583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.233.198.99 user=root |
2020-08-16 23:04:27 |
| 189.62.69.106 | attackspambots | Aug 16 14:35:45 sso sshd[10427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.62.69.106 Aug 16 14:35:47 sso sshd[10427]: Failed password for invalid user ruben from 189.62.69.106 port 45351 ssh2 ... |
2020-08-16 23:06:34 |
| 110.49.71.246 | attack | Aug 16 15:39:57 ajax sshd[28577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.246 Aug 16 15:40:00 ajax sshd[28577]: Failed password for invalid user sergei from 110.49.71.246 port 12073 ssh2 |
2020-08-16 23:01:42 |
| 165.227.7.5 | attack | prod6 ... |
2020-08-16 22:55:55 |