城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.234.95.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.234.95.105. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 222 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 12:44:30 CST 2025
;; MSG SIZE rcvd: 106
105.95.234.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
105.95.234.42.in-addr.arpa name = hn.kd.ny.adsl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 115.238.48.116 | attackspam | Nov 30 08:53:25 vps691689 sshd[12358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.48.116 Nov 30 08:53:27 vps691689 sshd[12358]: Failed password for invalid user p@ssword from 115.238.48.116 port 35840 ssh2 ... |
2019-11-30 19:35:58 |
| 167.172.205.123 | attack | SSH/22 MH Probe, BF, Hack - |
2019-11-30 19:38:50 |
| 91.121.211.59 | attack | 2019-11-30T10:19:42.094669shield sshd\[32126\]: Invalid user csgo from 91.121.211.59 port 48818 2019-11-30T10:19:42.098837shield sshd\[32126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu 2019-11-30T10:19:43.635503shield sshd\[32126\]: Failed password for invalid user csgo from 91.121.211.59 port 48818 ssh2 2019-11-30T10:22:38.232315shield sshd\[519\]: Invalid user jalar from 91.121.211.59 port 56072 2019-11-30T10:22:38.236359shield sshd\[519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu |
2019-11-30 19:10:44 |
| 220.128.126.166 | attackbotsspam | Unauthorised access (Nov 30) SRC=220.128.126.166 LEN=52 TTL=109 ID=5246 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 30) SRC=220.128.126.166 LEN=52 TTL=109 ID=28277 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-30 19:17:21 |
| 167.99.194.54 | attackbots | Nov 30 10:28:11 MK-Soft-VM6 sshd[13413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54 Nov 30 10:28:13 MK-Soft-VM6 sshd[13413]: Failed password for invalid user sanyu from 167.99.194.54 port 42866 ssh2 ... |
2019-11-30 19:29:53 |
| 51.77.146.153 | attackbotsspam | Nov 30 10:13:06 MK-Soft-VM3 sshd[17259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.153 Nov 30 10:13:09 MK-Soft-VM3 sshd[17259]: Failed password for invalid user admin from 51.77.146.153 port 53280 ssh2 ... |
2019-11-30 19:09:59 |
| 188.213.49.60 | attackbots | Unauthorized SSH login attempts |
2019-11-30 19:43:28 |
| 192.144.140.20 | attackspambots | Nov 30 07:19:53 legacy sshd[7588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.140.20 Nov 30 07:19:56 legacy sshd[7588]: Failed password for invalid user lkjhgfdsa from 192.144.140.20 port 47152 ssh2 Nov 30 07:23:12 legacy sshd[7685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.140.20 ... |
2019-11-30 19:20:34 |
| 178.62.102.177 | attackspam | Nov 30 11:53:03 pornomens sshd\[28503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.102.177 user=www-data Nov 30 11:53:05 pornomens sshd\[28503\]: Failed password for www-data from 178.62.102.177 port 41374 ssh2 Nov 30 11:56:09 pornomens sshd\[28531\]: Invalid user mysql from 178.62.102.177 port 59245 Nov 30 11:56:09 pornomens sshd\[28531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.102.177 ... |
2019-11-30 19:18:10 |
| 113.125.179.213 | attack | Invalid user pfdracin from 113.125.179.213 port 56924 |
2019-11-30 19:30:48 |
| 181.169.252.31 | attackspam | Nov 30 10:16:31 microserver sshd[10064]: Invalid user xp from 181.169.252.31 port 37270 Nov 30 10:16:31 microserver sshd[10064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.169.252.31 Nov 30 10:16:33 microserver sshd[10064]: Failed password for invalid user xp from 181.169.252.31 port 37270 ssh2 Nov 30 10:22:38 microserver sshd[10849]: Invalid user server from 181.169.252.31 port 53886 Nov 30 10:22:38 microserver sshd[10849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.169.252.31 Nov 30 10:33:54 microserver sshd[12287]: Invalid user mutimer from 181.169.252.31 port 58883 Nov 30 10:33:54 microserver sshd[12287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.169.252.31 Nov 30 10:33:57 microserver sshd[12287]: Failed password for invalid user mutimer from 181.169.252.31 port 58883 ssh2 Nov 30 10:39:46 microserver sshd[13039]: Invalid user darwin from 181.169.252.31 port 47 |
2019-11-30 19:41:39 |
| 103.66.16.18 | attackspam | Nov 30 05:31:34 firewall sshd[6589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.16.18 Nov 30 05:31:34 firewall sshd[6589]: Invalid user frigerio from 103.66.16.18 Nov 30 05:31:36 firewall sshd[6589]: Failed password for invalid user frigerio from 103.66.16.18 port 45366 ssh2 ... |
2019-11-30 19:32:17 |
| 151.80.61.103 | attackbotsspam | (sshd) Failed SSH login from 151.80.61.103 (FR/France/103.ip-151-80-61.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 30 06:33:53 cwp sshd[29616]: Failed password for root from 151.80.61.103 port 42898 ssh2 Nov 30 06:43:50 cwp sshd[29944]: Failed password for root from 151.80.61.103 port 44782 ssh2 Nov 30 06:46:53 cwp sshd[30088]: Invalid user brigette from 151.80.61.103 port 51396 Nov 30 06:46:55 cwp sshd[30088]: Failed password for invalid user brigette from 151.80.61.103 port 51396 ssh2 Nov 30 06:49:45 cwp sshd[30252]: Invalid user ts5 from 151.80.61.103 port 58012 |
2019-11-30 19:26:41 |
| 193.32.163.74 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort |
2019-11-30 19:35:25 |
| 81.215.212.148 | attack | Unauthorised access (Nov 30) SRC=81.215.212.148 LEN=52 TTL=112 ID=19304 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 30) SRC=81.215.212.148 LEN=52 TTL=114 ID=5020 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 30) SRC=81.215.212.148 LEN=52 TTL=114 ID=27605 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-30 19:14:10 |