城市(city): Lithonia
省份(region): Georgia
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.20.20.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.20.20.252. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 21:27:36 CST 2025
;; MSG SIZE rcvd: 105
252.20.20.45.in-addr.arpa domain name pointer 45-20-20-252.lightspeed.tukrga.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
252.20.20.45.in-addr.arpa name = 45-20-20-252.lightspeed.tukrga.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 164.90.204.74 | attack | Lines containing failures of 164.90.204.74 Sep 20 02:26:37 zabbix sshd[84279]: Invalid user media from 164.90.204.74 port 32782 Sep 20 02:26:37 zabbix sshd[84279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.204.74 Sep 20 02:26:40 zabbix sshd[84279]: Failed password for invalid user media from 164.90.204.74 port 32782 ssh2 Sep 20 02:26:40 zabbix sshd[84279]: Received disconnect from 164.90.204.74 port 32782:11: Bye Bye [preauth] Sep 20 02:26:40 zabbix sshd[84279]: Disconnected from invalid user media 164.90.204.74 port 32782 [preauth] Sep 20 02:41:52 zabbix sshd[85630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.204.74 user=r.r Sep 20 02:41:54 zabbix sshd[85630]: Failed password for r.r from 164.90.204.74 port 60382 ssh2 Sep 20 02:41:54 zabbix sshd[85630]: Received disconnect from 164.90.204.74 port 60382:11: Bye Bye [preauth] Sep 20 02:41:54 zabbix sshd[85630]: Discon........ ------------------------------ |
2020-09-20 22:25:32 |
| 91.122.52.63 | attackspam | Unauthorized connection attempt from IP address 91.122.52.63 on Port 445(SMB) |
2020-09-20 22:23:56 |
| 179.33.85.250 | attackspambots | Email rejected due to spam filtering |
2020-09-20 22:33:59 |
| 176.122.172.102 | attackspambots | Invalid user ftpuser from 176.122.172.102 port 47974 |
2020-09-20 22:13:21 |
| 218.92.0.165 | attackbotsspam | 2020-09-20T14:18:15.667517shield sshd\[3005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165 user=root 2020-09-20T14:18:17.609397shield sshd\[3005\]: Failed password for root from 218.92.0.165 port 62068 ssh2 2020-09-20T14:18:21.211041shield sshd\[3005\]: Failed password for root from 218.92.0.165 port 62068 ssh2 2020-09-20T14:18:24.689356shield sshd\[3005\]: Failed password for root from 218.92.0.165 port 62068 ssh2 2020-09-20T14:18:27.921871shield sshd\[3005\]: Failed password for root from 218.92.0.165 port 62068 ssh2 |
2020-09-20 22:23:00 |
| 113.31.115.53 | attackbotsspam | 113.31.115.53 (CN/China/-), 6 distributed sshd attacks on account [postgres] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 20 07:23:59 server5 sshd[18163]: Invalid user postgres from 113.31.115.53 Sep 20 07:24:00 server5 sshd[18163]: Failed password for invalid user postgres from 113.31.115.53 port 36520 ssh2 Sep 20 08:11:18 server5 sshd[8219]: Invalid user postgres from 94.23.179.199 Sep 20 08:02:00 server5 sshd[4120]: Invalid user postgres from 106.13.123.73 Sep 20 07:16:01 server5 sshd[13575]: Invalid user postgres from 163.172.167.225 Sep 20 07:16:03 server5 sshd[13575]: Failed password for invalid user postgres from 163.172.167.225 port 40906 ssh2 IP Addresses Blocked: |
2020-09-20 22:21:11 |
| 27.254.95.199 | attack | 2020-09-20T19:58:40.463563hostname sshd[93418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.95.199 user=root 2020-09-20T19:58:42.546636hostname sshd[93418]: Failed password for root from 27.254.95.199 port 40117 ssh2 ... |
2020-09-20 22:30:45 |
| 92.154.95.236 | attack | [portscan] Port scan |
2020-09-20 22:35:23 |
| 104.131.48.67 | attack | SSH brute force |
2020-09-20 22:22:25 |
| 23.129.64.181 | attack | 22/tcp 22/tcp 22/tcp [2020-09-20]3pkt |
2020-09-20 22:32:22 |
| 113.142.58.155 | attackspam | SSH Bruteforce attack |
2020-09-20 22:11:25 |
| 222.186.173.154 | attackbots | detected by Fail2Ban |
2020-09-20 22:29:43 |
| 163.172.49.56 | attack | Sep 20 14:12:51 localhost sshd[3724]: Invalid user guest from 163.172.49.56 port 58471 Sep 20 14:12:51 localhost sshd[3724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.49.56 Sep 20 14:12:51 localhost sshd[3724]: Invalid user guest from 163.172.49.56 port 58471 Sep 20 14:12:53 localhost sshd[3724]: Failed password for invalid user guest from 163.172.49.56 port 58471 ssh2 Sep 20 14:18:18 localhost sshd[4291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.49.56 user=root Sep 20 14:18:20 localhost sshd[4291]: Failed password for root from 163.172.49.56 port 34915 ssh2 ... |
2020-09-20 22:38:42 |
| 103.91.143.95 | attackspambots | Email rejected due to spam filtering |
2020-09-20 22:31:30 |
| 185.134.232.118 | attackbotsspam | Unauthorized connection attempt from IP address 185.134.232.118 on Port 445(SMB) |
2020-09-20 22:39:49 |