城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.0.71.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;47.0.71.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 11:32:11 CST 2025
;; MSG SIZE rcvd: 103
55.71.0.47.in-addr.arpa domain name pointer syn-047-000-071-055.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
55.71.0.47.in-addr.arpa name = syn-047-000-071-055.res.spectrum.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 157.230.230.152 | attackspambots | Oct 1 11:21:27 propaganda sshd[17196]: Connection from 157.230.230.152 port 58848 on 10.0.0.161 port 22 rdomain "" Oct 1 11:21:27 propaganda sshd[17196]: Connection closed by 157.230.230.152 port 58848 [preauth] |
2020-10-02 06:39:17 |
| 178.157.12.249 | attackspam | Invalid user test from 178.157.12.249 port 39234 |
2020-10-02 06:46:13 |
| 187.149.137.250 | attack | Oct 1 13:48:05 george sshd[23283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.149.137.250 user=root Oct 1 13:48:07 george sshd[23283]: Failed password for root from 187.149.137.250 port 46254 ssh2 Oct 1 13:51:15 george sshd[23322]: Invalid user user from 187.149.137.250 port 42369 Oct 1 13:51:15 george sshd[23322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.149.137.250 Oct 1 13:51:18 george sshd[23322]: Failed password for invalid user user from 187.149.137.250 port 42369 ssh2 ... |
2020-10-02 06:53:11 |
| 192.35.169.59 | attackbotsspam | trying to access non-authorized port |
2020-10-02 06:52:27 |
| 45.148.122.20 | attack | Sep 30 19:17:45 kunden sshd[4130]: Invalid user fake from 45.148.122.20 Sep 30 19:17:45 kunden sshd[4130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.122.20 Sep 30 19:17:47 kunden sshd[4130]: Failed password for invalid user fake from 45.148.122.20 port 44306 ssh2 Sep 30 19:17:47 kunden sshd[4130]: Received disconnect from 45.148.122.20: 11: Bye Bye [preauth] Sep 30 19:17:51 kunden sshd[4138]: Invalid user admin from 45.148.122.20 Sep 30 19:17:51 kunden sshd[4138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.122.20 Sep 30 19:17:54 kunden sshd[4138]: Failed password for invalid user admin from 45.148.122.20 port 51340 ssh2 Sep 30 19:17:54 kunden sshd[4138]: Received disconnect from 45.148.122.20: 11: Bye Bye [preauth] Sep 30 19:17:55 kunden sshd[4168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.122.20 user=r.r Sep 3........ ------------------------------- |
2020-10-02 06:34:07 |
| 164.68.112.178 | attack | Failed password for invalid user from 164.68.112.178 port 48267 ssh2 |
2020-10-02 06:24:52 |
| 167.71.140.30 | attackspambots | 167.71.140.30 - - [01/Oct/2020:13:17:52 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.71.140.30 - - [01/Oct/2020:13:17:52 +0200] "POST /wp-login.php HTTP/1.1" 200 8875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.71.140.30 - - [01/Oct/2020:13:17:53 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-10-02 06:28:19 |
| 159.89.163.226 | attack | SSH Invalid Login |
2020-10-02 06:25:12 |
| 41.165.88.132 | attackspam | Time: Thu Oct 1 20:51:45 2020 +0000 IP: 41.165.88.132 (ZA/South Africa/iredmail.docview.co.za) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Oct 1 20:40:49 29-1 sshd[13172]: Invalid user cod4server from 41.165.88.132 port 53114 Oct 1 20:40:51 29-1 sshd[13172]: Failed password for invalid user cod4server from 41.165.88.132 port 53114 ssh2 Oct 1 20:49:12 29-1 sshd[14444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.165.88.132 user=root Oct 1 20:49:14 29-1 sshd[14444]: Failed password for root from 41.165.88.132 port 58622 ssh2 Oct 1 20:51:43 29-1 sshd[14797]: Invalid user sistema from 41.165.88.132 port 38588 |
2020-10-02 06:25:28 |
| 146.185.163.81 | attackspambots | 146.185.163.81 - - [01/Oct/2020:23:18:33 +0100] "POST /wp-login.php HTTP/1.1" 200 2238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185.163.81 - - [01/Oct/2020:23:18:34 +0100] "POST /wp-login.php HTTP/1.1" 200 2282 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185.163.81 - - [01/Oct/2020:23:18:34 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-02 06:39:36 |
| 106.37.223.54 | attack | $f2bV_matches |
2020-10-02 06:35:38 |
| 49.88.112.114 | attack | Oct 1 23:03:20 server sshd[47730]: Failed password for root from 49.88.112.114 port 47313 ssh2 Oct 2 00:05:13 server sshd[13310]: Failed password for root from 49.88.112.114 port 58762 ssh2 Oct 2 00:05:18 server sshd[13310]: Failed password for root from 49.88.112.114 port 58762 ssh2 |
2020-10-02 06:24:27 |
| 156.54.171.41 | attackbots | 2020-10-01T23:51:01.900688hostname sshd[13285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.54.171.41 2020-10-01T23:51:01.859544hostname sshd[13285]: Invalid user vlc from 156.54.171.41 port 50804 2020-10-01T23:51:03.543770hostname sshd[13285]: Failed password for invalid user vlc from 156.54.171.41 port 50804 ssh2 ... |
2020-10-02 06:24:08 |
| 37.98.196.42 | attack | Oct 1 21:22:28 ns382633 sshd\[17598\]: Invalid user teste from 37.98.196.42 port 41700 Oct 1 21:22:28 ns382633 sshd\[17598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.98.196.42 Oct 1 21:22:30 ns382633 sshd\[17598\]: Failed password for invalid user teste from 37.98.196.42 port 41700 ssh2 Oct 1 21:27:06 ns382633 sshd\[18205\]: Invalid user mine from 37.98.196.42 port 63022 Oct 1 21:27:06 ns382633 sshd\[18205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.98.196.42 |
2020-10-02 06:20:59 |
| 193.95.24.114 | attack | 2020-10-02T03:42:43.415576hostname sshd[21636]: Failed password for invalid user anil from 193.95.24.114 port 44830 ssh2 ... |
2020-10-02 06:34:39 |