城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.242.79.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21586
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.242.79.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 01:56:53 CST 2025
;; MSG SIZE rcvd: 106
Host 138.79.242.48.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 138.79.242.48.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 60.255.230.202 | attackspam | Nov 22 12:12:18 gw1 sshd[4169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.255.230.202 Nov 22 12:12:21 gw1 sshd[4169]: Failed password for invalid user denzler from 60.255.230.202 port 48020 ssh2 ... |
2019-11-22 15:30:48 |
| 106.12.27.11 | attack | Nov 22 07:45:06 SilenceServices sshd[32603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.11 Nov 22 07:45:08 SilenceServices sshd[32603]: Failed password for invalid user missirli from 106.12.27.11 port 32824 ssh2 Nov 22 07:49:26 SilenceServices sshd[1407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.11 |
2019-11-22 15:08:55 |
| 51.158.21.170 | attackbots | " " |
2019-11-22 15:13:01 |
| 54.37.151.239 | attackspam | Nov 22 09:05:50 sauna sshd[163963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239 Nov 22 09:05:53 sauna sshd[163963]: Failed password for invalid user liorder from 54.37.151.239 port 48583 ssh2 ... |
2019-11-22 15:42:27 |
| 143.192.97.178 | attack | Nov 22 07:25:29 sd-53420 sshd\[26046\]: Invalid user fourcade from 143.192.97.178 Nov 22 07:25:29 sd-53420 sshd\[26046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.192.97.178 Nov 22 07:25:31 sd-53420 sshd\[26046\]: Failed password for invalid user fourcade from 143.192.97.178 port 12943 ssh2 Nov 22 07:29:21 sd-53420 sshd\[27199\]: Invalid user nithia from 143.192.97.178 Nov 22 07:29:21 sd-53420 sshd\[27199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.192.97.178 ... |
2019-11-22 15:13:46 |
| 180.110.151.92 | attack | badbot |
2019-11-22 15:08:04 |
| 129.28.142.81 | attackspam | Nov 22 07:24:49 thevastnessof sshd[6394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.142.81 ... |
2019-11-22 15:35:47 |
| 104.200.110.210 | attackspambots | Nov 22 09:22:25 sauna sshd[164280]: Failed password for root from 104.200.110.210 port 39584 ssh2 ... |
2019-11-22 15:37:37 |
| 138.68.242.220 | attack | 2019-11-22T07:34:01.732123shield sshd\[19321\]: Invalid user persimmon from 138.68.242.220 port 58622 2019-11-22T07:34:01.736675shield sshd\[19321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.242.220 2019-11-22T07:34:04.486229shield sshd\[19321\]: Failed password for invalid user persimmon from 138.68.242.220 port 58622 ssh2 2019-11-22T07:37:43.785679shield sshd\[20129\]: Invalid user miho123 from 138.68.242.220 port 37948 2019-11-22T07:37:43.790054shield sshd\[20129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.242.220 |
2019-11-22 15:46:11 |
| 180.167.137.103 | attackspambots | Nov 22 09:05:09 server sshd\[32701\]: Invalid user menig from 180.167.137.103 port 49575 Nov 22 09:05:09 server sshd\[32701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.137.103 Nov 22 09:05:11 server sshd\[32701\]: Failed password for invalid user menig from 180.167.137.103 port 49575 ssh2 Nov 22 09:09:23 server sshd\[30445\]: Invalid user fiann from 180.167.137.103 port 44516 Nov 22 09:09:23 server sshd\[30445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.137.103 |
2019-11-22 15:25:21 |
| 103.239.29.41 | attack | Honeypot hit. |
2019-11-22 15:24:35 |
| 62.234.154.64 | attackspam | Nov 22 07:29:23 ns37 sshd[9012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.154.64 |
2019-11-22 15:12:33 |
| 88.147.153.185 | attackbotsspam | fell into ViewStateTrap:wien2018 |
2019-11-22 15:18:50 |
| 113.125.119.83 | attackbots | Nov 21 20:59:19 web1 sshd\[5007\]: Invalid user yoyo from 113.125.119.83 Nov 21 20:59:19 web1 sshd\[5007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.119.83 Nov 21 20:59:21 web1 sshd\[5007\]: Failed password for invalid user yoyo from 113.125.119.83 port 55490 ssh2 Nov 21 21:03:50 web1 sshd\[5398\]: Invalid user oozie from 113.125.119.83 Nov 21 21:03:50 web1 sshd\[5398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.119.83 |
2019-11-22 15:23:39 |
| 221.181.24.246 | attackspambots | F2B jail: sshd. Time: 2019-11-22 08:23:35, Reported by: VKReport |
2019-11-22 15:33:13 |