城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.0.196.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.0.196.237. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 04:47:27 CST 2025
;; MSG SIZE rcvd: 105
237.196.0.50.in-addr.arpa domain name pointer 50-0-196-237.dedicated.static.sonic.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
237.196.0.50.in-addr.arpa name = 50-0-196-237.dedicated.static.sonic.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 58.230.147.230 | attackspam | SSH Brute-force |
2020-10-10 22:24:07 |
| 45.119.82.251 | attackspam | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-10-10 22:13:14 |
| 112.85.42.231 | attackbotsspam | 2020-10-10T15:54:44.311007 sshd[2860295]: Unable to negotiate with 112.85.42.231 port 14018: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] 2020-10-10T16:02:51.000463 sshd[2866346]: Unable to negotiate with 112.85.42.231 port 43902: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] 2020-10-10T16:02:51.035858 sshd[2866348]: Unable to negotiate with 112.85.42.231 port 27568: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] |
2020-10-10 22:03:14 |
| 212.70.149.52 | attackbots | Oct 10 16:11:52 srv01 postfix/smtpd\[1854\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 10 16:11:54 srv01 postfix/smtpd\[31394\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 10 16:11:58 srv01 postfix/smtpd\[2166\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 10 16:12:00 srv01 postfix/smtpd\[2173\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 10 16:12:17 srv01 postfix/smtpd\[2185\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-10 22:17:56 |
| 81.70.20.28 | attackspam | $f2bV_matches |
2020-10-10 22:24:57 |
| 194.5.177.67 | attackspambots | Lines containing failures of 194.5.177.67 Oct 7 20:37:48 nodeA4 sshd[17651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.177.67 user=r.r Oct 7 20:37:50 nodeA4 sshd[17651]: Failed password for r.r from 194.5.177.67 port 47458 ssh2 Oct 7 20:37:50 nodeA4 sshd[17651]: Received disconnect from 194.5.177.67 port 47458:11: Bye Bye [preauth] Oct 7 20:37:50 nodeA4 sshd[17651]: Disconnected from authenticating user r.r 194.5.177.67 port 47458 [preauth] Oct 7 20:46:00 nodeA4 sshd[18539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.177.67 user=r.r Oct 7 20:46:02 nodeA4 sshd[18539]: Failed password for r.r from 194.5.177.67 port 59788 ssh2 Oct 7 20:46:02 nodeA4 sshd[18539]: Received disconnect from 194.5.177.67 port 59788:11: Bye Bye [preauth] Oct 7 20:46:02 nodeA4 sshd[18539]: Disconnected from authenticating user r.r 194.5.177.67 port 59788 [preauth] Oct 7 20:50:47 nodeA4 ........ ------------------------------ |
2020-10-10 22:28:14 |
| 222.186.42.137 | attack | Oct 10 16:17:24 piServer sshd[16781]: Failed password for root from 222.186.42.137 port 36114 ssh2 Oct 10 16:17:28 piServer sshd[16781]: Failed password for root from 222.186.42.137 port 36114 ssh2 Oct 10 16:17:32 piServer sshd[16781]: Failed password for root from 222.186.42.137 port 36114 ssh2 ... |
2020-10-10 22:21:13 |
| 171.249.58.157 | attackbots | Unauthorized connection attempt detected from IP address 171.249.58.157 to port 23 [T] |
2020-10-10 22:00:28 |
| 35.188.49.176 | attack | Oct 10 08:48:31 shivevps sshd[13107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.188.49.176 Oct 10 08:48:33 shivevps sshd[13107]: Failed password for invalid user ghost2 from 35.188.49.176 port 59984 ssh2 Oct 10 08:52:01 shivevps sshd[13183]: Invalid user web94p4 from 35.188.49.176 port 37772 ... |
2020-10-10 22:09:03 |
| 192.35.168.230 | attackspam | port |
2020-10-10 22:28:43 |
| 112.85.42.183 | attackbots | 2020-10-10T13:43:10.434139randservbullet-proofcloud-66.localdomain sshd[27892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.183 user=root 2020-10-10T13:43:12.029274randservbullet-proofcloud-66.localdomain sshd[27892]: Failed password for root from 112.85.42.183 port 51316 ssh2 2020-10-10T13:43:15.394267randservbullet-proofcloud-66.localdomain sshd[27892]: Failed password for root from 112.85.42.183 port 51316 ssh2 2020-10-10T13:43:10.434139randservbullet-proofcloud-66.localdomain sshd[27892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.183 user=root 2020-10-10T13:43:12.029274randservbullet-proofcloud-66.localdomain sshd[27892]: Failed password for root from 112.85.42.183 port 51316 ssh2 2020-10-10T13:43:15.394267randservbullet-proofcloud-66.localdomain sshd[27892]: Failed password for root from 112.85.42.183 port 51316 ssh2 ... |
2020-10-10 21:53:52 |
| 94.102.56.238 | attackspam | Oct 10 14:08:39 mail postfix/smtpd[102206]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: generic failure Oct 10 14:08:39 mail postfix/smtpd[102206]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: generic failure Oct 10 14:08:39 mail postfix/smtpd[102206]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: generic failure Oct 10 14:08:39 mail postfix/smtpd[102206]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: generic failure Oct 10 14:08:39 mail postfix/smtpd[102206]: warning: unknown[94.102.56.238]: SASL LOGIN authentication failed: generic failure ... |
2020-10-10 22:16:54 |
| 165.232.76.218 | attackbots | Oct 10 09:28:38 dignus sshd[12247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.76.218 Oct 10 09:28:40 dignus sshd[12247]: Failed password for invalid user informix from 165.232.76.218 port 33776 ssh2 Oct 10 09:34:16 dignus sshd[12410]: Invalid user test2001 from 165.232.76.218 port 38906 Oct 10 09:34:16 dignus sshd[12410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.76.218 Oct 10 09:34:18 dignus sshd[12410]: Failed password for invalid user test2001 from 165.232.76.218 port 38906 ssh2 ... |
2020-10-10 22:35:03 |
| 124.126.18.130 | attack | Oct 10 08:28:39 mail sshd\[51122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.126.18.130 user=root ... |
2020-10-10 22:11:35 |
| 89.33.192.23 | attackspambots | Sep 20 04:32:51 *hidden* postfix/postscreen[42372]: DNSBL rank 3 for [89.33.192.23]:38112 |
2020-10-10 22:37:56 |