城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.104.123.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3060
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.104.123.250. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 10:38:30 CST 2025
;; MSG SIZE rcvd: 107
250.123.104.50.in-addr.arpa domain name pointer 50-104-123-250.prtg.in.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
250.123.104.50.in-addr.arpa name = 50-104-123-250.prtg.in.frontiernet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.75.160.215 | attack | Mar 7 23:04:59 ArkNodeAT sshd\[18573\]: Invalid user big from 51.75.160.215 Mar 7 23:04:59 ArkNodeAT sshd\[18573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.160.215 Mar 7 23:05:01 ArkNodeAT sshd\[18573\]: Failed password for invalid user big from 51.75.160.215 port 53538 ssh2 |
2020-03-08 09:33:01 |
| 176.113.115.248 | attackbotsspam | Mar 8 02:11:46 debian-2gb-nbg1-2 kernel: \[5889064.538704\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=176.113.115.248 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=16628 PROTO=TCP SPT=58556 DPT=12801 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-08 09:15:32 |
| 106.3.130.53 | attackspam | Mar 8 01:25:43 MK-Soft-VM3 sshd[7614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.3.130.53 Mar 8 01:25:45 MK-Soft-VM3 sshd[7614]: Failed password for invalid user student from 106.3.130.53 port 47052 ssh2 ... |
2020-03-08 08:57:28 |
| 140.143.57.159 | attack | DATE:2020-03-07 23:05:03, IP:140.143.57.159, PORT:ssh SSH brute force auth (docker-dc) |
2020-03-08 09:31:24 |
| 51.89.208.92 | attackspambots | SSH bruteforce more then 50 syn to 22 port per 10 seconds. |
2020-03-08 08:58:13 |
| 106.13.184.99 | attackspambots | $f2bV_matches |
2020-03-08 09:06:26 |
| 197.159.216.209 | attack | ... |
2020-03-08 09:04:49 |
| 213.251.41.52 | attack | Mar 8 01:46:06 ns382633 sshd\[21678\]: Invalid user sammy from 213.251.41.52 port 42366 Mar 8 01:46:06 ns382633 sshd\[21678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.41.52 Mar 8 01:46:08 ns382633 sshd\[21678\]: Failed password for invalid user sammy from 213.251.41.52 port 42366 ssh2 Mar 8 01:49:57 ns382633 sshd\[21901\]: Invalid user vagrant from 213.251.41.52 port 34426 Mar 8 01:49:57 ns382633 sshd\[21901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.41.52 |
2020-03-08 09:17:30 |
| 199.168.97.141 | attackbots | [ 📨 ] From contato-andre=truweb.com.br@temovel.com.br Sat Mar 07 14:05:58 2020 Received: from zguzmzbhyza5.temovel.com.br ([199.168.97.141]:60832) |
2020-03-08 09:00:57 |
| 13.232.191.33 | attackspam | Automatic report - SSH Brute-Force Attack |
2020-03-08 09:28:34 |
| 159.89.194.103 | attack | Mar 8 00:04:30 lukav-desktop sshd\[31656\]: Invalid user gaojian from 159.89.194.103 Mar 8 00:04:30 lukav-desktop sshd\[31656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103 Mar 8 00:04:32 lukav-desktop sshd\[31656\]: Failed password for invalid user gaojian from 159.89.194.103 port 38696 ssh2 Mar 8 00:05:21 lukav-desktop sshd\[11276\]: Invalid user guest3 from 159.89.194.103 Mar 8 00:05:21 lukav-desktop sshd\[11276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103 |
2020-03-08 09:19:27 |
| 117.157.80.49 | attackspambots | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-03-08 08:56:56 |
| 167.172.22.88 | attack | Mar 7 21:30:36 ovpn sshd[2886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.22.88 user=r.r Mar 7 21:30:38 ovpn sshd[2886]: Failed password for r.r from 167.172.22.88 port 48232 ssh2 Mar 7 21:30:39 ovpn sshd[2886]: Received disconnect from 167.172.22.88 port 48232:11: Bye Bye [preauth] Mar 7 21:30:39 ovpn sshd[2886]: Disconnected from 167.172.22.88 port 48232 [preauth] Mar 7 21:38:09 ovpn sshd[4695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.22.88 user=r.r Mar 7 21:38:10 ovpn sshd[4695]: Failed password for r.r from 167.172.22.88 port 50688 ssh2 Mar 7 21:38:10 ovpn sshd[4695]: Received disconnect from 167.172.22.88 port 50688:11: Bye Bye [preauth] Mar 7 21:38:10 ovpn sshd[4695]: Disconnected from 167.172.22.88 port 50688 [preauth] Mar 7 21:40:38 ovpn sshd[5323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172......... ------------------------------ |
2020-03-08 09:01:41 |
| 117.22.228.62 | attack | Mar 8 01:53:26 srv01 sshd[30773]: Invalid user user from 117.22.228.62 port 32932 Mar 8 01:53:26 srv01 sshd[30773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.22.228.62 Mar 8 01:53:26 srv01 sshd[30773]: Invalid user user from 117.22.228.62 port 32932 Mar 8 01:53:28 srv01 sshd[30773]: Failed password for invalid user user from 117.22.228.62 port 32932 ssh2 Mar 8 02:00:06 srv01 sshd[31155]: Invalid user lackz from 117.22.228.62 port 47125 Mar 8 02:00:06 srv01 sshd[31155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.22.228.62 Mar 8 02:00:06 srv01 sshd[31155]: Invalid user lackz from 117.22.228.62 port 47125 Mar 8 02:00:08 srv01 sshd[31155]: Failed password for invalid user lackz from 117.22.228.62 port 47125 ssh2 ... |
2020-03-08 09:09:23 |
| 159.65.149.139 | attackbotsspam | Mar 5 13:02:49 mail sshd[29048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.149.139 user=r.r Mar 5 13:02:51 mail sshd[29048]: Failed password for r.r from 159.65.149.139 port 43548 ssh2 Mar 5 13:02:51 mail sshd[29048]: Received disconnect from 159.65.149.139: 11: Bye Bye [preauth] Mar 5 13:19:39 mail sshd[31922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.149.139 user=r.r Mar 5 13:19:40 mail sshd[31922]: Failed password for r.r from 159.65.149.139 port 53384 ssh2 Mar 5 13:19:40 mail sshd[31922]: Received disconnect from 159.65.149.139: 11: Bye Bye [preauth] Mar 5 13:23:35 mail sshd[32585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.149.139 user=r.r Mar 5 13:23:37 mail sshd[32585]: Failed password for r.r from 159.65.149.139 port 58992 ssh2 Mar 5 13:23:38 mail sshd[32585]: Received disconnect from 159.65.1........ ------------------------------- |
2020-03-08 09:23:01 |