城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.104.31.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.104.31.45. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:56:29 CST 2025
;; MSG SIZE rcvd: 105
45.31.104.50.in-addr.arpa domain name pointer 50-104-31-45.vng01.trrh.in.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
45.31.104.50.in-addr.arpa name = 50-104-31-45.vng01.trrh.in.frontiernet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.229.101.155 | attackspam | 2020-06-20T01:40:56.2074701495-001 sshd[9920]: Invalid user helix from 111.229.101.155 port 42070 2020-06-20T01:40:56.2122181495-001 sshd[9920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.101.155 2020-06-20T01:40:56.2074701495-001 sshd[9920]: Invalid user helix from 111.229.101.155 port 42070 2020-06-20T01:40:58.2391051495-001 sshd[9920]: Failed password for invalid user helix from 111.229.101.155 port 42070 ssh2 2020-06-20T01:42:43.6643751495-001 sshd[9982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.101.155 user=root 2020-06-20T01:42:45.3800821495-001 sshd[9982]: Failed password for root from 111.229.101.155 port 35072 ssh2 ... |
2020-06-20 18:52:46 |
| 190.85.54.158 | attackspam | Jun 20 01:33:36 pixelmemory sshd[3818551]: Invalid user test2 from 190.85.54.158 port 52259 Jun 20 01:33:36 pixelmemory sshd[3818551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.54.158 Jun 20 01:33:36 pixelmemory sshd[3818551]: Invalid user test2 from 190.85.54.158 port 52259 Jun 20 01:33:38 pixelmemory sshd[3818551]: Failed password for invalid user test2 from 190.85.54.158 port 52259 ssh2 Jun 20 01:37:38 pixelmemory sshd[3822710]: Invalid user photos from 190.85.54.158 port 51967 ... |
2020-06-20 18:38:28 |
| 106.13.232.65 | attackbots | Jun 20 10:57:01 dev0-dcde-rnet sshd[6632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.232.65 Jun 20 10:57:03 dev0-dcde-rnet sshd[6632]: Failed password for invalid user kr from 106.13.232.65 port 46502 ssh2 Jun 20 11:00:06 dev0-dcde-rnet sshd[6658]: Failed password for root from 106.13.232.65 port 60168 ssh2 |
2020-06-20 18:53:57 |
| 185.143.75.81 | attackspambots | Jun 20 12:17:13 srv01 postfix/smtpd\[4035\]: warning: unknown\[185.143.75.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 20 12:17:32 srv01 postfix/smtpd\[4035\]: warning: unknown\[185.143.75.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 20 12:17:33 srv01 postfix/smtpd\[4163\]: warning: unknown\[185.143.75.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 20 12:17:39 srv01 postfix/smtpd\[4180\]: warning: unknown\[185.143.75.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 20 12:18:00 srv01 postfix/smtpd\[4180\]: warning: unknown\[185.143.75.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-06-20 18:20:02 |
| 46.31.221.116 | attackspambots | Jun 20 12:28:15 srv sshd[24167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.31.221.116 |
2020-06-20 18:30:34 |
| 185.220.103.6 | attackspam | 2020-06-20T07:48:33.289659homeassistant sshd[18114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.6 user=root 2020-06-20T07:48:34.824612homeassistant sshd[18114]: Failed password for root from 185.220.103.6 port 48184 ssh2 ... |
2020-06-20 18:27:42 |
| 200.108.139.242 | attack | Invalid user ubnt from 200.108.139.242 port 34303 |
2020-06-20 18:44:45 |
| 54.36.159.88 | attack | Jun 20 12:20:43 OPSO sshd\[27192\]: Invalid user osni from 54.36.159.88 port 38692 Jun 20 12:20:43 OPSO sshd\[27192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.159.88 Jun 20 12:20:45 OPSO sshd\[27192\]: Failed password for invalid user osni from 54.36.159.88 port 38692 ssh2 Jun 20 12:25:46 OPSO sshd\[28510\]: Invalid user mqm from 54.36.159.88 port 38458 Jun 20 12:25:46 OPSO sshd\[28510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.159.88 |
2020-06-20 18:42:37 |
| 106.75.3.52 | attack | Unauthorized connection attempt detected from IP address 106.75.3.52 to port 3333 |
2020-06-20 18:34:17 |
| 61.177.125.242 | attackspam | bruteforce detected |
2020-06-20 18:50:57 |
| 101.89.149.80 | attackbots | Jun 20 11:37:44 cdc sshd[13793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.149.80 user=root Jun 20 11:37:46 cdc sshd[13793]: Failed password for invalid user root from 101.89.149.80 port 34390 ssh2 |
2020-06-20 18:53:09 |
| 117.50.8.61 | attack | Jun 20 12:16:25 sso sshd[2681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.8.61 Jun 20 12:16:27 sso sshd[2681]: Failed password for invalid user tanya from 117.50.8.61 port 38516 ssh2 ... |
2020-06-20 18:39:21 |
| 192.36.53.165 | attackbotsspam | REQUESTED PAGE: / |
2020-06-20 18:41:40 |
| 137.74.119.50 | attackbotsspam | DATE:2020-06-20 12:10:51, IP:137.74.119.50, PORT:ssh SSH brute force auth (docker-dc) |
2020-06-20 18:48:54 |
| 185.39.10.95 | attack | 55 packets to ports 64213 64358 64359 64360 64361 64362 64363 64493 64494 64495 64496 64497 64498 64624 64625 64626 64627 64628 64629 64759 64760 64761 64762 64763 64764 64906 64907 64908 64909 64910 64911 65052 65053 65054 65055 65056 65057 65173 65174 65175, etc. |
2020-06-20 18:16:50 |