城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.21.34.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.21.34.134. IN A
;; AUTHORITY SECTION:
. 179 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061503 1800 900 604800 86400
;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 16 10:43:43 CST 2022
;; MSG SIZE rcvd: 105
Host 134.34.21.50.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.34.21.50.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
134.122.69.7 | attackbotsspam | 5x Failed Password |
2020-09-15 16:19:43 |
91.241.59.33 | attack | 2020-09-15T03:26:08.486420server.mjenks.net sshd[1284575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.241.59.33 2020-09-15T03:26:08.479283server.mjenks.net sshd[1284575]: Invalid user sid from 91.241.59.33 port 49654 2020-09-15T03:26:10.649248server.mjenks.net sshd[1284575]: Failed password for invalid user sid from 91.241.59.33 port 49654 ssh2 2020-09-15T03:30:08.062814server.mjenks.net sshd[1285051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.241.59.33 user=root 2020-09-15T03:30:10.170540server.mjenks.net sshd[1285051]: Failed password for root from 91.241.59.33 port 53586 ssh2 ... |
2020-09-15 16:34:58 |
209.85.222.193 | attackbotsspam | Phishing |
2020-09-15 16:36:11 |
192.145.99.71 | attackbots | Sep 15 03:42:48 our-server-hostname sshd[30783]: Address 192.145.99.71 maps to aofy.ru, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 15 03:42:48 our-server-hostname sshd[30783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.145.99.71 user=r.r Sep 15 03:42:50 our-server-hostname sshd[30783]: Failed password for r.r from 192.145.99.71 port 60175 ssh2 Sep 15 03:59:06 our-server-hostname sshd[32531]: Address 192.145.99.71 maps to aofy.ru, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Sep 15 03:59:06 our-server-hostname sshd[32531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.145.99.71 user=r.r Sep 15 03:59:08 our-server-hostname sshd[32531]: Failed password for r.r from 192.145.99.71 port 40733 ssh2 Sep 15 04:03:54 our-server-hostname sshd[547]: Address 192.145.99.71 maps to aofy.ru, but this does not map back to the address ........ ------------------------------- |
2020-09-15 16:12:26 |
162.241.222.41 | attackspambots | Sep 15 10:00:13 serwer sshd\[26998\]: Invalid user hadoop from 162.241.222.41 port 50052 Sep 15 10:00:13 serwer sshd\[26998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.222.41 Sep 15 10:00:15 serwer sshd\[26998\]: Failed password for invalid user hadoop from 162.241.222.41 port 50052 ssh2 ... |
2020-09-15 16:28:18 |
179.233.3.103 | attackbotsspam | Failed password for invalid user root from 179.233.3.103 port 57519 ssh2 |
2020-09-15 16:56:46 |
177.124.74.47 | attackbots | (sshd) Failed SSH login from 177.124.74.47 (BR/Brazil/177-124-74-47.fxnet.com.br): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD |
2020-09-15 16:25:12 |
129.144.183.81 | attackspambots | Unauthorized SSH login attempts |
2020-09-15 16:13:57 |
80.251.211.150 | attackbotsspam | Time: Mon Sep 14 20:19:27 2020 +0000 IP: 80.251.211.150 (US/United States/80.251.211.150.16clouds.com) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 14 19:48:46 ca-1-ams1 sshd[38528]: Failed password for root from 80.251.211.150 port 51918 ssh2 Sep 14 20:04:36 ca-1-ams1 sshd[38974]: Failed password for root from 80.251.211.150 port 42094 ssh2 Sep 14 20:09:25 ca-1-ams1 sshd[39205]: Failed password for root from 80.251.211.150 port 33718 ssh2 Sep 14 20:14:18 ca-1-ams1 sshd[39427]: Failed password for root from 80.251.211.150 port 53672 ssh2 Sep 14 20:19:22 ca-1-ams1 sshd[39554]: Failed password for root from 80.251.211.150 port 45346 ssh2 |
2020-09-15 16:53:09 |
201.99.106.67 | attackbotsspam | Sep 14 21:43:46 vmd26974 sshd[5997]: Failed password for root from 201.99.106.67 port 47073 ssh2 ... |
2020-09-15 16:50:47 |
107.189.10.93 | attackspam | (sshd) Failed SSH login from 107.189.10.93 (US/United States/exit.tor.gg): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 15 02:24:58 optimus sshd[26997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.10.93 user=root Sep 15 02:25:00 optimus sshd[26997]: Failed password for root from 107.189.10.93 port 34078 ssh2 Sep 15 02:25:02 optimus sshd[26997]: Failed password for root from 107.189.10.93 port 34078 ssh2 Sep 15 02:25:06 optimus sshd[26997]: Failed password for root from 107.189.10.93 port 34078 ssh2 Sep 15 02:25:08 optimus sshd[26997]: Failed password for root from 107.189.10.93 port 34078 ssh2 |
2020-09-15 16:42:03 |
104.45.42.142 | attackbots | 15.09.2020 06:46:02 - Login Fail on hMailserver Detected by ELinOX-hMail-A2F |
2020-09-15 16:52:45 |
167.71.210.7 | attackbotsspam | Sep 15 10:02:05 inter-technics sshd[26790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.7 user=root Sep 15 10:02:07 inter-technics sshd[26790]: Failed password for root from 167.71.210.7 port 59368 ssh2 Sep 15 10:06:38 inter-technics sshd[27098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.7 user=root Sep 15 10:06:40 inter-technics sshd[27098]: Failed password for root from 167.71.210.7 port 42664 ssh2 Sep 15 10:11:16 inter-technics sshd[27440]: Invalid user ftp from 167.71.210.7 port 54198 ... |
2020-09-15 16:16:04 |
157.245.124.160 | attackbots | Sep 15 01:50:02 askasleikir sshd[8106]: Failed password for root from 157.245.124.160 port 46172 ssh2 |
2020-09-15 16:30:48 |
68.183.89.147 | attackspam | SSH_scan |
2020-09-15 16:29:48 |