城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.93.139.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54421
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;51.93.139.68. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 19:31:59 CST 2025
;; MSG SIZE rcvd: 105
Host 68.139.93.51.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 68.139.93.51.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
62.102.148.68 | attackspambots | Sep 4 12:49:16 ubuntu-2gb-nbg1-dc3-1 sshd[32655]: Failed password for root from 62.102.148.68 port 54918 ssh2 Sep 4 12:49:21 ubuntu-2gb-nbg1-dc3-1 sshd[32655]: error: maximum authentication attempts exceeded for root from 62.102.148.68 port 54918 ssh2 [preauth] ... |
2019-09-04 18:53:53 |
201.190.147.72 | attackspam | DATE:2019-09-04 05:15:39, IP:201.190.147.72, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis) |
2019-09-04 18:05:35 |
113.118.93.8 | attackspambots | Brute force SMTP login attempts. |
2019-09-04 19:07:09 |
77.244.217.179 | attackspam | Sep 4 08:28:15 our-server-hostname postfix/smtpd[24361]: connect from unknown[77.244.217.179] Sep x@x Sep 4 08:28:17 our-server-hostname postfix/smtpd[24361]: disconnect from unknown[77.244.217.179] Sep 4 08:33:25 our-server-hostname postfix/smtpd[22700]: connect from unknown[77.244.217.179] Sep x@x Sep 4 08:33:26 our-server-hostname postfix/smtpd[22700]: disconnect from unknown[77.244.217.179] Sep 4 08:40:34 our-server-hostname postfix/smtpd[21065]: connect from unknown[77.244.217.179] Sep x@x Sep 4 08:40:35 our-server-hostname postfix/smtpd[21065]: disconnect from unknown[77.244.217.179] Sep 4 09:41:40 our-server-hostname postfix/smtpd[25570]: connect from unknown[77.244.217.179] Sep x@x Sep 4 09:41:41 our-server-hostname postfix/smtpd[25570]: disconnect from unknown[77.244.217.179] Sep 4 10:39:40 our-server-hostname postfix/smtpd[13291]: connect from unknown[77.244.217.179] Sep x@x Sep 4 10:39:41 our-server-hostname postfix/smtpd[13291]: disconnect from unk........ ------------------------------- |
2019-09-04 18:55:42 |
111.207.253.225 | attackspambots | 2019-09-04 dovecot_login authenticator failed for \(**REMOVED**\) \[111.207.253.225\]: 535 Incorrect authentication data \(set_id=nologin\) 2019-09-04 dovecot_login authenticator failed for \(**REMOVED**\) \[111.207.253.225\]: 535 Incorrect authentication data \(set_id=text\) 2019-09-04 dovecot_login authenticator failed for \(**REMOVED**\) \[111.207.253.225\]: 535 Incorrect authentication data \(set_id=text\) |
2019-09-04 17:51:31 |
185.217.228.29 | attackspambots | Sep 4 12:11:57 our-server-hostname postfix/smtpd[32458]: connect from unknown[185.217.228.29] Sep 4 12:11:57 our-server-hostname postfix/smtpd[5313]: connect from unknown[185.217.228.29] Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x Sep x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=185.217.228.29 |
2019-09-04 18:52:18 |
200.150.74.114 | attack | SSH invalid-user multiple login try |
2019-09-04 18:58:40 |
176.31.172.40 | attackbots | Sep 4 12:13:30 SilenceServices sshd[1301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.172.40 Sep 4 12:13:32 SilenceServices sshd[1301]: Failed password for invalid user moo from 176.31.172.40 port 41104 ssh2 Sep 4 12:17:23 SilenceServices sshd[2831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.172.40 |
2019-09-04 19:08:51 |
106.51.2.108 | attackspam | Sep 4 12:31:29 server sshd\[15282\]: Invalid user platform from 106.51.2.108 port 9025 Sep 4 12:31:29 server sshd\[15282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.2.108 Sep 4 12:31:30 server sshd\[15282\]: Failed password for invalid user platform from 106.51.2.108 port 9025 ssh2 Sep 4 12:36:27 server sshd\[856\]: Invalid user slib from 106.51.2.108 port 27075 Sep 4 12:36:27 server sshd\[856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.2.108 |
2019-09-04 18:04:33 |
83.13.115.58 | attackspambots | 23/tcp 23/tcp [2019-08-23/09-04]2pkt |
2019-09-04 18:49:11 |
184.66.248.150 | attackbots | Sep 4 04:09:32 hcbbdb sshd\[25438\]: Invalid user sya from 184.66.248.150 Sep 4 04:09:32 hcbbdb sshd\[25438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010600f28b41237d.gv.shawcable.net Sep 4 04:09:35 hcbbdb sshd\[25438\]: Failed password for invalid user sya from 184.66.248.150 port 60556 ssh2 Sep 4 04:13:53 hcbbdb sshd\[25921\]: Invalid user napsugar from 184.66.248.150 Sep 4 04:13:53 hcbbdb sshd\[25921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s010600f28b41237d.gv.shawcable.net |
2019-09-04 18:46:22 |
60.50.123.92 | attack | Sep 3 21:13:06 friendsofhawaii sshd\[6524\]: Invalid user pub from 60.50.123.92 Sep 3 21:13:06 friendsofhawaii sshd\[6524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.123.50.60.klj04-home.tm.net.my Sep 3 21:13:08 friendsofhawaii sshd\[6524\]: Failed password for invalid user pub from 60.50.123.92 port 54930 ssh2 Sep 3 21:17:57 friendsofhawaii sshd\[6940\]: Invalid user asalyers from 60.50.123.92 Sep 3 21:17:57 friendsofhawaii sshd\[6940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.123.50.60.klj04-home.tm.net.my |
2019-09-04 17:57:09 |
35.187.248.21 | attackbots | Aug 22 20:14:19 Server10 sshd[19806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.187.248.21 Aug 22 20:14:21 Server10 sshd[19806]: Failed password for invalid user openbravo from 35.187.248.21 port 55066 ssh2 |
2019-09-04 19:01:12 |
132.232.181.252 | attackspam | 2019-09-04T10:41:04.220308abusebot-5.cloudsearch.cf sshd\[32606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.181.252 user=root |
2019-09-04 18:53:15 |
5.196.156.38 | attackspam | Sep 3 23:09:46 aiointranet sshd\[21692\]: Invalid user admin from 5.196.156.38 Sep 3 23:09:46 aiointranet sshd\[21692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip38.ip-5-196-156.eu Sep 3 23:09:48 aiointranet sshd\[21692\]: Failed password for invalid user admin from 5.196.156.38 port 35560 ssh2 Sep 3 23:13:35 aiointranet sshd\[21993\]: Invalid user tom from 5.196.156.38 Sep 3 23:13:35 aiointranet sshd\[21993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip38.ip-5-196-156.eu |
2019-09-04 18:28:34 |