城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.116.42.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;53.116.42.135.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 07:27:23 CST 2025
;; MSG SIZE  rcvd: 106
        Host 135.42.116.53.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 135.42.116.53.in-addr.arpa: NXDOMAIN
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 138.197.118.32 | attackbotsspam | SSH Authentication Attempts Exceeded  | 
                    2020-04-02 20:12:31 | 
| 31.184.199.114 | attackbotsspam | Apr 2 12:12:35 [HOSTNAME] sshd[21412]: Invalid user 0 from 31.184.199.114 port 47359 Apr 2 12:12:35 [HOSTNAME] sshd[21412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.184.199.114 Apr 2 12:12:37 [HOSTNAME] sshd[21412]: Failed password for invalid user 0 from 31.184.199.114 port 47359 ssh2 ...  | 
                    2020-04-02 20:21:33 | 
| 190.43.175.135 | attackbotsspam | firewall-block, port(s): 445/tcp  | 
                    2020-04-02 20:31:58 | 
| 112.67.184.144 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-02 20:31:33 | 
| 222.173.203.221 | attackspam | firewall-block, port(s): 445/tcp  | 
                    2020-04-02 20:26:09 | 
| 213.182.93.172 | attackbotsspam | (sshd) Failed SSH login from 213.182.93.172 (IT/Italy/213-182-93-172.ip.welcomeitalia.it): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 2 08:32:38 localhost sshd[21769]: Invalid user cg from 213.182.93.172 port 39100 Apr 2 08:32:40 localhost sshd[21769]: Failed password for invalid user cg from 213.182.93.172 port 39100 ssh2 Apr 2 08:43:32 localhost sshd[22546]: Invalid user cg from 213.182.93.172 port 48874 Apr 2 08:43:34 localhost sshd[22546]: Failed password for invalid user cg from 213.182.93.172 port 48874 ssh2 Apr 2 08:47:29 localhost sshd[22829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.182.93.172 user=root  | 
                    2020-04-02 20:57:35 | 
| 106.13.23.105 | attackspam | (sshd) Failed SSH login from 106.13.23.105 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 2 12:28:09 ubnt-55d23 sshd[30025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.23.105 user=root Apr 2 12:28:12 ubnt-55d23 sshd[30025]: Failed password for root from 106.13.23.105 port 54448 ssh2  | 
                    2020-04-02 20:41:15 | 
| 37.139.16.94 | attackbotsspam | SSH Authentication Attempts Exceeded  | 
                    2020-04-02 20:20:04 | 
| 194.228.3.191 | attack | SSH Brute Force  | 
                    2020-04-02 20:20:54 | 
| 113.22.82.167 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 02-04-2020 04:50:11.  | 
                    2020-04-02 20:40:49 | 
| 167.71.67.238 | attackspambots | Apr 2 14:34:45 tuxlinux sshd[10469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.67.238 user=root Apr 2 14:34:48 tuxlinux sshd[10469]: Failed password for root from 167.71.67.238 port 45550 ssh2 Apr 2 14:34:45 tuxlinux sshd[10469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.67.238 user=root Apr 2 14:34:48 tuxlinux sshd[10469]: Failed password for root from 167.71.67.238 port 45550 ssh2 Apr 2 14:47:32 tuxlinux sshd[10722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.67.238 user=root ...  | 
                    2020-04-02 20:55:09 | 
| 137.74.44.162 | attackbotsspam | $f2bV_matches  | 
                    2020-04-02 20:13:12 | 
| 128.199.162.108 | attackspam | Brute-force attempt banned  | 
                    2020-04-02 20:37:51 | 
| 140.143.203.122 | attack | Apr 2 11:17:18 ns382633 sshd\[32620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.203.122 user=root Apr 2 11:17:20 ns382633 sshd\[32620\]: Failed password for root from 140.143.203.122 port 54658 ssh2 Apr 2 11:29:48 ns382633 sshd\[2384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.203.122 user=root Apr 2 11:29:50 ns382633 sshd\[2384\]: Failed password for root from 140.143.203.122 port 35948 ssh2 Apr 2 11:34:18 ns382633 sshd\[3273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.203.122 user=root  | 
                    2020-04-02 20:36:51 | 
| 27.238.194.105 | attackbotsspam | Attempted connection to port 54575.  | 
                    2020-04-02 20:58:52 |