城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.244.125.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;53.244.125.116. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 15:12:05 CST 2025
;; MSG SIZE rcvd: 107
Host 116.125.244.53.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 116.125.244.53.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.22.142.132 | attackbots | Apr 3 05:51:11 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\ |
2020-04-03 12:14:41 |
| 194.116.134.6 | attackspambots | SSH brute force attempt |
2020-04-03 10:39:42 |
| 51.91.108.15 | attackbots | detected by Fail2Ban |
2020-04-03 12:11:24 |
| 222.186.173.238 | attackspambots | Apr 3 06:01:25 legacy sshd[2988]: Failed password for root from 222.186.173.238 port 30500 ssh2 Apr 3 06:01:29 legacy sshd[2988]: Failed password for root from 222.186.173.238 port 30500 ssh2 Apr 3 06:01:38 legacy sshd[2988]: Failed password for root from 222.186.173.238 port 30500 ssh2 Apr 3 06:01:38 legacy sshd[2988]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 30500 ssh2 [preauth] ... |
2020-04-03 12:03:52 |
| 27.214.224.213 | attack | 20/4/2@17:47:12: FAIL: IoT-Telnet address from=27.214.224.213 ... |
2020-04-03 10:52:50 |
| 92.63.194.25 | attack | Brute-force attempt banned |
2020-04-03 12:17:03 |
| 68.183.124.53 | attackspam | Apr 3 05:53:37 vps sshd[291739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53 Apr 3 05:53:38 vps sshd[291739]: Failed password for invalid user js from 68.183.124.53 port 46816 ssh2 Apr 3 05:57:04 vps sshd[311504]: Invalid user js from 68.183.124.53 port 57710 Apr 3 05:57:04 vps sshd[311504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.53 Apr 3 05:57:05 vps sshd[311504]: Failed password for invalid user js from 68.183.124.53 port 57710 ssh2 ... |
2020-04-03 12:01:03 |
| 218.92.0.172 | attackspambots | Apr 2 22:31:31 plusreed sshd[27035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172 user=root Apr 2 22:31:33 plusreed sshd[27035]: Failed password for root from 218.92.0.172 port 25092 ssh2 ... |
2020-04-03 10:44:32 |
| 92.118.38.66 | attackbots | 2020-04-03T06:05:15.301102www postfix/smtpd[2041]: warning: unknown[92.118.38.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-04-03T06:06:01.453409www postfix/smtpd[2041]: warning: unknown[92.118.38.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-04-03T06:06:43.139953www postfix/smtpd[2041]: warning: unknown[92.118.38.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-04-03 12:10:29 |
| 187.18.208.34 | attackbots | 2020-04-03T03:48:01.609857shield sshd\[8400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.18.208.34 user=root 2020-04-03T03:48:03.429390shield sshd\[8400\]: Failed password for root from 187.18.208.34 port 31586 ssh2 2020-04-03T03:52:29.772679shield sshd\[9584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.18.208.34 user=root 2020-04-03T03:52:31.717528shield sshd\[9584\]: Failed password for root from 187.18.208.34 port 21893 ssh2 2020-04-03T03:56:59.444649shield sshd\[10980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.18.208.34 user=root |
2020-04-03 12:06:49 |
| 116.109.128.112 | attack | trying to access non-authorized port |
2020-04-03 10:38:51 |
| 112.117.206.172 | attack | CN China 172.206.117.112.broad.km.yn.dynamic.163data.com.cn Failures: 20 ftpd |
2020-04-03 12:20:48 |
| 209.97.134.82 | attackspambots | Apr 3 05:51:56 ns381471 sshd[16109]: Failed password for root from 209.97.134.82 port 45348 ssh2 |
2020-04-03 12:02:34 |
| 134.122.19.128 | attackspam | 2020-04-03T05:56:32.883804vfs-server-01 sshd\[31667\]: Invalid user ubnt from 134.122.19.128 port 52744 2020-04-03T05:56:33.666983vfs-server-01 sshd\[31670\]: Invalid user admin from 134.122.19.128 port 54360 2020-04-03T05:56:35.253114vfs-server-01 sshd\[31674\]: Invalid user 1234 from 134.122.19.128 port 57256 |
2020-04-03 12:28:39 |
| 54.153.43.203 | attack | Lines containing failures of 54.153.43.203 auth.log:Apr 2 23:10:17 omfg sshd[11367]: Connection from 54.153.43.203 port 35330 on 78.46.60.53 port 22 auth.log:Apr 2 23:10:18 omfg sshd[11367]: Connection closed by 54.153.43.203 port 35330 [preauth] auth.log:Apr 2 23:10:19 omfg sshd[11369]: Connection from 54.153.43.203 port 36844 on 78.46.60.53 port 22 auth.log:Apr 2 23:10:20 omfg sshd[11369]: fatal: Unable to negotiate whostnameh 54.153.43.203 port 36844: no matching host key type found. Their offer: ecdsa-sha2-nistp384 [preauth] auth.log:Apr 2 23:10:20 omfg sshd[11371]: Connection from 54.153.43.203 port 37658 on 78.46.60.53 port 22 auth.log:Apr 2 23:10:21 omfg sshd[11371]: fatal: Unable to negotiate whostnameh 54.153.43.203 port 37658: no matching host key type found. Their offer: ecdsa-sha2-nistp521 [preauth] auth.log:Apr 2 23:10:21 omfg sshd[11420]: Connection from 54.153.43.203 port 38698 on 78.46.60.53 port 22 auth.log:Apr 2 23:10:23 omfg sshd[11420]: Connec........ ------------------------------ |
2020-04-03 10:42:08 |