城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.12.158.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.12.158.99. IN A
;; AUTHORITY SECTION:
. 119 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022121401 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 15 08:18:02 CST 2022
;; MSG SIZE rcvd: 105
Host 99.158.12.54.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 99.158.12.54.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.39.75.1 | attackbots | Oct 10 19:06:47 SilenceServices sshd[8071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1 Oct 10 19:06:49 SilenceServices sshd[8071]: Failed password for invalid user hbase from 54.39.75.1 port 56172 ssh2 Oct 10 19:08:55 SilenceServices sshd[8662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.75.1 |
2019-10-11 01:17:21 |
| 58.254.132.156 | attackspam | Oct 10 19:12:54 meumeu sshd[6207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156 Oct 10 19:12:56 meumeu sshd[6207]: Failed password for invalid user Bet@123 from 58.254.132.156 port 51178 ssh2 Oct 10 19:18:52 meumeu sshd[7198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.156 ... |
2019-10-11 01:21:13 |
| 58.56.9.5 | attackbotsspam | 2019-10-10T14:15:33.6681901240 sshd\[21968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.9.5 user=root 2019-10-10T14:15:35.4758281240 sshd\[21968\]: Failed password for root from 58.56.9.5 port 60820 ssh2 2019-10-10T14:20:00.5591731240 sshd\[22150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.9.5 user=root ... |
2019-10-11 01:21:56 |
| 42.157.129.158 | attack | Oct 10 18:34:55 root sshd[26974]: Failed password for root from 42.157.129.158 port 39360 ssh2 Oct 10 18:41:02 root sshd[27073]: Failed password for root from 42.157.129.158 port 45506 ssh2 ... |
2019-10-11 01:27:08 |
| 157.119.189.93 | attack | Oct 10 10:25:56 ny01 sshd[10463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.119.189.93 Oct 10 10:25:58 ny01 sshd[10463]: Failed password for invalid user P@SS@123 from 157.119.189.93 port 41090 ssh2 Oct 10 10:30:40 ny01 sshd[11003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.119.189.93 |
2019-10-11 01:23:23 |
| 111.223.73.20 | attackbotsspam | Oct 10 18:00:10 vps647732 sshd[7752]: Failed password for root from 111.223.73.20 port 55486 ssh2 ... |
2019-10-11 01:48:09 |
| 106.54.196.110 | attack | Oct 10 19:22:16 OPSO sshd\[30766\]: Invalid user Vogue@2017 from 106.54.196.110 port 33728 Oct 10 19:22:16 OPSO sshd\[30766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.196.110 Oct 10 19:22:18 OPSO sshd\[30766\]: Failed password for invalid user Vogue@2017 from 106.54.196.110 port 33728 ssh2 Oct 10 19:26:23 OPSO sshd\[31459\]: Invalid user Vendor@123 from 106.54.196.110 port 40682 Oct 10 19:26:23 OPSO sshd\[31459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.196.110 |
2019-10-11 01:36:44 |
| 187.162.245.7 | attackbots | Automatic report - Port Scan Attack |
2019-10-11 01:38:29 |
| 193.169.39.254 | attackspambots | Oct 10 20:16:48 hosting sshd[27209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=netup.yugt.ru user=root Oct 10 20:16:50 hosting sshd[27209]: Failed password for root from 193.169.39.254 port 41862 ssh2 Oct 10 20:20:53 hosting sshd[27475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.yugt.ru user=root Oct 10 20:20:55 hosting sshd[27475]: Failed password for root from 193.169.39.254 port 51082 ssh2 ... |
2019-10-11 01:34:43 |
| 159.138.20.247 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-11 01:30:07 |
| 198.108.67.137 | attackspam | Unauthorised access (Oct 10) SRC=198.108.67.137 LEN=40 TTL=37 ID=17833 TCP DPT=23 WINDOW=1024 SYN Unauthorised access (Oct 9) SRC=198.108.67.137 LEN=40 TTL=37 ID=49257 TCP DPT=3306 WINDOW=1024 SYN Unauthorised access (Oct 8) SRC=198.108.67.137 LEN=40 TTL=37 ID=55001 TCP DPT=5432 WINDOW=1024 SYN Unauthorised access (Oct 7) SRC=198.108.67.137 LEN=40 TTL=37 ID=13673 TCP DPT=445 WINDOW=1024 SYN |
2019-10-11 01:28:29 |
| 62.234.73.249 | attackbots | Oct 6 11:29:47 kmh-mb-001 sshd[8513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.73.249 user=r.r Oct 6 11:29:49 kmh-mb-001 sshd[8513]: Failed password for r.r from 62.234.73.249 port 41976 ssh2 Oct 6 11:29:49 kmh-mb-001 sshd[8513]: Received disconnect from 62.234.73.249 port 41976:11: Bye Bye [preauth] Oct 6 11:29:49 kmh-mb-001 sshd[8513]: Disconnected from 62.234.73.249 port 41976 [preauth] Oct 6 11:45:56 kmh-mb-001 sshd[9100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.73.249 user=r.r Oct 6 11:45:58 kmh-mb-001 sshd[9100]: Failed password for r.r from 62.234.73.249 port 41790 ssh2 Oct 6 11:45:58 kmh-mb-001 sshd[9100]: Received disconnect from 62.234.73.249 port 41790:11: Bye Bye [preauth] Oct 6 11:45:58 kmh-mb-001 sshd[9100]: Disconnected from 62.234.73.249 port 41790 [preauth] Oct 6 11:50:38 kmh-mb-001 sshd[9241]: pam_unix(sshd:auth): authentication failu........ ------------------------------- |
2019-10-11 01:55:45 |
| 2.82.143.65 | attack | Automatic report - XMLRPC Attack |
2019-10-11 01:51:51 |
| 178.62.37.168 | attack | Oct 6 21:30:39 mx01 sshd[23550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.37.168 user=r.r Oct 6 21:30:40 mx01 sshd[23550]: Failed password for r.r from 178.62.37.168 port 52514 ssh2 Oct 6 21:30:40 mx01 sshd[23550]: Received disconnect from 178.62.37.168: 11: Bye Bye [preauth] Oct 6 21:48:59 mx01 sshd[25795]: Invalid user 123 from 178.62.37.168 Oct 6 21:48:59 mx01 sshd[25795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.37.168 Oct 6 21:49:01 mx01 sshd[25795]: Failed password for invalid user 123 from 178.62.37.168 port 57204 ssh2 Oct 6 21:49:01 mx01 sshd[25795]: Received disconnect from 178.62.37.168: 11: Bye Bye [preauth] Oct 6 21:52:31 mx01 sshd[26159]: Invalid user Hunter123 from 178.62.37.168 Oct 6 21:52:31 mx01 sshd[26159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.37.168 Oct 6 21:52:34 mx01 sshd[2........ ------------------------------- |
2019-10-11 01:44:24 |
| 112.254.248.128 | attackspambots | Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=65019 TCP DPT=8080 WINDOW=48236 SYN Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=33846 TCP DPT=8080 WINDOW=48236 SYN Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=49242 TCP DPT=8080 WINDOW=48236 SYN Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=30575 TCP DPT=8080 WINDOW=48236 SYN Unauthorised access (Oct 10) SRC=112.254.248.128 LEN=40 TTL=49 ID=49689 TCP DPT=8080 WINDOW=39241 SYN Unauthorised access (Oct 8) SRC=112.254.248.128 LEN=40 TTL=49 ID=5787 TCP DPT=8080 WINDOW=48236 SYN Unauthorised access (Oct 8) SRC=112.254.248.128 LEN=40 TTL=49 ID=2339 TCP DPT=8080 WINDOW=23569 SYN Unauthorised access (Oct 7) SRC=112.254.248.128 LEN=40 TTL=49 ID=8072 TCP DPT=8080 WINDOW=48236 SYN |
2019-10-11 01:36:03 |