城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.139.109.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57043
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.139.109.91. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 08:42:19 CST 2025
;; MSG SIZE rcvd: 106
Host 91.109.139.54.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 91.109.139.54.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.128.15.208 | attackbotsspam | Aug 25 17:52:49 vps639187 sshd\[3176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.128.15.208 user=root Aug 25 17:52:52 vps639187 sshd\[3176\]: Failed password for root from 222.128.15.208 port 52300 ssh2 Aug 25 17:58:08 vps639187 sshd\[3274\]: Invalid user ydy from 222.128.15.208 port 59436 Aug 25 17:58:08 vps639187 sshd\[3274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.128.15.208 ... |
2020-08-26 03:02:33 |
| 114.67.67.148 | attackspambots | Aug 25 18:54:34 vps647732 sshd[17993]: Failed password for root from 114.67.67.148 port 41774 ssh2 ... |
2020-08-26 02:49:01 |
| 49.206.229.219 | attack | Invalid user boge from 49.206.229.219 port 57592 |
2020-08-26 02:58:32 |
| 180.76.176.126 | attack | 2020-08-25T16:47:04.955232abusebot-3.cloudsearch.cf sshd[16607]: Invalid user lyt from 180.76.176.126 port 36905 2020-08-25T16:47:04.959605abusebot-3.cloudsearch.cf sshd[16607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126 2020-08-25T16:47:04.955232abusebot-3.cloudsearch.cf sshd[16607]: Invalid user lyt from 180.76.176.126 port 36905 2020-08-25T16:47:07.098504abusebot-3.cloudsearch.cf sshd[16607]: Failed password for invalid user lyt from 180.76.176.126 port 36905 ssh2 2020-08-25T16:53:57.842284abusebot-3.cloudsearch.cf sshd[16704]: Invalid user jx from 180.76.176.126 port 50131 2020-08-25T16:53:57.847090abusebot-3.cloudsearch.cf sshd[16704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126 2020-08-25T16:53:57.842284abusebot-3.cloudsearch.cf sshd[16704]: Invalid user jx from 180.76.176.126 port 50131 2020-08-25T16:53:59.686639abusebot-3.cloudsearch.cf sshd[16704]: Failed pass ... |
2020-08-26 02:40:21 |
| 122.160.111.188 | attackspambots | Aug 25 18:10:13 ip106 sshd[24967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.160.111.188 Aug 25 18:10:15 ip106 sshd[24967]: Failed password for invalid user postgres from 122.160.111.188 port 10654 ssh2 ... |
2020-08-26 02:47:50 |
| 117.158.78.5 | attackbots | Aug 25 11:26:23 Tower sshd[23305]: Connection from 117.158.78.5 port 32938 on 192.168.10.220 port 22 rdomain "" Aug 25 11:26:27 Tower sshd[23305]: Invalid user recog from 117.158.78.5 port 32938 Aug 25 11:26:27 Tower sshd[23305]: error: Could not get shadow information for NOUSER Aug 25 11:26:27 Tower sshd[23305]: Failed password for invalid user recog from 117.158.78.5 port 32938 ssh2 Aug 25 11:26:27 Tower sshd[23305]: Received disconnect from 117.158.78.5 port 32938:11: Bye Bye [preauth] Aug 25 11:26:27 Tower sshd[23305]: Disconnected from invalid user recog 117.158.78.5 port 32938 [preauth] |
2020-08-26 02:48:48 |
| 218.94.156.130 | attack | Aug 25 12:40:32 ws22vmsma01 sshd[166840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.156.130 Aug 25 12:40:35 ws22vmsma01 sshd[166840]: Failed password for invalid user user from 218.94.156.130 port 55194 ssh2 ... |
2020-08-26 03:03:05 |
| 99.185.76.161 | attackbots | 2020-08-25T19:43:26.023510cyberdyne sshd[994677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.185.76.161 user=root 2020-08-25T19:43:28.319555cyberdyne sshd[994677]: Failed password for root from 99.185.76.161 port 34456 ssh2 2020-08-25T19:47:33.144575cyberdyne sshd[995587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.185.76.161 user=root 2020-08-25T19:47:34.818220cyberdyne sshd[995587]: Failed password for root from 99.185.76.161 port 41754 ssh2 ... |
2020-08-26 02:52:48 |
| 136.49.109.217 | attack | Aug 25 20:03:56 srv-ubuntu-dev3 sshd[63451]: Invalid user user from 136.49.109.217 Aug 25 20:03:56 srv-ubuntu-dev3 sshd[63451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.49.109.217 Aug 25 20:03:56 srv-ubuntu-dev3 sshd[63451]: Invalid user user from 136.49.109.217 Aug 25 20:03:58 srv-ubuntu-dev3 sshd[63451]: Failed password for invalid user user from 136.49.109.217 port 52974 ssh2 Aug 25 20:07:32 srv-ubuntu-dev3 sshd[63871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.49.109.217 user=root Aug 25 20:07:34 srv-ubuntu-dev3 sshd[63871]: Failed password for root from 136.49.109.217 port 59560 ssh2 Aug 25 20:10:55 srv-ubuntu-dev3 sshd[64328]: Invalid user sm from 136.49.109.217 Aug 25 20:10:55 srv-ubuntu-dev3 sshd[64328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.49.109.217 Aug 25 20:10:55 srv-ubuntu-dev3 sshd[64328]: Invalid user sm from 136.49. ... |
2020-08-26 02:45:17 |
| 49.235.69.9 | attack | Invalid user batman from 49.235.69.9 port 58712 |
2020-08-26 02:57:44 |
| 68.183.19.84 | attackbotsspam | Time: Tue Aug 25 18:01:34 2020 +0200 IP: 68.183.19.84 (US/United States/host.andrefornari) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Aug 25 17:50:47 mail-01 sshd[12095]: Invalid user tecnico from 68.183.19.84 port 40606 Aug 25 17:50:50 mail-01 sshd[12095]: Failed password for invalid user tecnico from 68.183.19.84 port 40606 ssh2 Aug 25 17:57:59 mail-01 sshd[12445]: Invalid user cacheusr from 68.183.19.84 port 57924 Aug 25 17:58:01 mail-01 sshd[12445]: Failed password for invalid user cacheusr from 68.183.19.84 port 57924 ssh2 Aug 25 18:01:33 mail-01 sshd[17501]: Invalid user gitlab-runner from 68.183.19.84 port 36146 |
2020-08-26 02:54:37 |
| 45.78.185.234 | attackspambots | Invalid user admin from 45.78.185.234 port 53986 |
2020-08-26 03:00:13 |
| 157.245.211.180 | attackbotsspam | Aug 25 19:35:47 v22019038103785759 sshd\[18590\]: Invalid user dtc from 157.245.211.180 port 60368 Aug 25 19:35:47 v22019038103785759 sshd\[18590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.211.180 Aug 25 19:35:49 v22019038103785759 sshd\[18590\]: Failed password for invalid user dtc from 157.245.211.180 port 60368 ssh2 Aug 25 19:39:27 v22019038103785759 sshd\[19022\]: Invalid user recovery from 157.245.211.180 port 42858 Aug 25 19:39:27 v22019038103785759 sshd\[19022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.211.180 ... |
2020-08-26 03:09:33 |
| 200.133.39.84 | attack | 2020-08-25T20:51:59.733779galaxy.wi.uni-potsdam.de sshd[22762]: Invalid user gy from 200.133.39.84 port 46670 2020-08-25T20:52:01.147038galaxy.wi.uni-potsdam.de sshd[22762]: Failed password for invalid user gy from 200.133.39.84 port 46670 ssh2 2020-08-25T20:53:59.289645galaxy.wi.uni-potsdam.de sshd[22976]: Invalid user postgres from 200.133.39.84 port 49464 2020-08-25T20:53:59.294698galaxy.wi.uni-potsdam.de sshd[22976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-133-39-84.compute.rnp.br 2020-08-25T20:53:59.289645galaxy.wi.uni-potsdam.de sshd[22976]: Invalid user postgres from 200.133.39.84 port 49464 2020-08-25T20:54:00.843377galaxy.wi.uni-potsdam.de sshd[22976]: Failed password for invalid user postgres from 200.133.39.84 port 49464 ssh2 2020-08-25T20:55:59.760582galaxy.wi.uni-potsdam.de sshd[23199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-133-39-84.compute.rnp.br user=root 2020-08-2 ... |
2020-08-26 03:04:45 |
| 159.89.194.160 | attack | Aug 25 16:34:33 ip40 sshd[10197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.160 Aug 25 16:34:35 ip40 sshd[10197]: Failed password for invalid user schmidt from 159.89.194.160 port 41260 ssh2 ... |
2020-08-26 02:41:47 |