城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.42.125.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.42.125.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 09:34:36 CST 2025
;; MSG SIZE rcvd: 106
Host 134.125.42.54.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.125.42.54.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 95.131.79.31 | attackbots | May 21 05:48:29 dev sshd\[13826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.131.79.31 user=root May 21 05:48:31 dev sshd\[13826\]: Failed password for root from 95.131.79.31 port 36750 ssh2 May 21 05:48:33 dev sshd\[13826\]: Failed password for root from 95.131.79.31 port 36750 ssh2 |
2020-05-21 19:40:33 |
| 111.230.236.93 | attack | May 21 05:59:07 firewall sshd[18421]: Invalid user qxl from 111.230.236.93 May 21 05:59:09 firewall sshd[18421]: Failed password for invalid user qxl from 111.230.236.93 port 60550 ssh2 May 21 06:00:25 firewall sshd[18478]: Invalid user qui from 111.230.236.93 ... |
2020-05-21 19:42:14 |
| 138.197.149.97 | attack | May 21 14:05:40 ift sshd\[12509\]: Invalid user yvx from 138.197.149.97May 21 14:05:42 ift sshd\[12509\]: Failed password for invalid user yvx from 138.197.149.97 port 59852 ssh2May 21 14:09:02 ift sshd\[12603\]: Invalid user bgd from 138.197.149.97May 21 14:09:04 ift sshd\[12603\]: Failed password for invalid user bgd from 138.197.149.97 port 38084 ssh2May 21 14:12:20 ift sshd\[13098\]: Invalid user tiu from 138.197.149.97 ... |
2020-05-21 19:35:29 |
| 46.161.27.75 | attack | trying to access non-authorized port |
2020-05-21 19:46:53 |
| 106.215.212.55 | attackbots | Lines containing failures of 106.215.212.55 May 21 13:43:24 own sshd[12661]: Did not receive identification string from 106.215.212.55 port 2017 May 21 13:43:43 own sshd[12695]: Invalid user user1 from 106.215.212.55 port 46461 May 21 13:43:45 own sshd[12695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.215.212.55 May 21 13:43:47 own sshd[12695]: Failed password for invalid user user1 from 106.215.212.55 port 46461 ssh2 May 21 13:43:47 own sshd[12695]: Connection closed by invalid user user1 106.215.212.55 port 46461 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=106.215.212.55 |
2020-05-21 20:10:53 |
| 201.40.244.146 | attackspam | May 21 01:25:48 web9 sshd\[19639\]: Invalid user tjy from 201.40.244.146 May 21 01:25:48 web9 sshd\[19639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.40.244.146 May 21 01:25:50 web9 sshd\[19639\]: Failed password for invalid user tjy from 201.40.244.146 port 35290 ssh2 May 21 01:26:32 web9 sshd\[19750\]: Invalid user oyx from 201.40.244.146 May 21 01:26:32 web9 sshd\[19750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.40.244.146 |
2020-05-21 19:42:26 |
| 122.224.241.164 | attackspam | Invalid user ent from 122.224.241.164 port 56902 |
2020-05-21 19:59:31 |
| 5.196.75.47 | attackbots | Found by fail2ban |
2020-05-21 19:31:57 |
| 125.227.240.25 | attackspambots | May 21 05:48:37 mout sshd[509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.240.25 user=pi May 21 05:48:39 mout sshd[509]: Failed password for pi from 125.227.240.25 port 34536 ssh2 May 21 05:48:39 mout sshd[509]: Connection closed by 125.227.240.25 port 34536 [preauth] |
2020-05-21 19:37:24 |
| 60.177.88.45 | attackspam | Brute force attempt |
2020-05-21 19:56:40 |
| 62.234.142.49 | attackbotsspam | May 21 08:22:50 lukav-desktop sshd\[11061\]: Invalid user mx from 62.234.142.49 May 21 08:22:50 lukav-desktop sshd\[11061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.142.49 May 21 08:22:52 lukav-desktop sshd\[11061\]: Failed password for invalid user mx from 62.234.142.49 port 34884 ssh2 May 21 08:26:01 lukav-desktop sshd\[11089\]: Invalid user xfc from 62.234.142.49 May 21 08:26:01 lukav-desktop sshd\[11089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.142.49 |
2020-05-21 19:33:18 |
| 37.139.9.23 | attack | (sshd) Failed SSH login from 37.139.9.23 (NL/Netherlands/-): 5 in the last 3600 secs |
2020-05-21 19:44:38 |
| 203.106.41.154 | attackbotsspam | Auto Fail2Ban report, multiple SSH login attempts. |
2020-05-21 19:47:17 |
| 111.231.93.242 | attack | Invalid user egb from 111.231.93.242 port 52186 |
2020-05-21 19:37:42 |
| 189.179.139.209 | attack | [portscan] Port scan |
2020-05-21 19:41:45 |