城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.119.164.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.119.164.234. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 15:22:41 CST 2025
;; MSG SIZE rcvd: 107
b'Host 234.164.119.55.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 55.119.164.234.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.38.65.178 | attack | Jan 3 01:28:18 plusreed sshd[29505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.65.178 user=postgres Jan 3 01:28:20 plusreed sshd[29505]: Failed password for postgres from 51.38.65.178 port 33108 ssh2 ... |
2020-01-03 14:29:54 |
| 51.68.227.49 | attack | Jan 3 06:15:03 dedicated sshd[3922]: Invalid user test5 from 51.68.227.49 port 56898 |
2020-01-03 14:26:50 |
| 106.12.178.246 | attack | 2020-01-03T04:45:36.300059shield sshd\[671\]: Invalid user hj from 106.12.178.246 port 50934 2020-01-03T04:45:36.304911shield sshd\[671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.246 2020-01-03T04:45:38.184591shield sshd\[671\]: Failed password for invalid user hj from 106.12.178.246 port 50934 ssh2 2020-01-03T04:53:32.506402shield sshd\[3983\]: Invalid user prueba from 106.12.178.246 port 43694 2020-01-03T04:53:32.510441shield sshd\[3983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.246 |
2020-01-03 14:02:37 |
| 106.53.33.77 | attackspambots | Jan 3 07:44:57 server sshd\[5784\]: Invalid user svk from 106.53.33.77 Jan 3 07:44:57 server sshd\[5784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.33.77 Jan 3 07:44:58 server sshd\[5784\]: Failed password for invalid user svk from 106.53.33.77 port 37928 ssh2 Jan 3 08:45:25 server sshd\[21030\]: Invalid user test1 from 106.53.33.77 Jan 3 08:45:25 server sshd\[21030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.33.77 ... |
2020-01-03 14:01:46 |
| 113.190.100.211 | attack | 1578027179 - 01/03/2020 05:52:59 Host: 113.190.100.211/113.190.100.211 Port: 445 TCP Blocked |
2020-01-03 14:17:42 |
| 106.13.44.100 | attackspam | Jan 3 06:46:11 dedicated sshd[9947]: Invalid user dns from 106.13.44.100 port 39334 |
2020-01-03 14:02:08 |
| 112.85.42.174 | attackbots | Jan306:51:37server6sshd[5056]:refusedconnectfrom112.85.42.174\(112.85.42.174\)Jan306:51:37server6sshd[5057]:refusedconnectfrom112.85.42.174\(112.85.42.174\)Jan306:51:37server6sshd[5058]:refusedconnectfrom112.85.42.174\(112.85.42.174\)Jan306:51:37server6sshd[5059]:refusedconnectfrom112.85.42.174\(112.85.42.174\)Jan307:27:38server6sshd[7083]:refusedconnectfrom112.85.42.174\(112.85.42.174\) |
2020-01-03 14:42:21 |
| 218.94.136.90 | attackbots | Invalid user jira from 218.94.136.90 port 15624 |
2020-01-03 14:51:49 |
| 222.186.175.23 | attackbots | Jan 3 01:02:28 TORMINT sshd\[5823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root Jan 3 01:02:30 TORMINT sshd\[5823\]: Failed password for root from 222.186.175.23 port 51221 ssh2 Jan 3 01:07:45 TORMINT sshd\[5943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root ... |
2020-01-03 14:08:19 |
| 37.34.155.11 | attackspam | Unauthorized connection attempt detected from IP address 37.34.155.11 to port 80 |
2020-01-03 14:46:25 |
| 165.227.179.138 | attack | Invalid user bijons from 165.227.179.138 port 51836 |
2020-01-03 14:13:12 |
| 222.186.175.202 | attackspam | Jan 3 07:26:19 MK-Soft-Root2 sshd[30498]: Failed password for root from 222.186.175.202 port 40212 ssh2 Jan 3 07:26:23 MK-Soft-Root2 sshd[30498]: Failed password for root from 222.186.175.202 port 40212 ssh2 ... |
2020-01-03 14:46:58 |
| 184.160.176.56 | attackbotsspam | $f2bV_matches |
2020-01-03 14:27:54 |
| 125.64.94.211 | attackbots | port scan and connect, tcp 6379 (redis) |
2020-01-03 14:04:41 |
| 182.254.172.63 | attackbots | $f2bV_matches |
2020-01-03 14:42:58 |