城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.139.185.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1381
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.139.185.130. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030601 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 09:20:35 CST 2025
;; MSG SIZE rcvd: 107
Host 130.185.139.55.in-addr.arpa not found: 2(SERVFAIL)
server can't find 55.139.185.130.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 119.90.51.171 | attack | Apr 19 09:12:46 cloud sshd[5615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.51.171 Apr 19 09:12:48 cloud sshd[5615]: Failed password for invalid user nagios from 119.90.51.171 port 49841 ssh2 |
2020-04-19 17:27:02 |
| 138.68.226.175 | attackspam | Bruteforce detected by fail2ban |
2020-04-19 17:10:18 |
| 218.92.0.208 | attack | Apr 19 06:38:19 MainVPS sshd[17747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208 user=root Apr 19 06:38:21 MainVPS sshd[17747]: Failed password for root from 218.92.0.208 port 41940 ssh2 Apr 19 06:39:27 MainVPS sshd[18810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208 user=root Apr 19 06:39:29 MainVPS sshd[18810]: Failed password for root from 218.92.0.208 port 31242 ssh2 Apr 19 06:40:29 MainVPS sshd[19682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208 user=root Apr 19 06:40:32 MainVPS sshd[19682]: Failed password for root from 218.92.0.208 port 44977 ssh2 ... |
2020-04-19 17:11:52 |
| 83.159.194.187 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-04-19 17:13:08 |
| 221.130.129.196 | attackspambots | Apr 19 11:33:37 www sshd\[241240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.130.129.196 user=root Apr 19 11:33:40 www sshd\[241240\]: Failed password for root from 221.130.129.196 port 4722 ssh2 Apr 19 11:33:49 www sshd\[241240\]: Failed password for root from 221.130.129.196 port 4722 ssh2 ... |
2020-04-19 17:14:01 |
| 106.12.221.64 | attackbotsspam | Apr 19 10:44:33 MainVPS sshd[29165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.64 user=root Apr 19 10:44:35 MainVPS sshd[29165]: Failed password for root from 106.12.221.64 port 33938 ssh2 Apr 19 10:51:04 MainVPS sshd[2305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.64 user=root Apr 19 10:51:06 MainVPS sshd[2305]: Failed password for root from 106.12.221.64 port 42712 ssh2 Apr 19 10:54:15 MainVPS sshd[4844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.221.64 user=root Apr 19 10:54:17 MainVPS sshd[4844]: Failed password for root from 106.12.221.64 port 47118 ssh2 ... |
2020-04-19 17:28:48 |
| 170.80.225.115 | attackbotsspam | 2020-04-19T03:50:58.505760shield sshd\[29834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.80.225.115 user=root 2020-04-19T03:51:00.065812shield sshd\[29834\]: Failed password for root from 170.80.225.115 port 45068 ssh2 2020-04-19T03:51:02.356648shield sshd\[29834\]: Failed password for root from 170.80.225.115 port 45068 ssh2 2020-04-19T03:51:04.261738shield sshd\[29834\]: Failed password for root from 170.80.225.115 port 45068 ssh2 2020-04-19T03:51:06.435026shield sshd\[29834\]: Failed password for root from 170.80.225.115 port 45068 ssh2 |
2020-04-19 16:59:11 |
| 175.24.107.201 | attackspam | Repeated brute force against a port |
2020-04-19 17:01:47 |
| 163.44.150.247 | attackbotsspam | Apr 19 10:49:43 srv-ubuntu-dev3 sshd[14556]: Invalid user wi from 163.44.150.247 Apr 19 10:49:43 srv-ubuntu-dev3 sshd[14556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247 Apr 19 10:49:43 srv-ubuntu-dev3 sshd[14556]: Invalid user wi from 163.44.150.247 Apr 19 10:49:45 srv-ubuntu-dev3 sshd[14556]: Failed password for invalid user wi from 163.44.150.247 port 47595 ssh2 Apr 19 10:53:41 srv-ubuntu-dev3 sshd[15271]: Invalid user ftpu from 163.44.150.247 Apr 19 10:53:42 srv-ubuntu-dev3 sshd[15271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247 Apr 19 10:53:41 srv-ubuntu-dev3 sshd[15271]: Invalid user ftpu from 163.44.150.247 Apr 19 10:53:44 srv-ubuntu-dev3 sshd[15271]: Failed password for invalid user ftpu from 163.44.150.247 port 50691 ssh2 Apr 19 10:57:42 srv-ubuntu-dev3 sshd[15947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44. ... |
2020-04-19 17:14:20 |
| 104.248.1.92 | attackspam | Port 13399 scan denied |
2020-04-19 17:33:17 |
| 27.255.79.163 | attackbotsspam | Unauthorized connection attempt detected from IP address 27.255.79.163 to port 2433 |
2020-04-19 17:18:42 |
| 106.13.99.107 | attackspambots | DATE:2020-04-19 10:21:52, IP:106.13.99.107, PORT:ssh SSH brute force auth (docker-dc) |
2020-04-19 17:06:08 |
| 49.233.91.21 | attack | Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-04-19 17:02:35 |
| 183.89.237.234 | attackbotsspam | (imapd) Failed IMAP login from 183.89.237.234 (TH/Thailand/mx-ll-183.89.237-234.dynamic.3bb.in.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 19 08:20:42 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user= |
2020-04-19 17:10:39 |
| 206.189.132.8 | attack | Apr 19 10:43:51 roki sshd[3309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.8 user=ubuntu Apr 19 10:43:54 roki sshd[3309]: Failed password for ubuntu from 206.189.132.8 port 36240 ssh2 Apr 19 10:50:53 roki sshd[3784]: Invalid user admin from 206.189.132.8 Apr 19 10:50:54 roki sshd[3784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.8 Apr 19 10:50:55 roki sshd[3784]: Failed password for invalid user admin from 206.189.132.8 port 57680 ssh2 ... |
2020-04-19 17:25:16 |