城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.206.247.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.206.247.131. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 19:50:55 CST 2025
;; MSG SIZE rcvd: 107
Host 131.247.206.55.in-addr.arpa not found: 2(SERVFAIL)
server can't find 55.206.247.131.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
113.169.114.119 | attack | Sep 22 18:50:01 mail1 sshd[24303]: Did not receive identification string from 113.169.114.119 port 58241 Sep 22 18:50:06 mail1 sshd[24318]: Invalid user nagesh from 113.169.114.119 port 58958 Sep 22 18:50:06 mail1 sshd[24318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.169.114.119 Sep 22 18:50:08 mail1 sshd[24318]: Failed password for invalid user nagesh from 113.169.114.119 port 58958 ssh2 Sep 22 18:50:08 mail1 sshd[24318]: Connection closed by 113.169.114.119 port 58958 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=113.169.114.119 |
2020-09-23 22:30:49 |
42.119.62.4 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2020-09-23 22:37:09 |
109.73.12.36 | attackbotsspam | Brute-force attempt banned |
2020-09-23 22:14:57 |
45.55.157.158 | attackbots | 2020-09-23T13:39:19.429744abusebot-4.cloudsearch.cf sshd[6844]: Invalid user postgres from 45.55.157.158 port 40950 2020-09-23T13:39:19.436687abusebot-4.cloudsearch.cf sshd[6844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.157.158 2020-09-23T13:39:19.429744abusebot-4.cloudsearch.cf sshd[6844]: Invalid user postgres from 45.55.157.158 port 40950 2020-09-23T13:39:21.663291abusebot-4.cloudsearch.cf sshd[6844]: Failed password for invalid user postgres from 45.55.157.158 port 40950 ssh2 2020-09-23T13:39:24.470479abusebot-4.cloudsearch.cf sshd[6846]: Invalid user postgres from 45.55.157.158 port 41368 2020-09-23T13:39:24.476476abusebot-4.cloudsearch.cf sshd[6846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.157.158 2020-09-23T13:39:24.470479abusebot-4.cloudsearch.cf sshd[6846]: Invalid user postgres from 45.55.157.158 port 41368 2020-09-23T13:39:26.723144abusebot-4.cloudsearch.cf sshd[6846]: ... |
2020-09-23 22:30:22 |
188.193.32.62 | attackbots | Listed on zen-spamhaus also barracudaCentral and abuseat.org / proto=6 . srcport=22664 . dstport=5555 . (3079) |
2020-09-23 22:29:17 |
139.155.31.52 | attackspam | Sep 23 05:33:34 web1 sshd[7088]: Invalid user cloud from 139.155.31.52 port 36474 Sep 23 05:33:34 web1 sshd[7088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.31.52 Sep 23 05:33:34 web1 sshd[7088]: Invalid user cloud from 139.155.31.52 port 36474 Sep 23 05:33:37 web1 sshd[7088]: Failed password for invalid user cloud from 139.155.31.52 port 36474 ssh2 Sep 23 05:41:04 web1 sshd[9609]: Invalid user kodiak from 139.155.31.52 port 54724 Sep 23 05:41:04 web1 sshd[9609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.31.52 Sep 23 05:41:04 web1 sshd[9609]: Invalid user kodiak from 139.155.31.52 port 54724 Sep 23 05:41:07 web1 sshd[9609]: Failed password for invalid user kodiak from 139.155.31.52 port 54724 ssh2 Sep 23 05:46:55 web1 sshd[11511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.31.52 user=root Sep 23 05:46:57 web1 sshd[11511]: Fail ... |
2020-09-23 22:06:47 |
118.89.241.214 | attackspam | Invalid user ldap from 118.89.241.214 port 28647 |
2020-09-23 22:33:43 |
178.129.82.213 | attack | Unauthorized connection attempt from IP address 178.129.82.213 on Port 445(SMB) |
2020-09-23 22:08:50 |
93.109.34.189 | attack | Sep 23 03:02:39 eventyay sshd[18736]: Failed password for root from 93.109.34.189 port 60758 ssh2 Sep 23 03:02:43 eventyay sshd[18755]: Failed password for root from 93.109.34.189 port 60845 ssh2 ... |
2020-09-23 22:39:06 |
223.19.77.206 | attackbotsspam | Sep 22 17:01:59 ssh2 sshd[20649]: User root from 223.19.77.206 not allowed because not listed in AllowUsers Sep 22 17:01:59 ssh2 sshd[20649]: Failed password for invalid user root from 223.19.77.206 port 60271 ssh2 Sep 22 17:02:00 ssh2 sshd[20649]: Connection closed by invalid user root 223.19.77.206 port 60271 [preauth] ... |
2020-09-23 22:45:27 |
217.232.144.221 | attackspam | Automatic report - Port Scan Attack |
2020-09-23 22:24:49 |
171.221.210.158 | attackspam | Sep 23 05:39:35 melroy-server sshd[22790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.221.210.158 Sep 23 05:39:37 melroy-server sshd[22790]: Failed password for invalid user web from 171.221.210.158 port 54545 ssh2 ... |
2020-09-23 22:29:34 |
96.69.13.140 | attack | Failed password for invalid user admin from 96.69.13.140 port 50453 ssh2 |
2020-09-23 22:22:41 |
42.177.78.48 | attackspambots | Sep 23 14:15:50 PorscheCustomer sshd[3609]: Failed password for root from 42.177.78.48 port 53442 ssh2 Sep 23 14:18:27 PorscheCustomer sshd[3639]: Failed password for root from 42.177.78.48 port 56718 ssh2 ... |
2020-09-23 22:10:32 |
218.92.0.184 | attackbotsspam | Sep 23 04:13:12 php1 sshd\[30079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184 user=root Sep 23 04:13:14 php1 sshd\[30079\]: Failed password for root from 218.92.0.184 port 37785 ssh2 Sep 23 04:13:24 php1 sshd\[30079\]: Failed password for root from 218.92.0.184 port 37785 ssh2 Sep 23 04:13:27 php1 sshd\[30079\]: Failed password for root from 218.92.0.184 port 37785 ssh2 Sep 23 04:13:44 php1 sshd\[30112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184 user=root |
2020-09-23 22:28:33 |