城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.214.100.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.214.100.7. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:50:36 CST 2025
;; MSG SIZE rcvd: 105
Host 7.100.214.55.in-addr.arpa not found: 2(SERVFAIL)
server can't find 55.214.100.7.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 81.22.45.29 | attack | Port scan attempt detected by AWS-CCS, CTS, India |
2019-08-29 03:15:28 |
| 67.55.92.89 | attackspambots | Aug 28 16:50:08 [host] sshd[21868]: Invalid user liam from 67.55.92.89 Aug 28 16:50:08 [host] sshd[21868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.55.92.89 Aug 28 16:50:10 [host] sshd[21868]: Failed password for invalid user liam from 67.55.92.89 port 56650 ssh2 |
2019-08-29 03:28:29 |
| 68.183.122.211 | attackbotsspam | Muieblackcat Scanner Remote Code Injection Vulnerability, PTR: PTR record not found |
2019-08-29 03:05:23 |
| 140.136.147.92 | attackbotsspam | Aug 28 09:22:03 hiderm sshd\[15787\]: Invalid user nagios from 140.136.147.92 Aug 28 09:22:03 hiderm sshd\[15787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=850-92.ee.fju.edu.tw Aug 28 09:22:05 hiderm sshd\[15787\]: Failed password for invalid user nagios from 140.136.147.92 port 39980 ssh2 Aug 28 09:26:34 hiderm sshd\[16172\]: Invalid user inactive from 140.136.147.92 Aug 28 09:26:34 hiderm sshd\[16172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=850-92.ee.fju.edu.tw |
2019-08-29 03:32:04 |
| 157.245.107.180 | attackspambots | Aug 28 02:27:05 vps34202 sshd[30315]: Invalid user opc from 157.245.107.180 Aug 28 02:27:05 vps34202 sshd[30315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.107.180 Aug 28 02:27:07 vps34202 sshd[30315]: Failed password for invalid user opc from 157.245.107.180 port 32856 ssh2 Aug 28 02:27:07 vps34202 sshd[30315]: Received disconnect from 157.245.107.180: 11: Bye Bye [preauth] Aug 28 03:01:30 vps34202 sshd[30997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.107.180 user=r.r Aug 28 03:01:32 vps34202 sshd[30997]: Failed password for r.r from 157.245.107.180 port 57118 ssh2 Aug 28 03:01:32 vps34202 sshd[30997]: Received disconnect from 157.245.107.180: 11: Bye Bye [preauth] Aug 28 03:06:10 vps34202 sshd[31143]: Invalid user philip from 157.245.107.180 Aug 28 03:06:10 vps34202 sshd[31143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser=........ ------------------------------- |
2019-08-29 03:21:45 |
| 37.59.242.122 | attack | Aug 28 17:31:37 legacy sshd[6983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.242.122 Aug 28 17:31:39 legacy sshd[6983]: Failed password for invalid user starcraft from 37.59.242.122 port 50378 ssh2 Aug 28 17:35:33 legacy sshd[7101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.242.122 ... |
2019-08-29 03:22:43 |
| 191.232.198.212 | attackspambots | Aug 28 15:16:42 xtremcommunity sshd\[31062\]: Invalid user xian from 191.232.198.212 port 36610 Aug 28 15:16:42 xtremcommunity sshd\[31062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.198.212 Aug 28 15:16:44 xtremcommunity sshd\[31062\]: Failed password for invalid user xian from 191.232.198.212 port 36610 ssh2 Aug 28 15:21:50 xtremcommunity sshd\[31224\]: Invalid user info from 191.232.198.212 port 56124 Aug 28 15:21:50 xtremcommunity sshd\[31224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.198.212 ... |
2019-08-29 03:30:31 |
| 176.31.251.177 | attackspam | Aug 28 21:16:00 SilenceServices sshd[26275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.251.177 Aug 28 21:16:02 SilenceServices sshd[26275]: Failed password for invalid user molina5651 from 176.31.251.177 port 45120 ssh2 Aug 28 21:23:57 SilenceServices sshd[29444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.251.177 |
2019-08-29 03:24:36 |
| 160.16.138.99 | attack | Automatic report - Banned IP Access |
2019-08-29 02:53:35 |
| 176.95.135.3 | attackspam | 2019-08-28T16:29:10.545143wiz-ks3 sshd[20030]: Invalid user admin from 176.95.135.3 port 57198 2019-08-28T16:29:10.547402wiz-ks3 sshd[20030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=business-176-095-135-003.static.arcor-ip.net 2019-08-28T16:29:10.545143wiz-ks3 sshd[20030]: Invalid user admin from 176.95.135.3 port 57198 2019-08-28T16:29:13.361485wiz-ks3 sshd[20030]: Failed password for invalid user admin from 176.95.135.3 port 57198 ssh2 2019-08-28T16:47:30.396987wiz-ks3 sshd[20166]: Invalid user admin from 176.95.135.3 port 53150 2019-08-28T16:47:30.399156wiz-ks3 sshd[20166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=business-176-095-135-003.static.arcor-ip.net 2019-08-28T16:47:30.396987wiz-ks3 sshd[20166]: Invalid user admin from 176.95.135.3 port 53150 2019-08-28T16:47:32.891763wiz-ks3 sshd[20166]: Failed password for invalid user admin from 176.95.135.3 port 53150 ssh2 2019-08-28T17:05:48.808528wiz-ks3 sshd[20325 |
2019-08-29 03:16:40 |
| 67.207.86.134 | attack | Aug 28 20:09:52 debian sshd\[25609\]: Invalid user webroot from 67.207.86.134 port 58546 Aug 28 20:09:52 debian sshd\[25609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.86.134 ... |
2019-08-29 03:19:10 |
| 138.197.174.3 | attackspambots | Aug 28 20:29:08 nextcloud sshd\[14903\]: Invalid user huang from 138.197.174.3 Aug 28 20:29:08 nextcloud sshd\[14903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.174.3 Aug 28 20:29:10 nextcloud sshd\[14903\]: Failed password for invalid user huang from 138.197.174.3 port 45376 ssh2 ... |
2019-08-29 02:58:12 |
| 91.236.116.89 | attack | Aug 28 17:12:18 heicom sshd\[25214\]: Invalid user 0 from 91.236.116.89 Aug 28 17:13:16 heicom sshd\[25258\]: Invalid user 22 from 91.236.116.89 Aug 28 17:13:17 heicom sshd\[25262\]: Invalid user 101 from 91.236.116.89 Aug 28 17:13:18 heicom sshd\[25264\]: Invalid user 123 from 91.236.116.89 Aug 28 17:13:19 heicom sshd\[25266\]: Invalid user 1111 from 91.236.116.89 ... |
2019-08-29 03:12:17 |
| 179.185.114.203 | attack | Automatic report - Banned IP Access |
2019-08-29 03:20:50 |
| 45.237.2.59 | attack | Aug 28 14:16:39 raspberrypi sshd\[32155\]: Invalid user admin from 45.237.2.59Aug 28 14:16:42 raspberrypi sshd\[32155\]: Failed password for invalid user admin from 45.237.2.59 port 39389 ssh2Aug 28 14:16:44 raspberrypi sshd\[32155\]: Failed password for invalid user admin from 45.237.2.59 port 39389 ssh2 ... |
2019-08-29 03:10:53 |