城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.221.68.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.221.68.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 15:28:16 CST 2025
;; MSG SIZE rcvd: 106
b'Host 214.68.221.55.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 55.221.68.214.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.55.173.225 | attack | (sshd) Failed SSH login from 45.55.173.225 (US/United States/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Nov 29 10:41:11 host sshd[61889]: Invalid user buckland from 45.55.173.225 port 46510 |
2019-11-30 04:19:33 |
| 157.230.119.200 | attackbotsspam | 2019-09-17T00:41:43.464760suse-nuc sshd[6213]: Invalid user legal1 from 157.230.119.200 port 42120 ... |
2019-11-30 04:11:51 |
| 106.12.86.205 | attackbots | Nov 29 19:58:17 mail sshd\[5127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205 user=root Nov 29 19:58:19 mail sshd\[5127\]: Failed password for root from 106.12.86.205 port 55928 ssh2 Nov 29 20:02:12 mail sshd\[5441\]: Invalid user achaer74 from 106.12.86.205 Nov 29 20:02:12 mail sshd\[5441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.86.205 ... |
2019-11-30 04:30:48 |
| 173.236.72.146 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-30 04:28:09 |
| 94.102.57.2 | attackbots | SSH login attempts with user root. |
2019-11-30 04:34:39 |
| 154.8.233.189 | attackbotsspam | Nov 29 16:34:39 OPSO sshd\[28832\]: Invalid user wwwrun from 154.8.233.189 port 41224 Nov 29 16:34:39 OPSO sshd\[28832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.189 Nov 29 16:34:40 OPSO sshd\[28832\]: Failed password for invalid user wwwrun from 154.8.233.189 port 41224 ssh2 Nov 29 16:40:03 OPSO sshd\[29907\]: Invalid user ssh from 154.8.233.189 port 47180 Nov 29 16:40:03 OPSO sshd\[29907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.189 |
2019-11-30 04:13:45 |
| 82.117.249.1 | attackspambots | web Attack on Wordpress site |
2019-11-30 04:44:46 |
| 159.203.201.219 | attackspam | 32255/tcp 49274/tcp 50116/tcp... [2019-09-29/11-29]62pkt,47pt.(tcp),6pt.(udp) |
2019-11-30 04:19:17 |
| 208.113.160.7 | attackbotsspam | 208.113.160.7 - - [29/Nov/2019:16:07:40 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 208.113.160.7 - - [29/Nov/2019:16:07:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2294 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 208.113.160.7 - - [29/Nov/2019:16:07:41 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 208.113.160.7 - - [29/Nov/2019:16:07:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2268 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 208.113.160.7 - - [29/Nov/2019:16:07:41 +0100] "GET /wp-login.php HTTP/1.1" 200 1896 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 208.113.160.7 - - [29/Nov/2019:16:07:42 +0100] "POST /wp-login.php HTTP/1.1" 200 2269 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-11-30 04:15:30 |
| 196.52.43.53 | attackspambots | 8090/tcp 51/tcp 11211/tcp... [2019-09-30/11-29]72pkt,44pt.(tcp),3pt.(udp) |
2019-11-30 04:06:04 |
| 120.41.139.158 | attackbotsspam | Unauthorised access (Nov 29) SRC=120.41.139.158 LEN=40 TTL=243 ID=1962 TCP DPT=1433 WINDOW=1024 SYN |
2019-11-30 04:28:38 |
| 198.108.67.37 | attackbots | firewall-block, port(s): 9202/tcp |
2019-11-30 04:27:37 |
| 49.88.112.68 | attack | Nov 29 21:55:08 sauna sshd[100600]: Failed password for root from 49.88.112.68 port 26772 ssh2 ... |
2019-11-30 04:07:29 |
| 85.98.12.1 | attackspambots | web Attack on Website |
2019-11-30 04:41:26 |
| 87.107.65.1 | attackspambots | web Attack on Website |
2019-11-30 04:39:57 |