城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.57.53.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.57.53.6. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 19:43:50 CST 2025
;; MSG SIZE rcvd: 103
b'Host 6.53.57.55.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 55.57.53.6.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.68.210.22 | attackbotsspam | Port scan on 2 port(s): 139 445 |
2019-12-06 06:11:44 |
| 193.105.24.95 | attackspambots | detected by Fail2Ban |
2019-12-06 06:24:48 |
| 128.199.162.108 | attackbots | Dec 5 22:37:27 markkoudstaal sshd[9623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.108 Dec 5 22:37:29 markkoudstaal sshd[9623]: Failed password for invalid user x from 128.199.162.108 port 40538 ssh2 Dec 5 22:43:54 markkoudstaal sshd[10425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.108 |
2019-12-06 06:02:14 |
| 119.29.12.122 | attack | 2019-12-05T21:51:11.547105shield sshd\[27823\]: Invalid user rprasad from 119.29.12.122 port 59336 2019-12-05T21:51:11.551285shield sshd\[27823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.12.122 2019-12-05T21:51:13.208424shield sshd\[27823\]: Failed password for invalid user rprasad from 119.29.12.122 port 59336 ssh2 2019-12-05T21:57:19.525689shield sshd\[29168\]: Invalid user eoff from 119.29.12.122 port 39014 2019-12-05T21:57:19.530271shield sshd\[29168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.12.122 |
2019-12-06 06:05:06 |
| 148.72.206.225 | attackbots | Dec 6 00:27:29 server sshd\[6044\]: Invalid user guest from 148.72.206.225 Dec 6 00:27:29 server sshd\[6044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-206-225.ip.secureserver.net Dec 6 00:27:31 server sshd\[6044\]: Failed password for invalid user guest from 148.72.206.225 port 54248 ssh2 Dec 6 00:36:15 server sshd\[8529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-206-225.ip.secureserver.net user=sshd Dec 6 00:36:17 server sshd\[8529\]: Failed password for sshd from 148.72.206.225 port 41304 ssh2 ... |
2019-12-06 06:30:24 |
| 118.34.12.35 | attack | 2019-12-05T22:11:49.113060shield sshd\[32237\]: Invalid user siddiqi from 118.34.12.35 port 44996 2019-12-05T22:11:49.117413shield sshd\[32237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35 2019-12-05T22:11:51.063559shield sshd\[32237\]: Failed password for invalid user siddiqi from 118.34.12.35 port 44996 ssh2 2019-12-05T22:18:06.741684shield sshd\[608\]: Invalid user janrune from 118.34.12.35 port 55254 2019-12-05T22:18:06.745862shield sshd\[608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.12.35 |
2019-12-06 06:18:59 |
| 91.214.114.7 | attackspambots | Dec 5 21:55:01 zeus sshd[22123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7 Dec 5 21:55:04 zeus sshd[22123]: Failed password for invalid user bettencourt from 91.214.114.7 port 33958 ssh2 Dec 5 22:01:06 zeus sshd[22279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7 Dec 5 22:01:09 zeus sshd[22279]: Failed password for invalid user glascock from 91.214.114.7 port 44328 ssh2 |
2019-12-06 06:23:54 |
| 2.236.85.90 | attackbots | Telnet/23 MH Probe, BF, Hack - |
2019-12-06 06:06:24 |
| 5.196.110.170 | attackbotsspam | Dec 5 22:03:20 * sshd[22155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.110.170 Dec 5 22:03:22 * sshd[22155]: Failed password for invalid user sybase from 5.196.110.170 port 46250 ssh2 |
2019-12-06 06:16:22 |
| 42.63.167.124 | attack | " " |
2019-12-06 06:07:20 |
| 202.158.40.36 | attackspambots | 2019-12-05T21:26:17.326442 sshd[29044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.40.36 user=root 2019-12-05T21:26:19.666822 sshd[29044]: Failed password for root from 202.158.40.36 port 36476 ssh2 2019-12-05T22:03:06.763380 sshd[29891]: Invalid user jritchey from 202.158.40.36 port 39740 2019-12-05T22:03:06.778889 sshd[29891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.40.36 2019-12-05T22:03:06.763380 sshd[29891]: Invalid user jritchey from 202.158.40.36 port 39740 2019-12-05T22:03:09.379753 sshd[29891]: Failed password for invalid user jritchey from 202.158.40.36 port 39740 ssh2 ... |
2019-12-06 06:29:33 |
| 101.78.240.10 | attack | Dec 5 22:40:32 legacy sshd[5229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.240.10 Dec 5 22:40:34 legacy sshd[5229]: Failed password for invalid user hisae from 101.78.240.10 port 59114 ssh2 Dec 5 22:47:53 legacy sshd[5516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.240.10 ... |
2019-12-06 06:08:57 |
| 91.185.193.101 | attackbotsspam | Dec 5 22:43:59 icinga sshd[17833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.185.193.101 Dec 5 22:44:02 icinga sshd[17833]: Failed password for invalid user ftpuser from 91.185.193.101 port 56883 ssh2 ... |
2019-12-06 06:34:37 |
| 106.13.52.234 | attackspambots | Dec 5 22:03:05 mail sshd\[5721\]: Invalid user ribas from 106.13.52.234 Dec 5 22:03:05 mail sshd\[5721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.234 Dec 5 22:03:07 mail sshd\[5721\]: Failed password for invalid user ribas from 106.13.52.234 port 35696 ssh2 ... |
2019-12-06 06:31:07 |
| 36.155.113.218 | attackspambots | $f2bV_matches |
2019-12-06 06:19:50 |