城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.93.34.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.93.34.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 10:09:01 CST 2025
;; MSG SIZE rcvd: 105
Host 104.34.93.55.in-addr.arpa not found: 2(SERVFAIL)
server can't find 55.93.34.104.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 167.172.211.201 | attack | Mar 14 00:29:32 plusreed sshd[14534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.211.201 user=root Mar 14 00:29:34 plusreed sshd[14534]: Failed password for root from 167.172.211.201 port 34496 ssh2 ... |
2020-03-14 13:52:57 |
| 222.186.180.223 | attack | Mar 14 10:30:59 areeb-Workstation sshd[25472]: Failed password for root from 222.186.180.223 port 14326 ssh2 Mar 14 10:31:04 areeb-Workstation sshd[25472]: Failed password for root from 222.186.180.223 port 14326 ssh2 ... |
2020-03-14 13:03:28 |
| 176.31.182.125 | attackspambots | SSH Brute-Force Attack |
2020-03-14 13:17:01 |
| 218.92.0.212 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212 user=root Failed password for root from 218.92.0.212 port 64330 ssh2 Failed password for root from 218.92.0.212 port 64330 ssh2 Failed password for root from 218.92.0.212 port 64330 ssh2 Failed password for root from 218.92.0.212 port 64330 ssh2 |
2020-03-14 13:20:01 |
| 106.13.189.158 | attackspambots | (sshd) Failed SSH login from 106.13.189.158 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 14 04:40:16 elude sshd[12587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.189.158 user=root Mar 14 04:40:17 elude sshd[12587]: Failed password for root from 106.13.189.158 port 46540 ssh2 Mar 14 04:50:31 elude sshd[13154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.189.158 user=root Mar 14 04:50:33 elude sshd[13154]: Failed password for root from 106.13.189.158 port 49428 ssh2 Mar 14 04:54:07 elude sshd[13347]: Invalid user upload from 106.13.189.158 port 40564 |
2020-03-14 13:46:32 |
| 185.153.180.180 | attack | " " |
2020-03-14 13:34:36 |
| 45.143.220.98 | attackbotsspam | Mar 14 05:35:56 debian-2gb-nbg1-2 kernel: \[6419687.377755\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.143.220.98 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=25970 PROTO=TCP SPT=40328 DPT=50804 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-14 13:46:50 |
| 45.125.65.42 | attack | Mar 14 06:07:45 relay postfix/smtpd\[7340\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 14 06:07:52 relay postfix/smtpd\[2518\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 14 06:11:10 relay postfix/smtpd\[9101\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 14 06:15:12 relay postfix/smtpd\[30059\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 14 06:22:34 relay postfix/smtpd\[11456\]: warning: unknown\[45.125.65.42\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-03-14 13:24:05 |
| 222.186.173.180 | attackspambots | $f2bV_matches |
2020-03-14 13:36:36 |
| 167.71.220.238 | attackspambots | SSH bruteforce |
2020-03-14 13:23:09 |
| 106.52.234.191 | attack | 2020-03-14T03:48:58.131844randservbullet-proofcloud-66.localdomain sshd[22298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.234.191 user=root 2020-03-14T03:49:00.138417randservbullet-proofcloud-66.localdomain sshd[22298]: Failed password for root from 106.52.234.191 port 58576 ssh2 2020-03-14T03:55:14.190311randservbullet-proofcloud-66.localdomain sshd[22332]: Invalid user postgres from 106.52.234.191 port 54881 ... |
2020-03-14 13:13:42 |
| 46.101.105.55 | attackbots | Mar 13 18:44:03 sachi sshd\[28293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.telaris.no user=root Mar 13 18:44:05 sachi sshd\[28293\]: Failed password for root from 46.101.105.55 port 40938 ssh2 Mar 13 18:48:10 sachi sshd\[28633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.telaris.no user=root Mar 13 18:48:13 sachi sshd\[28633\]: Failed password for root from 46.101.105.55 port 36068 ssh2 Mar 13 18:52:15 sachi sshd\[28962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=proxy.telaris.no user=root |
2020-03-14 13:08:57 |
| 129.211.130.66 | attackspambots | $f2bV_matches |
2020-03-14 13:29:16 |
| 91.121.110.97 | attack | Mar 14 06:05:08 [host] sshd[22897]: pam_unix(sshd: Mar 14 06:05:10 [host] sshd[22897]: Failed passwor Mar 14 06:09:26 [host] sshd[23233]: pam_unix(sshd: |
2020-03-14 13:32:28 |
| 106.75.8.200 | attackbots | Mar 14 10:13:09 areeb-Workstation sshd[22255]: Failed password for root from 106.75.8.200 port 53226 ssh2 ... |
2020-03-14 13:06:16 |