城市(city): São Paulo
省份(region): Sao Paulo
国家(country): Brazil
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.125.125.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;56.125.125.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 15:28:46 CST 2025
;; MSG SIZE rcvd: 107
149.125.125.56.in-addr.arpa domain name pointer ec2-56-125-125-149.sa-east-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
149.125.125.56.in-addr.arpa name = ec2-56-125-125-149.sa-east-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 200.3.29.93 | attackspam | failed_logins |
2019-09-09 16:40:39 |
| 118.34.37.145 | attack | Sep 9 04:57:36 xtremcommunity sshd\[129124\]: Invalid user 1 from 118.34.37.145 port 45698 Sep 9 04:57:36 xtremcommunity sshd\[129124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.37.145 Sep 9 04:57:39 xtremcommunity sshd\[129124\]: Failed password for invalid user 1 from 118.34.37.145 port 45698 ssh2 Sep 9 05:05:10 xtremcommunity sshd\[129418\]: Invalid user 123qwe123 from 118.34.37.145 port 50900 Sep 9 05:05:10 xtremcommunity sshd\[129418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.37.145 ... |
2019-09-09 17:15:24 |
| 45.6.72.17 | attack | Sep 9 08:53:05 hcbbdb sshd\[7736\]: Invalid user admin from 45.6.72.17 Sep 9 08:53:05 hcbbdb sshd\[7736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17.leonetprovedor.com.br Sep 9 08:53:07 hcbbdb sshd\[7736\]: Failed password for invalid user admin from 45.6.72.17 port 45140 ssh2 Sep 9 08:59:42 hcbbdb sshd\[8425\]: Invalid user ubuntu from 45.6.72.17 Sep 9 08:59:42 hcbbdb sshd\[8425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17.leonetprovedor.com.br |
2019-09-09 17:10:23 |
| 78.134.71.27 | attackspambots | Automatic report - Port Scan Attack |
2019-09-09 16:56:26 |
| 104.42.27.187 | attackspam | Sep 8 22:39:32 kapalua sshd\[21278\]: Invalid user admin from 104.42.27.187 Sep 8 22:39:32 kapalua sshd\[21278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.27.187 Sep 8 22:39:34 kapalua sshd\[21278\]: Failed password for invalid user admin from 104.42.27.187 port 1408 ssh2 Sep 8 22:46:39 kapalua sshd\[21960\]: Invalid user server from 104.42.27.187 Sep 8 22:46:39 kapalua sshd\[21960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.27.187 |
2019-09-09 16:47:04 |
| 207.154.225.170 | attackbotsspam | 2019-09-09T07:50:34.203352abusebot-2.cloudsearch.cf sshd\[9302\]: Invalid user jenkins from 207.154.225.170 port 49580 |
2019-09-09 16:43:36 |
| 165.22.210.37 | attackspam | $f2bV_matches |
2019-09-09 17:03:53 |
| 27.254.90.106 | attackspam | Sep 9 04:22:12 vtv3 sshd\[8663\]: Invalid user postgres from 27.254.90.106 port 47577 Sep 9 04:22:12 vtv3 sshd\[8663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.90.106 Sep 9 04:22:14 vtv3 sshd\[8663\]: Failed password for invalid user postgres from 27.254.90.106 port 47577 ssh2 Sep 9 04:29:22 vtv3 sshd\[12024\]: Invalid user vagrant from 27.254.90.106 port 51835 Sep 9 04:29:22 vtv3 sshd\[12024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.90.106 Sep 9 04:43:00 vtv3 sshd\[19084\]: Invalid user test from 27.254.90.106 port 57106 Sep 9 04:43:00 vtv3 sshd\[19084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.90.106 Sep 9 04:43:02 vtv3 sshd\[19084\]: Failed password for invalid user test from 27.254.90.106 port 57106 ssh2 Sep 9 04:50:01 vtv3 sshd\[22365\]: Invalid user ftpadmin from 27.254.90.106 port 59744 Sep 9 04:50:01 vtv3 sshd\[22365\]: |
2019-09-09 17:08:38 |
| 179.113.161.80 | attack | Sep 9 10:43:58 bouncer sshd\[9155\]: Invalid user weblogic from 179.113.161.80 port 47116 Sep 9 10:43:58 bouncer sshd\[9155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.113.161.80 Sep 9 10:44:01 bouncer sshd\[9155\]: Failed password for invalid user weblogic from 179.113.161.80 port 47116 ssh2 ... |
2019-09-09 16:55:40 |
| 112.13.91.29 | attack | Sep 9 09:42:05 microserver sshd[6241]: Invalid user a from 112.13.91.29 port 4795 Sep 9 09:42:05 microserver sshd[6241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.13.91.29 Sep 9 09:42:07 microserver sshd[6241]: Failed password for invalid user a from 112.13.91.29 port 4795 ssh2 Sep 9 09:46:16 microserver sshd[6902]: Invalid user tomcat@123 from 112.13.91.29 port 4796 Sep 9 09:46:16 microserver sshd[6902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.13.91.29 Sep 9 09:58:35 microserver sshd[8391]: Invalid user odoo9 from 112.13.91.29 port 4799 Sep 9 09:58:35 microserver sshd[8391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.13.91.29 Sep 9 09:58:37 microserver sshd[8391]: Failed password for invalid user odoo9 from 112.13.91.29 port 4799 ssh2 Sep 9 10:02:41 microserver sshd[9032]: Invalid user test from 112.13.91.29 port 4800 Sep 9 10:02:41 microserver sshd[ |
2019-09-09 17:15:55 |
| 178.57.193.14 | attackspambots | [portscan] Port scan |
2019-09-09 17:05:33 |
| 121.126.161.117 | attack | Sep 9 04:28:48 xtremcommunity sshd\[127954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.161.117 user=root Sep 9 04:28:50 xtremcommunity sshd\[127954\]: Failed password for root from 121.126.161.117 port 34606 ssh2 Sep 9 04:37:06 xtremcommunity sshd\[128276\]: Invalid user support from 121.126.161.117 port 40300 Sep 9 04:37:06 xtremcommunity sshd\[128276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.126.161.117 Sep 9 04:37:08 xtremcommunity sshd\[128276\]: Failed password for invalid user support from 121.126.161.117 port 40300 ssh2 ... |
2019-09-09 17:09:38 |
| 187.12.167.85 | attackbotsspam | Sep 9 07:41:10 MK-Soft-VM3 sshd\[27350\]: Invalid user user123 from 187.12.167.85 port 43122 Sep 9 07:41:10 MK-Soft-VM3 sshd\[27350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.12.167.85 Sep 9 07:41:13 MK-Soft-VM3 sshd\[27350\]: Failed password for invalid user user123 from 187.12.167.85 port 43122 ssh2 ... |
2019-09-09 16:57:19 |
| 142.93.47.74 | attackspam | Sep 8 20:04:16 hiderm sshd\[16375\]: Invalid user postgres from 142.93.47.74 Sep 8 20:04:16 hiderm sshd\[16375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.47.74 Sep 8 20:04:19 hiderm sshd\[16375\]: Failed password for invalid user postgres from 142.93.47.74 port 40924 ssh2 Sep 8 20:11:21 hiderm sshd\[17204\]: Invalid user minecraft from 142.93.47.74 Sep 8 20:11:21 hiderm sshd\[17204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.47.74 |
2019-09-09 17:04:33 |
| 210.221.220.68 | attackbots | Sep 9 10:55:05 ArkNodeAT sshd\[2286\]: Invalid user demopass from 210.221.220.68 Sep 9 10:55:05 ArkNodeAT sshd\[2286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.221.220.68 Sep 9 10:55:07 ArkNodeAT sshd\[2286\]: Failed password for invalid user demopass from 210.221.220.68 port 21978 ssh2 |
2019-09-09 17:23:58 |