城市(city): unknown
省份(region): unknown
国家(country): Switzerland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.50.242.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.50.242.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011900 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 20 01:07:50 CST 2025
;; MSG SIZE rcvd: 105
Host 21.242.50.57.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.242.50.57.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.37.67.144 | attack | Dec 30 19:22:15 web9 sshd\[19613\]: Invalid user kipper from 54.37.67.144 Dec 30 19:22:15 web9 sshd\[19613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.67.144 Dec 30 19:22:17 web9 sshd\[19613\]: Failed password for invalid user kipper from 54.37.67.144 port 36360 ssh2 Dec 30 19:24:42 web9 sshd\[19961\]: Invalid user thibault from 54.37.67.144 Dec 30 19:24:42 web9 sshd\[19961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.67.144 |
2019-12-31 13:37:13 |
| 86.242.29.0 | attackbots | Dec 31 05:52:27 ns382633 sshd\[13326\]: Invalid user admin from 86.242.29.0 port 57196 Dec 31 05:52:27 ns382633 sshd\[13326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.242.29.0 Dec 31 05:52:29 ns382633 sshd\[13326\]: Failed password for invalid user admin from 86.242.29.0 port 57196 ssh2 Dec 31 05:56:16 ns382633 sshd\[14076\]: Invalid user ubuntu from 86.242.29.0 port 58344 Dec 31 05:56:16 ns382633 sshd\[14076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.242.29.0 |
2019-12-31 13:39:57 |
| 222.186.169.192 | attack | Brute-force attempt banned |
2019-12-31 13:09:52 |
| 36.90.42.30 | attack | Port scan on 1 port(s): 21 |
2019-12-31 13:36:04 |
| 106.13.97.16 | attack | Dec 31 05:54:25 legacy sshd[26735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.97.16 Dec 31 05:54:28 legacy sshd[26735]: Failed password for invalid user akiyoshi123 from 106.13.97.16 port 55360 ssh2 Dec 31 05:56:43 legacy sshd[26804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.97.16 ... |
2019-12-31 13:22:56 |
| 45.143.221.33 | attackspambots | 12/30/2019-23:56:21.892564 45.143.221.33 Protocol: 17 ET SCAN Sipvicious Scan |
2019-12-31 13:36:45 |
| 218.92.0.171 | attackbots | --- report --- Dec 31 02:18:41 -0300 sshd: Connection from 218.92.0.171 port 47215 Dec 31 02:18:45 -0300 sshd: Failed password for root from 218.92.0.171 port 47215 ssh2 Dec 31 02:18:47 -0300 sshd: Received disconnect from 218.92.0.171: 11: [preauth] |
2019-12-31 13:26:17 |
| 87.184.159.113 | attackspambots | Dec 31 07:10:03 www2 sshd\[50343\]: Failed password for root from 87.184.159.113 port 49550 ssh2Dec 31 07:16:44 www2 sshd\[51229\]: Invalid user lody from 87.184.159.113Dec 31 07:16:46 www2 sshd\[51229\]: Failed password for invalid user lody from 87.184.159.113 port 54158 ssh2 ... |
2019-12-31 13:18:43 |
| 200.117.185.230 | attackbotsspam | 2019-12-31T05:51:17.551365vps751288.ovh.net sshd\[4456\]: Invalid user marketing from 200.117.185.230 port 9569 2019-12-31T05:51:17.561985vps751288.ovh.net sshd\[4456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host230.200-117-185.telecom.net.ar 2019-12-31T05:51:19.616847vps751288.ovh.net sshd\[4456\]: Failed password for invalid user marketing from 200.117.185.230 port 9569 ssh2 2019-12-31T05:57:00.265774vps751288.ovh.net sshd\[4486\]: Invalid user zander from 200.117.185.230 port 32641 2019-12-31T05:57:00.273866vps751288.ovh.net sshd\[4486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host230.200-117-185.telecom.net.ar |
2019-12-31 13:11:53 |
| 222.186.42.4 | attack | Dec 31 05:38:31 work-partkepr sshd\[22217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4 user=root Dec 31 05:38:34 work-partkepr sshd\[22217\]: Failed password for root from 222.186.42.4 port 38754 ssh2 ... |
2019-12-31 13:43:04 |
| 61.142.247.210 | attackspam | Dec 30 23:56:52 web1 postfix/smtpd[23875]: warning: unknown[61.142.247.210]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-31 13:17:51 |
| 41.73.8.80 | attackbots | $f2bV_matches |
2019-12-31 13:15:16 |
| 167.99.77.94 | attack | Dec 31 05:49:29 minden010 sshd[31635]: Failed password for root from 167.99.77.94 port 47020 ssh2 Dec 31 05:52:59 minden010 sshd[351]: Failed password for root from 167.99.77.94 port 49364 ssh2 ... |
2019-12-31 13:32:02 |
| 222.186.175.169 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root Failed password for root from 222.186.175.169 port 36494 ssh2 Failed password for root from 222.186.175.169 port 36494 ssh2 Failed password for root from 222.186.175.169 port 36494 ssh2 Failed password for root from 222.186.175.169 port 36494 ssh2 |
2019-12-31 13:29:28 |
| 222.186.173.238 | attack | Dec 31 06:00:42 minden010 sshd[2467]: Failed password for root from 222.186.173.238 port 1260 ssh2 Dec 31 06:00:45 minden010 sshd[2467]: Failed password for root from 222.186.173.238 port 1260 ssh2 Dec 31 06:00:49 minden010 sshd[2467]: Failed password for root from 222.186.173.238 port 1260 ssh2 Dec 31 06:00:51 minden010 sshd[2467]: Failed password for root from 222.186.173.238 port 1260 ssh2 ... |
2019-12-31 13:15:58 |