城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.40.168.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.40.168.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:50:05 CST 2025
;; MSG SIZE rcvd: 106
214.168.40.59.in-addr.arpa domain name pointer 214.168.40.59.broad.sz.gd.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
214.168.40.59.in-addr.arpa name = 214.168.40.59.broad.sz.gd.dynamic.163data.com.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.35.168.220 | attackspambots | Unauthorized connection attempt detected from IP address 192.35.168.220 to port 8102 [T] |
2020-08-17 02:44:46 |
| 92.157.67.13 | attackspambots | 2020-08-16T20:13:53.832995mail.standpoint.com.ua sshd[25636]: Invalid user adam from 92.157.67.13 port 43652 2020-08-16T20:13:53.836500mail.standpoint.com.ua sshd[25636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-gre-1-93-13.w92-157.abo.wanadoo.fr 2020-08-16T20:13:53.832995mail.standpoint.com.ua sshd[25636]: Invalid user adam from 92.157.67.13 port 43652 2020-08-16T20:13:55.611483mail.standpoint.com.ua sshd[25636]: Failed password for invalid user adam from 92.157.67.13 port 43652 ssh2 2020-08-16T20:17:57.447913mail.standpoint.com.ua sshd[26395]: Invalid user ab from 92.157.67.13 port 53902 ... |
2020-08-17 02:46:38 |
| 49.69.50.23 | attackbotsspam | Lines containing failures of 49.69.50.23 auth.log:Aug 16 14:14:36 omfg sshd[19684]: Connection from 49.69.50.23 port 58003 on 78.46.60.53 port 22 auth.log:Aug 16 14:14:36 omfg sshd[19684]: Bad protocol version identification '' from 49.69.50.23 port 58003 auth.log:Aug 16 14:14:38 omfg sshd[19685]: Connection from 49.69.50.23 port 58698 on 78.46.60.53 port 22 auth.log:Aug 16 14:14:42 omfg sshd[19685]: Invalid user osboxes from 49.69.50.23 port 58698 auth.log:Aug 16 14:14:43 omfg sshd[19685]: Connection closed by invalid user osboxes 49.69.50.23 port 58698 [preauth] auth.log:Aug 16 14:14:43 omfg sshd[19689]: Connection from 49.69.50.23 port 60408 on 78.46.60.53 port 22 auth.log:Aug 16 14:14:48 omfg sshd[19689]: Invalid user openhabian from 49.69.50.23 port 60408 auth.log:Aug 16 14:14:48 omfg sshd[19689]: Connection closed by invalid user openhabian 49.69.50.23 port 60408 [preauth] auth.log:Aug 16 14:14:49 omfg sshd[19693]: Connection from 49.69.50.23 port 34273 on 78.46.60........ ------------------------------ |
2020-08-17 02:34:25 |
| 61.177.172.41 | attack | Aug 16 20:18:47 abendstille sshd\[13768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41 user=root Aug 16 20:18:48 abendstille sshd\[13768\]: Failed password for root from 61.177.172.41 port 65252 ssh2 Aug 16 20:18:48 abendstille sshd\[13770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41 user=root Aug 16 20:18:50 abendstille sshd\[13770\]: Failed password for root from 61.177.172.41 port 43006 ssh2 Aug 16 20:18:51 abendstille sshd\[13768\]: Failed password for root from 61.177.172.41 port 65252 ssh2 ... |
2020-08-17 02:22:36 |
| 116.236.189.134 | attackspambots | Aug 17 00:04:54 itv-usvr-02 sshd[14131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.189.134 user=root Aug 17 00:04:56 itv-usvr-02 sshd[14131]: Failed password for root from 116.236.189.134 port 47770 ssh2 Aug 17 00:07:11 itv-usvr-02 sshd[14236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.189.134 user=root Aug 17 00:07:13 itv-usvr-02 sshd[14236]: Failed password for root from 116.236.189.134 port 41230 ssh2 Aug 17 00:09:15 itv-usvr-02 sshd[14380]: Invalid user esp from 116.236.189.134 port 34662 |
2020-08-17 02:51:38 |
| 34.87.95.9 | attackspam | Lines containing failures of 34.87.95.9 Aug 16 13:39:31 ntop sshd[31609]: Invalid user oy from 34.87.95.9 port 46376 Aug 16 13:39:31 ntop sshd[31609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.95.9 Aug 16 13:39:33 ntop sshd[31609]: Failed password for invalid user oy from 34.87.95.9 port 46376 ssh2 Aug 16 13:39:35 ntop sshd[31609]: Received disconnect from 34.87.95.9 port 46376:11: Bye Bye [preauth] Aug 16 13:39:35 ntop sshd[31609]: Disconnected from invalid user oy 34.87.95.9 port 46376 [preauth] Aug 16 14:12:24 ntop sshd[2591]: Invalid user tang from 34.87.95.9 port 46946 Aug 16 14:12:24 ntop sshd[2591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.95.9 Aug 16 14:12:26 ntop sshd[2591]: Failed password for invalid user tang from 34.87.95.9 port 46946 ssh2 Aug 16 14:12:28 ntop sshd[2591]: Received disconnect from 34.87.95.9 port 46946:11: Bye Bye [preauth] Aug 16 14:12:........ ------------------------------ |
2020-08-17 02:37:31 |
| 114.236.205.129 | attackbots | Aug 16 14:14:54 ghostname-secure sshd[827]: Bad protocol version identification '' from 114.236.205.129 port 56298 Aug 16 14:15:10 ghostname-secure sshd[828]: Failed password for invalid user support from 114.236.205.129 port 56734 ssh2 Aug 16 14:15:11 ghostname-secure sshd[828]: Connection closed by 114.236.205.129 [preauth] Aug 16 14:15:28 ghostname-secure sshd[834]: Failed password for invalid user NetLinx from 114.236.205.129 port 36081 ssh2 Aug 16 14:15:29 ghostname-secure sshd[834]: Connection closed by 114.236.205.129 [preauth] Aug 16 14:15:45 ghostname-secure sshd[838]: Failed password for invalid user nexthink from 114.236.205.129 port 44493 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=114.236.205.129 |
2020-08-17 02:41:43 |
| 116.85.64.100 | attackspambots | Aug 16 14:20:14 mail sshd\[54298\]: Invalid user matt from 116.85.64.100 Aug 16 14:20:14 mail sshd\[54298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.64.100 ... |
2020-08-17 02:40:12 |
| 110.49.70.246 | attack | Aug 17 01:02:50 itv-usvr-02 sshd[16572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.246 user=root Aug 17 01:02:52 itv-usvr-02 sshd[16572]: Failed password for root from 110.49.70.246 port 57230 ssh2 Aug 17 01:11:38 itv-usvr-02 sshd[17072]: Invalid user admin from 110.49.70.246 port 49446 Aug 17 01:11:38 itv-usvr-02 sshd[17072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.246 Aug 17 01:11:38 itv-usvr-02 sshd[17072]: Invalid user admin from 110.49.70.246 port 49446 Aug 17 01:11:40 itv-usvr-02 sshd[17072]: Failed password for invalid user admin from 110.49.70.246 port 49446 ssh2 |
2020-08-17 02:42:48 |
| 129.211.74.252 | attackspambots | Aug 16 15:10:37 ws22vmsma01 sshd[193519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.74.252 Aug 16 15:10:39 ws22vmsma01 sshd[193519]: Failed password for invalid user test from 129.211.74.252 port 53966 ssh2 ... |
2020-08-17 02:20:46 |
| 45.43.36.191 | attack | Aug 16 20:11:05 sso sshd[19914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.43.36.191 Aug 16 20:11:07 sso sshd[19914]: Failed password for invalid user gts from 45.43.36.191 port 51386 ssh2 ... |
2020-08-17 02:25:31 |
| 68.183.66.107 | attackspam | Aug 16 19:48:54 ns382633 sshd\[15100\]: Invalid user mc from 68.183.66.107 port 52373 Aug 16 19:48:54 ns382633 sshd\[15100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.66.107 Aug 16 19:48:56 ns382633 sshd\[15100\]: Failed password for invalid user mc from 68.183.66.107 port 52373 ssh2 Aug 16 19:53:06 ns382633 sshd\[16170\]: Invalid user test from 68.183.66.107 port 57802 Aug 16 19:53:06 ns382633 sshd\[16170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.66.107 |
2020-08-17 02:47:29 |
| 34.84.146.34 | attackbotsspam | SSH Brute Force |
2020-08-17 02:14:57 |
| 84.33.193.200 | attackspambots | Aug 16 11:00:47 mail sshd\[2262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.33.193.200 user=root ... |
2020-08-17 02:24:30 |
| 2a01:7e00::f03c:91ff:fe6d:8a22 | attackbotsspam | Auto reported by IDS |
2020-08-17 02:25:53 |