城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.211.106.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59687
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;6.211.106.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 15:32:36 CST 2025
;; MSG SIZE rcvd: 106
Host 150.106.211.6.in-addr.arpa not found: 2(SERVFAIL)
server can't find 6.211.106.150.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 125.212.202.179 | attackbotsspam | Mar 3 20:43:31 ns sshd[9540]: Connection from 125.212.202.179 port 36421 on 134.119.39.98 port 22 Mar 3 20:43:37 ns sshd[9540]: Invalid user t1tenor from 125.212.202.179 port 36421 Mar 3 20:43:37 ns sshd[9540]: Failed password for invalid user t1tenor from 125.212.202.179 port 36421 ssh2 Mar 3 20:43:37 ns sshd[9540]: Received disconnect from 125.212.202.179 port 36421:11: Normal Shutdown [preauth] Mar 3 20:43:37 ns sshd[9540]: Disconnected from 125.212.202.179 port 36421 [preauth] Mar 3 20:48:27 ns sshd[18225]: Connection from 125.212.202.179 port 49420 on 134.119.39.98 port 22 Mar 3 20:48:32 ns sshd[18225]: User r.r from 125.212.202.179 not allowed because not listed in AllowUsers Mar 3 20:48:32 ns sshd[18225]: Failed password for invalid user r.r from 125.212.202.179 port 49420 ssh2 Mar 3 20:48:33 ns sshd[18225]: Received disconnect from 125.212.202.179 port 49420:11: Normal Shutdown [preauth] Mar 3 20:48:33 ns sshd[18225]: Disconnected from 125.212.202.179 ........ ------------------------------- |
2020-03-07 21:32:11 |
| 69.59.155.204 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2020-03-07 21:32:40 |
| 163.172.122.165 | attack | pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.122.165 Failed password for invalid user spec from 163.172.122.165 port 40572 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.122.165 |
2020-03-07 21:23:13 |
| 123.24.206.156 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-07 21:13:57 |
| 222.186.175.151 | attackbotsspam | Mar 7 03:11:44 sachi sshd\[14563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151 user=root Mar 7 03:11:47 sachi sshd\[14563\]: Failed password for root from 222.186.175.151 port 22438 ssh2 Mar 7 03:12:03 sachi sshd\[14602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151 user=root Mar 7 03:12:04 sachi sshd\[14602\]: Failed password for root from 222.186.175.151 port 14284 ssh2 Mar 7 03:12:27 sachi sshd\[14626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151 user=root |
2020-03-07 21:19:14 |
| 210.179.37.8 | attack | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-03-07 20:58:44 |
| 109.169.12.94 | attackbots | unauthorized connection attempt |
2020-03-07 21:06:51 |
| 142.93.140.242 | attackbots | Mar 7 14:09:13 lnxmysql61 sshd[4694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 Mar 7 14:09:13 lnxmysql61 sshd[4694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.140.242 |
2020-03-07 21:35:26 |
| 182.254.213.32 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-03-07 21:08:57 |
| 37.254.88.54 | attackspam | 1583556519 - 03/07/2020 05:48:39 Host: 37.254.88.54/37.254.88.54 Port: 445 TCP Blocked |
2020-03-07 21:24:29 |
| 184.89.147.14 | attack | Blocked for port scanning. Time: Fri Mar 6. 08:37:17 2020 +0100 IP: 184.89.147.14 (US/United States/184-089-147-014.res.spectrum.com) Sample of block hits: Mar 6 08:36:05 vserv kernel: [33132679.124709] Firewall: *TCP_IN Blocked* IN=venet0 OUT= MAC= SRC=184.89.147.14 DST=[removed] LEN=44 TOS=0x00 PREC=0x00 TTL=50 ID=52426 PROTO=TCP SPT=24137 DPT=88 WINDOW=20670 RES=0x00 SYN URGP=0 Mar 6 08:36:24 vserv kernel: [33132698.637758] Firewall: *TCP_IN Blocked* IN=venet0 OUT= MAC= SRC=184.89.147.14 DST=[removed] LEN=44 TOS=0x00 PREC=0x00 TTL=50 ID=52426 PROTO=TCP SPT=24137 DPT=88 WINDOW=20670 RES=0x00 SYN URGP=0 Mar 6 08:36:27 vserv kernel: [33132701.541535] Firewall: *TCP_IN Blocked* IN=venet0 OUT= MAC= SRC=184.89.147.14 DST=[removed] LEN=44 TOS=0x00 PREC=0x00 TTL=50 ID=52426 PROTO=TCP SPT=24137 DPT=88 WINDOW=20670 RES=0x00 SYN URGP=0 Mar 6 08:36:30 vserv kernel: [33132704.687610] Firewall: *TCP_IN Blocked* IN=venet0 OUT= MAC= SRC=184.89.147.14 DST=[removed] LEN=44 TOS=0x00 PREC=0x00 TTL=50 ID=52426 PROTO |
2020-03-07 21:25:26 |
| 210.99.216.205 | attackbots | 2020-03-07T12:32:52.384538shield sshd\[29619\]: Invalid user wangtingzhang from 210.99.216.205 port 50396 2020-03-07T12:32:52.389544shield sshd\[29619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.99.216.205 2020-03-07T12:32:53.900996shield sshd\[29619\]: Failed password for invalid user wangtingzhang from 210.99.216.205 port 50396 ssh2 2020-03-07T12:35:11.786947shield sshd\[30172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.99.216.205 user=root 2020-03-07T12:35:13.376803shield sshd\[30172\]: Failed password for root from 210.99.216.205 port 58104 ssh2 |
2020-03-07 21:17:01 |
| 182.219.172.224 | attackbotsspam | Mar 6 20:12:36 eddieflores sshd\[17472\]: Invalid user cosplace from 182.219.172.224 Mar 6 20:12:36 eddieflores sshd\[17472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.219.172.224 Mar 6 20:12:38 eddieflores sshd\[17472\]: Failed password for invalid user cosplace from 182.219.172.224 port 34062 ssh2 Mar 6 20:16:28 eddieflores sshd\[17815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.219.172.224 user=root Mar 6 20:16:30 eddieflores sshd\[17815\]: Failed password for root from 182.219.172.224 port 36990 ssh2 |
2020-03-07 21:37:18 |
| 217.170.205.9 | attackspam | Honeypot attack, port: 445, PTR: vps-9.205.170.217.stwvps.net. |
2020-03-07 20:55:18 |
| 124.78.131.223 | attackbotsspam | Honeypot attack, port: 445, PTR: 223.131.78.124.broad.xw.sh.dynamic.163data.com.cn. |
2020-03-07 21:15:19 |