城市(city): Sydney
省份(region): New South Wales
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.68.52.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.68.52.201. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062901 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 06:03:57 CST 2025
;; MSG SIZE rcvd: 105
201.52.68.61.in-addr.arpa domain name pointer 61-68-52-201.static.tpgi.com.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
201.52.68.61.in-addr.arpa name = 61-68-52-201.static.tpgi.com.au.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.53.62.83 | attackspambots | Oct 10 11:33:22 kapalua sshd\[29945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.53.62.83 user=root Oct 10 11:33:24 kapalua sshd\[29945\]: Failed password for root from 122.53.62.83 port 18579 ssh2 Oct 10 11:38:06 kapalua sshd\[30354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.53.62.83 user=root Oct 10 11:38:08 kapalua sshd\[30354\]: Failed password for root from 122.53.62.83 port 28956 ssh2 Oct 10 11:42:57 kapalua sshd\[30916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.53.62.83 user=root |
2019-10-11 05:45:16 |
| 111.67.193.34 | attackbotsspam | Lines containing failures of 111.67.193.34 Oct 9 08:38:00 shared05 sshd[19756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.193.34 user=r.r Oct 9 08:38:02 shared05 sshd[19756]: Failed password for r.r from 111.67.193.34 port 47999 ssh2 Oct 9 08:38:02 shared05 sshd[19756]: Received disconnect from 111.67.193.34 port 47999:11: Bye Bye [preauth] Oct 9 08:38:02 shared05 sshd[19756]: Disconnected from authenticating user r.r 111.67.193.34 port 47999 [preauth] Oct 9 09:09:43 shared05 sshd[30974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.193.34 user=r.r Oct 9 09:09:45 shared05 sshd[30974]: Failed password for r.r from 111.67.193.34 port 60126 ssh2 Oct 9 09:09:46 shared05 sshd[30974]: Received disconnect from 111.67.193.34 port 60126:11: Bye Bye [preauth] Oct 9 09:09:46 shared05 sshd[30974]: Disconnected from authenticating user r.r 111.67.193.34 port 60126 [preauth........ ------------------------------ |
2019-10-11 05:38:56 |
| 194.1.170.14 | attackspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/194.1.170.14/ RU - 1H : (146) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : RU NAME ASN : ASN42498 IP : 194.1.170.14 CIDR : 194.1.170.0/24 PREFIX COUNT : 39 UNIQUE IP COUNT : 9984 WYKRYTE ATAKI Z ASN42498 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-10-10 22:10:41 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-11 05:02:17 |
| 79.143.186.36 | attackspambots | Oct 7 10:27:42 rdssrv1 sshd[24618]: Failed password for r.r from 79.143.186.36 port 43256 ssh2 Oct 7 10:32:31 rdssrv1 sshd[25334]: Failed password for r.r from 79.143.186.36 port 56884 ssh2 Oct 7 10:37:22 rdssrv1 sshd[26031]: Failed password for r.r from 79.143.186.36 port 42250 ssh2 Oct 7 10:42:06 rdssrv1 sshd[26799]: Failed password for r.r from 79.143.186.36 port 55892 ssh2 Oct 7 10:46:46 rdssrv1 sshd[27464]: Failed password for r.r from 79.143.186.36 port 41274 ssh2 Oct 7 10:51:31 rdssrv1 sshd[28159]: Failed password for r.r from 79.143.186.36 port 54916 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=79.143.186.36 |
2019-10-11 04:59:57 |
| 49.232.23.127 | attack | Oct 10 21:15:14 localhost sshd\[17305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.23.127 user=root Oct 10 21:15:15 localhost sshd\[17305\]: Failed password for root from 49.232.23.127 port 49614 ssh2 Oct 10 21:18:33 localhost sshd\[17407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.23.127 user=root Oct 10 21:18:35 localhost sshd\[17407\]: Failed password for root from 49.232.23.127 port 45544 ssh2 Oct 10 21:21:59 localhost sshd\[17481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.23.127 user=root ... |
2019-10-11 05:34:50 |
| 187.87.104.62 | attack | Oct 10 17:31:59 ny01 sshd[22335]: Failed password for root from 187.87.104.62 port 37837 ssh2 Oct 10 17:36:33 ny01 sshd[22744]: Failed password for root from 187.87.104.62 port 57400 ssh2 |
2019-10-11 05:43:36 |
| 119.29.243.100 | attackbotsspam | Oct 10 11:24:15 hpm sshd\[13363\]: Invalid user P@\$\$w0rt@abc from 119.29.243.100 Oct 10 11:24:15 hpm sshd\[13363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.243.100 Oct 10 11:24:16 hpm sshd\[13363\]: Failed password for invalid user P@\$\$w0rt@abc from 119.29.243.100 port 47476 ssh2 Oct 10 11:28:13 hpm sshd\[13696\]: Invalid user 123Classic from 119.29.243.100 Oct 10 11:28:13 hpm sshd\[13696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.243.100 |
2019-10-11 05:34:12 |
| 69.172.94.25 | attackspambots | Lines containing failures of 69.172.94.25 Oct 10 12:25:49 shared04 sshd[4705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.172.94.25 user=r.r Oct 10 12:25:51 shared04 sshd[4705]: Failed password for r.r from 69.172.94.25 port 36556 ssh2 Oct 10 12:25:52 shared04 sshd[4705]: Received disconnect from 69.172.94.25 port 36556:11: Bye Bye [preauth] Oct 10 12:25:52 shared04 sshd[4705]: Disconnected from authenticating user r.r 69.172.94.25 port 36556 [preauth] Oct 10 12:38:41 shared04 sshd[9048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.172.94.25 user=r.r Oct 10 12:38:43 shared04 sshd[9048]: Failed password for r.r from 69.172.94.25 port 39264 ssh2 Oct 10 12:38:43 shared04 sshd[9048]: Received disconnect from 69.172.94.25 port 39264:11: Bye Bye [preauth] Oct 10 12:38:43 shared04 sshd[9048]: Disconnected from authenticating user r.r 69.172.94.25 port 39264 [preauth] Oct 10 12:42:46........ ------------------------------ |
2019-10-11 05:46:51 |
| 52.32.116.196 | attackspambots | 10/10/2019-23:10:12.279884 52.32.116.196 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-10-11 05:29:09 |
| 85.128.14.107 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 21:10:24. |
2019-10-11 05:13:02 |
| 14.160.52.170 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 21:10:22. |
2019-10-11 05:17:33 |
| 106.12.68.235 | attackbots | ssh failed login |
2019-10-11 05:44:00 |
| 58.254.132.140 | attack | Oct 10 23:01:46 vps01 sshd[1835]: Failed password for root from 58.254.132.140 port 50673 ssh2 |
2019-10-11 05:28:57 |
| 218.92.0.200 | attackspambots | Oct 10 21:18:29 venus sshd\[24454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200 user=root Oct 10 21:18:31 venus sshd\[24454\]: Failed password for root from 218.92.0.200 port 11783 ssh2 Oct 10 21:18:33 venus sshd\[24454\]: Failed password for root from 218.92.0.200 port 11783 ssh2 ... |
2019-10-11 05:21:27 |
| 62.48.150.175 | attack | Oct 10 10:46:16 web9 sshd\[1412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.48.150.175 user=root Oct 10 10:46:18 web9 sshd\[1412\]: Failed password for root from 62.48.150.175 port 36842 ssh2 Oct 10 10:50:55 web9 sshd\[2162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.48.150.175 user=root Oct 10 10:50:57 web9 sshd\[2162\]: Failed password for root from 62.48.150.175 port 51284 ssh2 Oct 10 10:55:31 web9 sshd\[2834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.48.150.175 user=root |
2019-10-11 05:04:50 |