城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.50.195.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10049
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;65.50.195.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 13:11:52 CST 2025
;; MSG SIZE rcvd: 105
39.195.50.65.in-addr.arpa domain name pointer 65-50-195-39.cust.layer42.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
39.195.50.65.in-addr.arpa name = 65-50-195-39.cust.layer42.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.153.196.226 | attackspam | Persistent port scanning [15 denied] |
2020-06-11 14:22:50 |
| 45.235.98.192 | attack | Jun 11 06:12:59 ip-172-31-61-156 sshd[16193]: Invalid user glassfish3 from 45.235.98.192 Jun 11 06:13:01 ip-172-31-61-156 sshd[16193]: Failed password for invalid user glassfish3 from 45.235.98.192 port 42350 ssh2 Jun 11 06:12:59 ip-172-31-61-156 sshd[16193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.235.98.192 Jun 11 06:12:59 ip-172-31-61-156 sshd[16193]: Invalid user glassfish3 from 45.235.98.192 Jun 11 06:13:01 ip-172-31-61-156 sshd[16193]: Failed password for invalid user glassfish3 from 45.235.98.192 port 42350 ssh2 ... |
2020-06-11 14:13:12 |
| 91.134.242.199 | attack | Jun 11 06:29:40 ns381471 sshd[4648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.242.199 Jun 11 06:29:42 ns381471 sshd[4648]: Failed password for invalid user ghost from 91.134.242.199 port 56842 ssh2 |
2020-06-11 14:34:09 |
| 196.36.1.108 | attackbots | Jun 10 23:55:53 Host-KEWR-E sshd[5610]: User root from 196.36.1.108 not allowed because not listed in AllowUsers ... |
2020-06-11 14:41:45 |
| 195.54.160.166 | attack |
|
2020-06-11 14:42:45 |
| 222.186.175.202 | attackbots | 2020-06-11T06:21:59.837594shield sshd\[23301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root 2020-06-11T06:22:01.055791shield sshd\[23301\]: Failed password for root from 222.186.175.202 port 46760 ssh2 2020-06-11T06:22:04.590495shield sshd\[23301\]: Failed password for root from 222.186.175.202 port 46760 ssh2 2020-06-11T06:22:08.168257shield sshd\[23301\]: Failed password for root from 222.186.175.202 port 46760 ssh2 2020-06-11T06:22:11.330181shield sshd\[23301\]: Failed password for root from 222.186.175.202 port 46760 ssh2 |
2020-06-11 14:22:34 |
| 134.209.152.201 | attackbots | Jun 11 01:07:14 plusreed sshd[27997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.201 user=root Jun 11 01:07:16 plusreed sshd[27997]: Failed password for root from 134.209.152.201 port 38480 ssh2 Jun 11 01:10:52 plusreed sshd[28934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.201 user=root Jun 11 01:10:55 plusreed sshd[28934]: Failed password for root from 134.209.152.201 port 44996 ssh2 Jun 11 01:14:27 plusreed sshd[29743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.152.201 user=root Jun 11 01:14:29 plusreed sshd[29743]: Failed password for root from 134.209.152.201 port 51408 ssh2 ... |
2020-06-11 14:37:46 |
| 51.178.78.153 | attackspambots |
|
2020-06-11 14:37:29 |
| 150.109.57.43 | attackbotsspam | Jun 11 02:59:08 vps46666688 sshd[4022]: Failed password for root from 150.109.57.43 port 47432 ssh2 ... |
2020-06-11 14:17:29 |
| 193.112.48.79 | attackbotsspam | 2020-06-11T08:55:58.760511lavrinenko.info sshd[22700]: Failed password for root from 193.112.48.79 port 32982 ssh2 2020-06-11T08:58:59.213079lavrinenko.info sshd[22793]: Invalid user adam from 193.112.48.79 port 49877 2020-06-11T08:58:59.223919lavrinenko.info sshd[22793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.48.79 2020-06-11T08:58:59.213079lavrinenko.info sshd[22793]: Invalid user adam from 193.112.48.79 port 49877 2020-06-11T08:59:00.322505lavrinenko.info sshd[22793]: Failed password for invalid user adam from 193.112.48.79 port 49877 ssh2 ... |
2020-06-11 14:06:28 |
| 88.87.86.63 | attack | Jun 11 06:42:51 electroncash sshd[37726]: Invalid user liyang from 88.87.86.63 port 53554 Jun 11 06:42:53 electroncash sshd[37726]: Failed password for invalid user liyang from 88.87.86.63 port 53554 ssh2 Jun 11 06:45:48 electroncash sshd[38498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.87.86.63 user=root Jun 11 06:45:50 electroncash sshd[38498]: Failed password for root from 88.87.86.63 port 36654 ssh2 Jun 11 06:48:42 electroncash sshd[39254]: Invalid user test from 88.87.86.63 port 19764 ... |
2020-06-11 14:34:26 |
| 118.166.201.3 | attackbotsspam | Jun 11 05:56:31 debian-2gb-nbg1-2 kernel: \[14106519.330051\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=118.166.201.3 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=63931 PROTO=TCP SPT=52233 DPT=23 WINDOW=19463 RES=0x00 SYN URGP=0 |
2020-06-11 14:16:07 |
| 92.255.110.146 | attackbotsspam | 2020-06-11T04:25:38.449483abusebot-6.cloudsearch.cf sshd[26361]: Invalid user oracle from 92.255.110.146 port 42470 2020-06-11T04:25:38.456009abusebot-6.cloudsearch.cf sshd[26361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=usr-92-255-110-146.clgp.ru 2020-06-11T04:25:38.449483abusebot-6.cloudsearch.cf sshd[26361]: Invalid user oracle from 92.255.110.146 port 42470 2020-06-11T04:25:40.305060abusebot-6.cloudsearch.cf sshd[26361]: Failed password for invalid user oracle from 92.255.110.146 port 42470 ssh2 2020-06-11T04:27:43.351194abusebot-6.cloudsearch.cf sshd[26571]: Invalid user xbyang from 92.255.110.146 port 51340 2020-06-11T04:27:43.365058abusebot-6.cloudsearch.cf sshd[26571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=usr-92-255-110-146.clgp.ru 2020-06-11T04:27:43.351194abusebot-6.cloudsearch.cf sshd[26571]: Invalid user xbyang from 92.255.110.146 port 51340 2020-06-11T04:27:45.041496abusebot- ... |
2020-06-11 14:18:00 |
| 39.156.9.132 | attack | Jun 11 05:56:34 ns381471 sshd[29980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.156.9.132 Jun 11 05:56:37 ns381471 sshd[29980]: Failed password for invalid user ubuntu from 39.156.9.132 port 35606 ssh2 |
2020-06-11 14:12:19 |
| 111.12.90.43 | attackspambots | Jun 11 07:27:45 vps639187 sshd\[19970\]: Invalid user webcam from 111.12.90.43 port 56336 Jun 11 07:27:45 vps639187 sshd\[19970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.12.90.43 Jun 11 07:27:47 vps639187 sshd\[19970\]: Failed password for invalid user webcam from 111.12.90.43 port 56336 ssh2 ... |
2020-06-11 14:25:32 |