城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.138.109.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7431
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.138.109.191. IN A
;; AUTHORITY SECTION:
. 586 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 06:51:38 CST 2022
;; MSG SIZE rcvd: 107
b'Host 191.109.138.68.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 68.138.109.191.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 223.113.74.54 | attackspam | 2020-08-15T22:10:45.813299shield sshd\[16536\]: Invalid user qwerty5 from 223.113.74.54 port 52616 2020-08-15T22:10:45.819104shield sshd\[16536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.113.74.54 2020-08-15T22:10:47.305853shield sshd\[16536\]: Failed password for invalid user qwerty5 from 223.113.74.54 port 52616 ssh2 2020-08-15T22:13:34.584572shield sshd\[16892\]: Invalid user zxciop from 223.113.74.54 port 48964 2020-08-15T22:13:34.592803shield sshd\[16892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.113.74.54 |
2020-08-16 08:46:43 |
| 218.92.0.198 | attack | 2020-08-16T02:33:15.793388rem.lavrinenko.info sshd[14046]: refused connect from 218.92.0.198 (218.92.0.198) 2020-08-16T02:34:23.065284rem.lavrinenko.info sshd[14047]: refused connect from 218.92.0.198 (218.92.0.198) 2020-08-16T02:35:27.173371rem.lavrinenko.info sshd[14050]: refused connect from 218.92.0.198 (218.92.0.198) 2020-08-16T02:36:29.016061rem.lavrinenko.info sshd[14052]: refused connect from 218.92.0.198 (218.92.0.198) 2020-08-16T02:37:32.580889rem.lavrinenko.info sshd[14054]: refused connect from 218.92.0.198 (218.92.0.198) ... |
2020-08-16 08:42:37 |
| 106.52.20.112 | attackbots | Aug 16 05:57:06 db sshd[21462]: User root from 106.52.20.112 not allowed because none of user's groups are listed in AllowGroups ... |
2020-08-16 12:06:05 |
| 114.67.110.126 | attack | Brute-force attempt banned |
2020-08-16 08:24:29 |
| 125.220.213.225 | attackspambots | Aug 15 18:36:14 Tower sshd[43336]: Connection from 125.220.213.225 port 46086 on 192.168.10.220 port 22 rdomain "" Aug 15 18:36:22 Tower sshd[43336]: Failed password for root from 125.220.213.225 port 46086 ssh2 Aug 15 18:36:22 Tower sshd[43336]: Received disconnect from 125.220.213.225 port 46086:11: Bye Bye [preauth] Aug 15 18:36:22 Tower sshd[43336]: Disconnected from authenticating user root 125.220.213.225 port 46086 [preauth] |
2020-08-16 08:37:56 |
| 31.60.79.32 | attack | [15/Aug/2020 x@x [15/Aug/2020 x@x [15/Aug/2020 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=31.60.79.32 |
2020-08-16 08:43:03 |
| 112.120.211.200 | attackspambots | Lines containing failures of 112.120.211.200 Aug 12 20:25:26 shared07 sshd[17650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.120.211.200 user=r.r Aug 12 20:25:28 shared07 sshd[17650]: Failed password for r.r from 112.120.211.200 port 46410 ssh2 Aug 12 20:25:28 shared07 sshd[17650]: Received disconnect from 112.120.211.200 port 46410:11: Bye Bye [preauth] Aug 12 20:25:28 shared07 sshd[17650]: Disconnected from authenticating user r.r 112.120.211.200 port 46410 [preauth] Aug 12 20:35:28 shared07 sshd[21460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.120.211.200 user=r.r Aug 12 20:35:30 shared07 sshd[21460]: Failed password for r.r from 112.120.211.200 port 55688 ssh2 Aug 12 20:35:31 shared07 sshd[21460]: Received disconnect from 112.120.211.200 port 55688:11: Bye Bye [preauth] Aug 12 20:35:31 shared07 sshd[21460]: Disconnected from authenticating user r.r 112.120.211.200 p........ ------------------------------ |
2020-08-16 12:12:58 |
| 194.39.196.42 | attack | Aug 16 05:34:17 mail.srvfarm.net postfix/smtpd[1888509]: warning: unknown[194.39.196.42]: SASL PLAIN authentication failed: Aug 16 05:34:17 mail.srvfarm.net postfix/smtpd[1888509]: lost connection after AUTH from unknown[194.39.196.42] Aug 16 05:39:10 mail.srvfarm.net postfix/smtpd[1907805]: warning: unknown[194.39.196.42]: SASL PLAIN authentication failed: Aug 16 05:39:10 mail.srvfarm.net postfix/smtpd[1907805]: lost connection after AUTH from unknown[194.39.196.42] Aug 16 05:42:47 mail.srvfarm.net postfix/smtps/smtpd[1906553]: warning: unknown[194.39.196.42]: SASL PLAIN authentication failed: |
2020-08-16 12:17:35 |
| 42.248.93.10 | attackspam | Aug 16 05:57:04 hell sshd[5745]: Failed password for root from 42.248.93.10 port 54086 ssh2 Aug 16 05:57:06 hell sshd[5745]: Failed password for root from 42.248.93.10 port 54086 ssh2 ... |
2020-08-16 12:05:44 |
| 216.239.90.19 | attack | 2020-08-16T03:56:48.855946abusebot-7.cloudsearch.cf sshd[4761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-gateway.vif.com user=root 2020-08-16T03:56:50.749495abusebot-7.cloudsearch.cf sshd[4761]: Failed password for root from 216.239.90.19 port 54577 ssh2 2020-08-16T03:56:53.314937abusebot-7.cloudsearch.cf sshd[4761]: Failed password for root from 216.239.90.19 port 54577 ssh2 2020-08-16T03:56:48.855946abusebot-7.cloudsearch.cf sshd[4761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor-gateway.vif.com user=root 2020-08-16T03:56:50.749495abusebot-7.cloudsearch.cf sshd[4761]: Failed password for root from 216.239.90.19 port 54577 ssh2 2020-08-16T03:56:53.314937abusebot-7.cloudsearch.cf sshd[4761]: Failed password for root from 216.239.90.19 port 54577 ssh2 2020-08-16T03:56:48.855946abusebot-7.cloudsearch.cf sshd[4761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ... |
2020-08-16 12:09:25 |
| 159.65.185.253 | attack | Automatic report generated by Wazuh |
2020-08-16 08:27:33 |
| 198.1.67.59 | attackspambots | Aug 16 06:11:08 server pure-ftpd: (?@198.1.67.59) [WARNING] Authentication failed for user [%user%] Aug 16 06:11:16 server pure-ftpd: (?@198.1.67.59) [WARNING] Authentication failed for user [%user%] Aug 16 06:11:24 server pure-ftpd: (?@198.1.67.59) [WARNING] Authentication failed for user [%user%] ... |
2020-08-16 12:16:30 |
| 218.92.0.168 | attack | 2020-08-16T07:00:29.185617afi-git.jinr.ru sshd[21116]: Failed password for root from 218.92.0.168 port 51601 ssh2 2020-08-16T07:00:32.626257afi-git.jinr.ru sshd[21116]: Failed password for root from 218.92.0.168 port 51601 ssh2 2020-08-16T07:00:35.984755afi-git.jinr.ru sshd[21116]: Failed password for root from 218.92.0.168 port 51601 ssh2 2020-08-16T07:00:35.984882afi-git.jinr.ru sshd[21116]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 51601 ssh2 [preauth] 2020-08-16T07:00:35.984897afi-git.jinr.ru sshd[21116]: Disconnecting: Too many authentication failures [preauth] ... |
2020-08-16 12:04:03 |
| 87.138.222.210 | attack | port scan and connect, tcp 80 (http) |
2020-08-16 12:07:59 |
| 159.65.146.72 | attackspambots | 159.65.146.72 - - [15/Aug/2020:21:42:18 +0100] "POST /wp-login.php HTTP/1.1" 200 1772 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.65.146.72 - - [15/Aug/2020:21:42:19 +0100] "POST /wp-login.php HTTP/1.1" 200 1775 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.65.146.72 - - [15/Aug/2020:21:42:20 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-16 08:42:22 |