城市(city): Austin
省份(region): Texas
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.140.214.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;70.140.214.64. IN A
;; AUTHORITY SECTION:
. 439 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020032802 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 29 05:31:34 CST 2020
;; MSG SIZE rcvd: 117
Host 64.214.140.70.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 64.214.140.70.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 180.250.124.227 | attackbotsspam | 2019-11-04T05:56:57.569706abusebot-5.cloudsearch.cf sshd\[11978\]: Invalid user khwanjung from 180.250.124.227 port 37362 |
2019-11-04 13:58:11 |
| 222.186.175.217 | attack | Nov 4 07:05:51 h2177944 sshd\[13463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217 user=root Nov 4 07:05:53 h2177944 sshd\[13463\]: Failed password for root from 222.186.175.217 port 15220 ssh2 Nov 4 07:05:58 h2177944 sshd\[13463\]: Failed password for root from 222.186.175.217 port 15220 ssh2 Nov 4 07:06:02 h2177944 sshd\[13463\]: Failed password for root from 222.186.175.217 port 15220 ssh2 ... |
2019-11-04 14:06:48 |
| 154.118.141.90 | attackbotsspam | k+ssh-bruteforce |
2019-11-04 13:46:46 |
| 92.27.70.146 | attackbotsspam | RDP Bruteforce |
2019-11-04 14:13:38 |
| 188.166.42.50 | attackbots | Nov 4 06:55:27 relay postfix/smtpd\[27820\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 4 06:56:39 relay postfix/smtpd\[2304\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 4 06:57:11 relay postfix/smtpd\[27820\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 4 07:01:40 relay postfix/smtpd\[29588\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 4 07:10:26 relay postfix/smtpd\[2150\]: warning: unknown\[188.166.42.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-11-04 14:12:47 |
| 222.186.175.169 | attack | Nov 3 07:14:19 microserver sshd[2217]: Failed none for root from 222.186.175.169 port 8048 ssh2 Nov 3 07:14:20 microserver sshd[2217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root Nov 3 07:14:23 microserver sshd[2217]: Failed password for root from 222.186.175.169 port 8048 ssh2 Nov 3 07:14:27 microserver sshd[2217]: Failed password for root from 222.186.175.169 port 8048 ssh2 Nov 3 07:14:32 microserver sshd[2217]: Failed password for root from 222.186.175.169 port 8048 ssh2 Nov 3 11:13:52 microserver sshd[33565]: Failed none for root from 222.186.175.169 port 8746 ssh2 Nov 3 11:13:53 microserver sshd[33565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root Nov 3 11:13:54 microserver sshd[33565]: Failed password for root from 222.186.175.169 port 8746 ssh2 Nov 3 11:13:59 microserver sshd[33565]: Failed password for root from 222.186.175.169 port 8746 ssh2 Nov 3 11:1 |
2019-11-04 13:44:12 |
| 119.29.162.17 | attackbotsspam | Nov 4 06:51:34 server sshd\[30959\]: Invalid user vp from 119.29.162.17 port 43233 Nov 4 06:51:34 server sshd\[30959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.162.17 Nov 4 06:51:35 server sshd\[30959\]: Failed password for invalid user vp from 119.29.162.17 port 43233 ssh2 Nov 4 06:56:29 server sshd\[5345\]: User root from 119.29.162.17 not allowed because listed in DenyUsers Nov 4 06:56:29 server sshd\[5345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.162.17 user=root |
2019-11-04 13:45:31 |
| 80.211.243.245 | attackspambots | Nov 4 05:35:31 localhost sshd\[74321\]: Invalid user garner from 80.211.243.245 port 38198 Nov 4 05:35:31 localhost sshd\[74321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.243.245 Nov 4 05:35:33 localhost sshd\[74321\]: Failed password for invalid user garner from 80.211.243.245 port 38198 ssh2 Nov 4 05:39:23 localhost sshd\[74498\]: Invalid user costarica from 80.211.243.245 port 47070 Nov 4 05:39:23 localhost sshd\[74498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.243.245 ... |
2019-11-04 13:58:44 |
| 116.228.53.227 | attack | Nov 4 06:20:54 localhost sshd\[2926\]: Invalid user cvsuser from 116.228.53.227 Nov 4 06:20:54 localhost sshd\[2926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.53.227 Nov 4 06:20:57 localhost sshd\[2926\]: Failed password for invalid user cvsuser from 116.228.53.227 port 34684 ssh2 Nov 4 06:25:17 localhost sshd\[3237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.53.227 user=root Nov 4 06:25:19 localhost sshd\[3237\]: Failed password for root from 116.228.53.227 port 7297 ssh2 ... |
2019-11-04 13:48:23 |
| 106.75.148.95 | attackspambots | Nov 3 19:44:21 auw2 sshd\[25360\]: Invalid user teamspeak3 from 106.75.148.95 Nov 3 19:44:21 auw2 sshd\[25360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.95 Nov 3 19:44:24 auw2 sshd\[25360\]: Failed password for invalid user teamspeak3 from 106.75.148.95 port 50540 ssh2 Nov 3 19:50:13 auw2 sshd\[25828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.95 user=root Nov 3 19:50:15 auw2 sshd\[25828\]: Failed password for root from 106.75.148.95 port 58796 ssh2 |
2019-11-04 13:52:16 |
| 197.157.143.50 | attack | postfix (unknown user, SPF fail or relay access denied) |
2019-11-04 13:54:01 |
| 180.76.187.94 | attack | Nov 4 06:56:32 MK-Soft-VM5 sshd[9269]: Failed password for root from 180.76.187.94 port 43120 ssh2 ... |
2019-11-04 14:18:13 |
| 94.248.187.89 | attackspambots | Unauthorised access (Nov 4) SRC=94.248.187.89 LEN=52 TTL=118 ID=31679 DF TCP DPT=1433 WINDOW=8192 SYN |
2019-11-04 13:56:57 |
| 46.33.255.84 | attack | 2019-11-04T04:55:37.160792abusebot-4.cloudsearch.cf sshd\[22390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp-46-33-225-84.wildpark.net |
2019-11-04 14:19:12 |
| 210.177.54.141 | attackspambots | Nov 4 05:55:16 xeon sshd[25966]: Failed password for root from 210.177.54.141 port 53020 ssh2 |
2019-11-04 14:01:37 |