城市(city): Santa Barbara
省份(region): California
国家(country): United States
运营商(isp): Softcom Internet Communications, Inc
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.214.245.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2842
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;72.214.245.80. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024122201 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 23 08:49:46 CST 2024
;; MSG SIZE rcvd: 106
80.245.214.72.in-addr.arpa domain name pointer wsip-72-214-245-80.sb.sd.cox.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
80.245.214.72.in-addr.arpa name = wsip-72-214-245-80.sb.sd.cox.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.134.173.103 | attack | Nov 5 19:57:25 srv3 sshd\[7137\]: Invalid user temp from 91.134.173.103 Nov 5 19:57:25 srv3 sshd\[7137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.173.103 Nov 5 19:57:27 srv3 sshd\[7137\]: Failed password for invalid user temp from 91.134.173.103 port 38407 ssh2 Nov 5 23:12:07 srv3 sshd\[11091\]: Invalid user git from 91.134.173.103 Nov 5 23:12:07 srv3 sshd\[11091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.173.103 Nov 5 23:12:09 srv3 sshd\[11091\]: Failed password for invalid user git from 91.134.173.103 port 40680 ssh2 ... |
2019-11-06 16:56:29 |
| 217.146.88.208 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-06 17:26:15 |
| 106.12.8.249 | attackbotsspam | Nov 1 11:36:15 nexus sshd[3977]: Invalid user tf from 106.12.8.249 port 53410 Nov 1 11:36:15 nexus sshd[3977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.8.249 Nov 1 11:36:17 nexus sshd[3977]: Failed password for invalid user tf from 106.12.8.249 port 53410 ssh2 Nov 1 11:36:18 nexus sshd[3977]: Received disconnect from 106.12.8.249 port 53410:11: Bye Bye [preauth] Nov 1 11:36:18 nexus sshd[3977]: Disconnected from 106.12.8.249 port 53410 [preauth] Nov 6 02:56:48 nexus sshd[994]: Invalid user hostname from 106.12.8.249 port 50626 Nov 6 02:56:48 nexus sshd[994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.8.249 Nov 6 02:56:50 nexus sshd[994]: Failed password for invalid user hostname from 106.12.8.249 port 50626 ssh2 Nov 6 02:56:50 nexus sshd[994]: Received disconnect from 106.12.8.249 port 50626:11: Bye Bye [preauth] Nov 6 02:56:50 nexus sshd[994]: Disconnecte........ ------------------------------- |
2019-11-06 16:55:32 |
| 191.8.11.9 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/191.8.11.9/ EU - 1H : (8) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : EU NAME ASN : ASN27699 IP : 191.8.11.9 CIDR : 191.8.0.0/17 PREFIX COUNT : 267 UNIQUE IP COUNT : 6569728 ATTACKS DETECTED ASN27699 : 1H - 7 3H - 15 6H - 30 12H - 68 24H - 118 DateTime : 2019-11-06 07:27:24 INFO : HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN - data recovery |
2019-11-06 16:57:16 |
| 167.86.71.238 | attack | CloudCIX Reconnaissance Scan Detected, PTR: vmi239748.contaboserver.net. |
2019-11-06 17:18:04 |
| 112.85.42.87 | attackbotsspam | 2019-11-06T09:30:40.897114shield sshd\[32427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root 2019-11-06T09:30:43.378487shield sshd\[32427\]: Failed password for root from 112.85.42.87 port 30948 ssh2 2019-11-06T09:30:45.197995shield sshd\[32427\]: Failed password for root from 112.85.42.87 port 30948 ssh2 2019-11-06T09:30:47.621731shield sshd\[32427\]: Failed password for root from 112.85.42.87 port 30948 ssh2 2019-11-06T09:31:43.802697shield sshd\[32568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root |
2019-11-06 17:33:29 |
| 181.40.76.162 | attackspambots | Nov 5 19:25:21 srv3 sshd\[6606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.76.162 user=root Nov 5 19:25:24 srv3 sshd\[6606\]: Failed password for root from 181.40.76.162 port 59076 ssh2 Nov 5 19:30:04 srv3 sshd\[6680\]: Invalid user mqm from 181.40.76.162 Nov 5 19:44:08 srv3 sshd\[6914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.76.162 user=root Nov 5 19:44:10 srv3 sshd\[6914\]: Failed password for root from 181.40.76.162 port 42112 ssh2 Nov 5 19:49:01 srv3 sshd\[6987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.76.162 user=root Nov 5 20:03:10 srv3 sshd\[7243\]: Invalid user silvester from 181.40.76.162 Nov 5 20:03:10 srv3 sshd\[7243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.76.162 Nov 5 20:03:12 srv3 sshd\[7243\]: Failed password for invalid user s ... |
2019-11-06 17:25:01 |
| 170.210.60.30 | attackspam | Nov 6 07:00:51 game-panel sshd[18431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.60.30 Nov 6 07:00:53 game-panel sshd[18431]: Failed password for invalid user admin from 170.210.60.30 port 34354 ssh2 Nov 6 07:05:53 game-panel sshd[18594]: Failed password for root from 170.210.60.30 port 53422 ssh2 |
2019-11-06 17:02:26 |
| 138.0.207.52 | attackbotsspam | Nov 6 09:47:43 dedicated sshd[32016]: Failed password for root from 138.0.207.52 port 34611 ssh2 Nov 6 09:47:41 dedicated sshd[32016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.0.207.52 user=root Nov 6 09:47:43 dedicated sshd[32016]: Failed password for root from 138.0.207.52 port 34611 ssh2 Nov 6 09:51:52 dedicated sshd[32649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.0.207.52 user=root Nov 6 09:51:55 dedicated sshd[32649]: Failed password for root from 138.0.207.52 port 16064 ssh2 |
2019-11-06 16:58:10 |
| 206.189.156.198 | attackbots | $f2bV_matches |
2019-11-06 17:19:19 |
| 96.53.65.154 | attackbots | 2019-11-06T06:26:57.532241abusebot-5.cloudsearch.cf sshd\[4040\]: Invalid user test from 96.53.65.154 port 4782 |
2019-11-06 17:28:18 |
| 106.12.38.109 | attackspam | Nov 6 09:28:25 SilenceServices sshd[14727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.109 Nov 6 09:28:27 SilenceServices sshd[14727]: Failed password for invalid user windowspassword from 106.12.38.109 port 52842 ssh2 Nov 6 09:33:41 SilenceServices sshd[16197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.38.109 |
2019-11-06 17:18:49 |
| 106.54.114.208 | attackspambots | /var/log/messages:Nov 6 06:04:04 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1573020244.637:145401): pid=3195 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=3196 suid=74 rport=56792 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=106.54.114.208 terminal=? res=success' /var/log/messages:Nov 6 06:04:04 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1573020244.641:145402): pid=3195 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=3196 suid=74 rport=56792 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=106.54.114.208 terminal=? res=success' /var/log/messages:Nov 6 06:04:05 sanyalnet-cloud-vps fail2ban.filter[1538]: INFO [sshd] Found........ ------------------------------- |
2019-11-06 17:09:34 |
| 107.189.10.171 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-06 17:01:33 |
| 188.130.148.59 | attackbots | Chat Spam |
2019-11-06 17:30:07 |