城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.59.14.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;75.59.14.247. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 10:56:55 CST 2025
;; MSG SIZE rcvd: 105
Host 247.14.59.75.in-addr.arpa not found: 2(SERVFAIL)
server can't find 75.59.14.247.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 101.51.187.59 | attack | 1589881465 - 05/19/2020 11:44:25 Host: 101.51.187.59/101.51.187.59 Port: 445 TCP Blocked |
2020-05-20 02:14:05 |
| 103.78.39.106 | attackspambots | Invalid user cah from 103.78.39.106 port 43758 |
2020-05-20 02:01:52 |
| 124.160.96.249 | attackbots | May 19 10:36:19 db01 sshd[15636]: Invalid user hlh from 124.160.96.249 May 19 10:36:19 db01 sshd[15636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 May 19 10:36:21 db01 sshd[15636]: Failed password for invalid user hlh from 124.160.96.249 port 16728 ssh2 May 19 10:36:21 db01 sshd[15636]: Received disconnect from 124.160.96.249: 11: Bye Bye [preauth] May 19 10:41:16 db01 sshd[16300]: Invalid user klv from 124.160.96.249 May 19 10:41:16 db01 sshd[16300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 May 19 10:41:18 db01 sshd[16300]: Failed password for invalid user klv from 124.160.96.249 port 35961 ssh2 May 19 10:41:18 db01 sshd[16300]: Received disconnect from 124.160.96.249: 11: Bye Bye [preauth] May 19 10:44:44 db01 sshd[16686]: Invalid user lzr from 124.160.96.249 May 19 10:44:44 db01 sshd[16686]: pam_unix(sshd:auth): authentication failure; logname=........ ------------------------------- |
2020-05-20 02:31:11 |
| 128.1.132.221 | attackspambots | May 19 11:44:33 lnxweb62 sshd[17307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.132.221 |
2020-05-20 02:12:48 |
| 50.234.173.102 | attackspambots | $f2bV_matches |
2020-05-20 02:06:03 |
| 83.151.14.181 | attackbots | May 19 11:42:34 lnxmail61 sshd[9855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.151.14.181 |
2020-05-20 02:37:52 |
| 201.163.56.82 | attackspambots | Lines containing failures of 201.163.56.82 May 18 19:11:45 shared03 sshd[14167]: Did not receive identification string from 201.163.56.82 port 59654 May 18 19:13:14 shared03 sshd[14901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.56.82 user=r.r May 18 19:13:15 shared03 sshd[14901]: Failed password for r.r from 201.163.56.82 port 49330 ssh2 May 18 19:13:16 shared03 sshd[14901]: Received disconnect from 201.163.56.82 port 49330:11: Normal Shutdown, Thank you for playing [preauth] May 18 19:13:16 shared03 sshd[14901]: Disconnected from authenticating user r.r 201.163.56.82 port 49330 [preauth] May 18 19:13:19 shared03 sshd[14905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.56.82 user=r.r May 18 19:13:21 shared03 sshd[14905]: Failed password for r.r from 201.163.56.82 port 39178 ssh2 May 18 19:13:21 shared03 sshd[14905]: Received disconnect from 201.163.56.82 port 3917........ ------------------------------ |
2020-05-20 02:07:39 |
| 116.101.140.111 | attack | 1589881432 - 05/19/2020 11:43:52 Host: 116.101.140.111/116.101.140.111 Port: 445 TCP Blocked |
2020-05-20 02:20:15 |
| 106.13.144.207 | attackspambots | May 19 20:06:29 server sshd[16578]: Failed password for invalid user lzjian from 106.13.144.207 port 52644 ssh2 May 19 20:08:29 server sshd[18834]: Failed password for invalid user bim from 106.13.144.207 port 46492 ssh2 May 19 20:09:11 server sshd[19497]: Failed password for invalid user gun from 106.13.144.207 port 54962 ssh2 |
2020-05-20 02:32:20 |
| 118.163.45.62 | attackspambots | Telnet Server BruteForce Attack |
2020-05-20 02:02:29 |
| 212.64.24.151 | attack | Invalid user huyaoyi from 212.64.24.151 port 48748 |
2020-05-20 02:32:04 |
| 217.91.110.132 | attack | May 18 22:16:01 fwservlet sshd[2330]: Invalid user lsj from 217.91.110.132 May 18 22:16:01 fwservlet sshd[2330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.91.110.132 May 18 22:16:03 fwservlet sshd[2330]: Failed password for invalid user lsj from 217.91.110.132 port 36138 ssh2 May 18 22:16:03 fwservlet sshd[2330]: Received disconnect from 217.91.110.132 port 36138:11: Bye Bye [preauth] May 18 22:16:03 fwservlet sshd[2330]: Disconnected from 217.91.110.132 port 36138 [preauth] May 18 22:22:18 fwservlet sshd[2451]: Invalid user qwc from 217.91.110.132 May 18 22:22:18 fwservlet sshd[2451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.91.110.132 May 18 22:22:19 fwservlet sshd[2451]: Failed password for invalid user qwc from 217.91.110.132 port 41690 ssh2 May 18 22:22:19 fwservlet sshd[2451]: Received disconnect from 217.91.110.132 port 41690:11: Bye Bye [preauth] May 18 22:22:19 ........ ------------------------------- |
2020-05-20 02:11:45 |
| 181.118.94.57 | attack | May 19 11:52:59 Tower sshd[10779]: Connection from 181.118.94.57 port 38494 on 192.168.10.220 port 22 rdomain "" May 19 11:53:02 Tower sshd[10779]: Invalid user tinglok from 181.118.94.57 port 38494 May 19 11:53:02 Tower sshd[10779]: error: Could not get shadow information for NOUSER May 19 11:53:02 Tower sshd[10779]: Failed password for invalid user tinglok from 181.118.94.57 port 38494 ssh2 May 19 11:53:02 Tower sshd[10779]: Received disconnect from 181.118.94.57 port 38494:11: Bye Bye [preauth] May 19 11:53:02 Tower sshd[10779]: Disconnected from invalid user tinglok 181.118.94.57 port 38494 [preauth] |
2020-05-20 02:18:10 |
| 89.179.243.25 | attackspam | May 18 19:23:56 lamijardin sshd[25546]: Invalid user yyy from 89.179.243.25 May 18 19:23:56 lamijardin sshd[25546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.179.243.25 May 18 19:23:58 lamijardin sshd[25546]: Failed password for invalid user yyy from 89.179.243.25 port 35966 ssh2 May 18 19:23:58 lamijardin sshd[25546]: Received disconnect from 89.179.243.25 port 35966:11: Bye Bye [preauth] May 18 19:23:58 lamijardin sshd[25546]: Disconnected from 89.179.243.25 port 35966 [preauth] May 18 19:30:21 lamijardin sshd[25596]: Invalid user faf from 89.179.243.25 May 18 19:30:21 lamijardin sshd[25596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.179.243.25 May 18 19:30:23 lamijardin sshd[25596]: Failed password for invalid user faf from 89.179.243.25 port 44522 ssh2 May 18 19:30:23 lamijardin sshd[25596]: Received disconnect from 89.179.243.25 port 44522:11: Bye Bye [preauth] May 18 ........ ------------------------------- |
2020-05-20 02:09:07 |
| 36.133.61.171 | attackspambots | May 19 02:11:00 garuda sshd[320746]: Invalid user evm from 36.133.61.171 May 19 02:11:00 garuda sshd[320746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.61.171 May 19 02:11:02 garuda sshd[320746]: Failed password for invalid user evm from 36.133.61.171 port 37001 ssh2 May 19 02:11:03 garuda sshd[320746]: Received disconnect from 36.133.61.171: 11: Bye Bye [preauth] May 19 02:24:45 garuda sshd[324889]: Invalid user koike from 36.133.61.171 May 19 02:24:45 garuda sshd[324889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.61.171 May 19 02:24:47 garuda sshd[324889]: Failed password for invalid user koike from 36.133.61.171 port 40680 ssh2 May 19 02:24:47 garuda sshd[324889]: Received disconnect from 36.133.61.171: 11: Bye Bye [preauth] May 19 02:33:16 garuda sshd[327711]: Invalid user sik from 36.133.61.171 May 19 02:33:16 garuda sshd[327711]: pam_unix(sshd:auth): authent........ ------------------------------- |
2020-05-20 02:19:26 |