城市(city): unknown
省份(region): unknown
国家(country): France
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.142.121.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;77.142.121.90. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 19:42:20 CST 2025
;; MSG SIZE rcvd: 106
90.121.142.77.in-addr.arpa domain name pointer 90.121.142.77.rev.sfr.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
90.121.142.77.in-addr.arpa name = 90.121.142.77.rev.sfr.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 89.216.56.67 | attack | 11/22/2019-07:28:11.918426 89.216.56.67 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-11-22 15:55:54 |
| 171.34.173.49 | attackbots | Nov 21 21:37:07 wbs sshd\[9170\]: Invalid user forren from 171.34.173.49 Nov 21 21:37:07 wbs sshd\[9170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.173.49 Nov 21 21:37:10 wbs sshd\[9170\]: Failed password for invalid user forren from 171.34.173.49 port 60664 ssh2 Nov 21 21:41:32 wbs sshd\[9636\]: Invalid user jie from 171.34.173.49 Nov 21 21:41:32 wbs sshd\[9636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.173.49 |
2019-11-22 15:56:13 |
| 59.63.169.50 | attackbotsspam | 2019-11-22T07:39:34.691922shield sshd\[20653\]: Invalid user backup from 59.63.169.50 port 45854 2019-11-22T07:39:34.696189shield sshd\[20653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.169.50 2019-11-22T07:39:36.828322shield sshd\[20653\]: Failed password for invalid user backup from 59.63.169.50 port 45854 ssh2 2019-11-22T07:44:11.476305shield sshd\[21391\]: Invalid user may from 59.63.169.50 port 53326 2019-11-22T07:44:11.481330shield sshd\[21391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.63.169.50 |
2019-11-22 15:45:22 |
| 113.172.103.2 | attackspam | Portscan or hack attempt detected by psad/fwsnort |
2019-11-22 16:08:12 |
| 54.38.241.171 | attack | Nov 22 08:21:29 markkoudstaal sshd[18416]: Failed password for root from 54.38.241.171 port 38594 ssh2 Nov 22 08:25:02 markkoudstaal sshd[18713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.241.171 Nov 22 08:25:03 markkoudstaal sshd[18713]: Failed password for invalid user lsk from 54.38.241.171 port 46576 ssh2 |
2019-11-22 16:05:43 |
| 81.201.60.150 | attackspam | /var/log/messages:Nov 19 03:35:23 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1574134523.726:222922): pid=31865 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=31866 suid=74 rport=55091 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=81.201.60.150 terminal=? res=success' /var/log/messages:Nov 19 03:35:23 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1574134523.730:222923): pid=31865 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha1 pfs=ecdh-sha2-nistp256 spid=31866 suid=74 rport=55091 laddr=104.167.106.93 lport=22 exe="/usr/sbin/sshd" hostname=? addr=81.201.60.150 terminal=? res=success' /var/log/messages:Nov 19 03:35:24 sanyalnet-cloud-vps fail2ban.filter[1538]: INFO [sshd] Fou........ ------------------------------- |
2019-11-22 16:05:17 |
| 140.143.199.89 | attackbotsspam | 2019-11-22T06:58:32.274505abusebot-7.cloudsearch.cf sshd\[1091\]: Invalid user beine from 140.143.199.89 port 37424 |
2019-11-22 16:12:57 |
| 51.83.77.224 | attack | Nov 22 08:18:15 mout sshd[1771]: Invalid user grebil from 51.83.77.224 port 49284 |
2019-11-22 16:00:33 |
| 183.82.114.131 | attackspam | Fail2Ban Ban Triggered |
2019-11-22 15:41:41 |
| 51.38.51.108 | attackspambots | Invalid user gdm from 51.38.51.108 port 52014 |
2019-11-22 16:16:39 |
| 125.227.130.5 | attackspam | Nov 22 07:27:45 vps647732 sshd[29818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.130.5 Nov 22 07:27:46 vps647732 sshd[29818]: Failed password for invalid user dovecot from 125.227.130.5 port 55400 ssh2 ... |
2019-11-22 16:09:07 |
| 171.232.248.89 | attackbotsspam | Nov 22 08:50:02 mail sshd\[12843\]: Invalid user 1234 from 171.232.248.89 Nov 22 08:50:03 mail sshd\[12843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.232.248.89 Nov 22 08:50:05 mail sshd\[12843\]: Failed password for invalid user 1234 from 171.232.248.89 port 22082 ssh2 ... |
2019-11-22 16:14:53 |
| 74.63.250.6 | attackbots | Nov 22 08:54:38 localhost sshd\[5327\]: Invalid user server from 74.63.250.6 port 60356 Nov 22 08:54:38 localhost sshd\[5327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.250.6 Nov 22 08:54:39 localhost sshd\[5327\]: Failed password for invalid user server from 74.63.250.6 port 60356 ssh2 |
2019-11-22 16:04:50 |
| 1.214.241.18 | attackspam | Nov 22 07:31:03 web8 sshd\[4934\]: Invalid user !! from 1.214.241.18 Nov 22 07:31:03 web8 sshd\[4934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.241.18 Nov 22 07:31:05 web8 sshd\[4934\]: Failed password for invalid user !! from 1.214.241.18 port 36296 ssh2 Nov 22 07:35:38 web8 sshd\[7057\]: Invalid user hamlet from 1.214.241.18 Nov 22 07:35:38 web8 sshd\[7057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.241.18 |
2019-11-22 15:44:23 |
| 186.67.32.130 | attackspam | Unauthorised access (Nov 22) SRC=186.67.32.130 LEN=52 TOS=0x10 PREC=0x40 TTL=111 ID=17396 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-22 16:11:19 |