城市(city): Cengio Alto
省份(region): Regione Liguria
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.48.195.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36963
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;82.48.195.93. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 12:00:56 CST 2025
;; MSG SIZE rcvd: 105
93.195.48.82.in-addr.arpa domain name pointer host-82-48-195-93.retail.telecomitalia.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
93.195.48.82.in-addr.arpa name = host-82-48-195-93.retail.telecomitalia.it.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.229.27.180 | attack | Aug 16 13:11:52 george sshd[23617]: Invalid user tomcat from 111.229.27.180 port 50628 Aug 16 13:11:52 george sshd[23617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.27.180 Aug 16 13:11:54 george sshd[23617]: Failed password for invalid user tomcat from 111.229.27.180 port 50628 ssh2 Aug 16 13:18:02 george sshd[23709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.27.180 user=root Aug 16 13:18:04 george sshd[23709]: Failed password for root from 111.229.27.180 port 40796 ssh2 ... |
2020-08-17 01:54:47 |
| 91.134.242.199 | attackspam | SSH Brute Force |
2020-08-17 01:40:27 |
| 60.13.230.199 | attackbotsspam | 2020-08-16T19:39:16.480622centos sshd[26689]: Invalid user sudo1 from 60.13.230.199 port 33232 2020-08-16T19:39:18.326846centos sshd[26689]: Failed password for invalid user sudo1 from 60.13.230.199 port 33232 ssh2 2020-08-16T19:43:15.717115centos sshd[26903]: Invalid user student from 60.13.230.199 port 51656 ... |
2020-08-17 02:01:05 |
| 212.129.31.56 | attack | Auto reported by IDS |
2020-08-17 02:10:09 |
| 122.114.158.242 | attack | Automatic report BANNED IP |
2020-08-17 02:11:06 |
| 67.207.88.180 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 66 - port: 25056 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-17 01:47:29 |
| 114.67.77.148 | attackbotsspam | Aug 16 16:35:32 server sshd[48989]: Failed password for invalid user guest from 114.67.77.148 port 51692 ssh2 Aug 16 16:39:49 server sshd[50911]: Failed password for invalid user apagar from 114.67.77.148 port 41988 ssh2 Aug 16 16:44:17 server sshd[53009]: Failed password for invalid user iec from 114.67.77.148 port 60532 ssh2 |
2020-08-17 01:41:43 |
| 114.67.80.134 | attack | SSH Brute-Force. Ports scanning. |
2020-08-17 01:49:04 |
| 122.114.9.237 | attack | Aug 16 13:38:31 NPSTNNYC01T sshd[13249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.9.237 Aug 16 13:38:32 NPSTNNYC01T sshd[13249]: Failed password for invalid user zcy from 122.114.9.237 port 60524 ssh2 Aug 16 13:43:27 NPSTNNYC01T sshd[13636]: Failed password for root from 122.114.9.237 port 33646 ssh2 ... |
2020-08-17 01:46:23 |
| 201.80.108.92 | attack | $f2bV_matches |
2020-08-17 01:43:47 |
| 51.77.215.0 | attackspambots | Aug 16 17:45:51 game-panel sshd[25565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.215.0 Aug 16 17:45:52 game-panel sshd[25565]: Failed password for invalid user roberta from 51.77.215.0 port 32966 ssh2 Aug 16 17:52:58 game-panel sshd[25825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.215.0 |
2020-08-17 02:09:24 |
| 217.219.129.3 | attack | Aug 16 18:16:05 home sshd[29960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.219.129.3 Aug 16 18:16:05 home sshd[29960]: Invalid user admin from 217.219.129.3 port 34760 Aug 16 18:16:07 home sshd[29960]: Failed password for invalid user admin from 217.219.129.3 port 34760 ssh2 Aug 16 18:18:44 home sshd[31091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.219.129.3 user=root Aug 16 18:18:46 home sshd[31091]: Failed password for root from 217.219.129.3 port 62424 ssh2 ... |
2020-08-17 01:41:06 |
| 134.175.129.204 | attackspam | SSH Brute Force |
2020-08-17 01:54:32 |
| 123.207.99.184 | attackbots | prod8 ... |
2020-08-17 01:53:34 |
| 79.136.70.159 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-08-17 01:42:43 |