城市(city): unknown
省份(region): unknown
国家(country): Sweden
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.172.114.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;83.172.114.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 15:19:52 CST 2025
;; MSG SIZE rcvd: 106
42.114.172.83.in-addr.arpa domain name pointer 83-172-114-42.lidnet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.114.172.83.in-addr.arpa name = 83-172-114-42.lidnet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.202.215.165 | attackspambots | RDPBruteCAu |
2020-09-27 01:47:48 |
| 106.12.10.21 | attack | Sep 26 12:19:23 Tower sshd[12629]: Connection from 106.12.10.21 port 37370 on 192.168.10.220 port 22 rdomain "" Sep 26 12:19:25 Tower sshd[12629]: Invalid user bootcamp from 106.12.10.21 port 37370 Sep 26 12:19:25 Tower sshd[12629]: error: Could not get shadow information for NOUSER Sep 26 12:19:25 Tower sshd[12629]: Failed password for invalid user bootcamp from 106.12.10.21 port 37370 ssh2 Sep 26 12:19:27 Tower sshd[12629]: Received disconnect from 106.12.10.21 port 37370:11: Bye Bye [preauth] Sep 26 12:19:27 Tower sshd[12629]: Disconnected from invalid user bootcamp 106.12.10.21 port 37370 [preauth] |
2020-09-27 01:44:10 |
| 139.162.69.98 | attackbots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-09-27 01:34:43 |
| 176.74.13.170 | attackbots | Sep 26 10:59:09 propaganda sshd[45395]: Connection from 176.74.13.170 port 53294 on 10.0.0.161 port 22 rdomain "" Sep 26 10:59:09 propaganda sshd[45395]: Connection closed by 176.74.13.170 port 53294 [preauth] |
2020-09-27 02:05:12 |
| 171.246.93.138 | attackspam | Automatic report - Port Scan Attack |
2020-09-27 01:57:50 |
| 212.98.97.152 | attackbotsspam | (sshd) Failed SSH login from 212.98.97.152 (DK/Denmark/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 13:13:24 optimus sshd[19307]: Invalid user oper from 212.98.97.152 Sep 26 13:13:24 optimus sshd[19307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.98.97.152 Sep 26 13:13:26 optimus sshd[19307]: Failed password for invalid user oper from 212.98.97.152 port 54346 ssh2 Sep 26 13:17:36 optimus sshd[20535]: Invalid user user from 212.98.97.152 Sep 26 13:17:36 optimus sshd[20535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.98.97.152 |
2020-09-27 01:58:06 |
| 51.145.5.229 | attackbotsspam | SSH brutforce |
2020-09-27 01:38:59 |
| 150.109.237.188 | attack | 5601/tcp 449/tcp 32804/udp... [2020-07-26/09-26]8pkt,7pt.(tcp),1pt.(udp) |
2020-09-27 01:54:30 |
| 89.163.223.216 | attack | Tracking message source: 89.163.223.216: Routing details for 89.163.223.216 [refresh/show] Cached whois for 89.163.223.216 : abuse@myloc.de From: =?UTF-8?q?=47=65=6C=64=6E=61=63=68?= =?UTF-8?q?=72=69=63=68=74=65=6E=20?= |
2020-09-27 01:37:13 |
| 218.92.0.165 | attackbots | Sep 26 13:21:47 NPSTNNYC01T sshd[13061]: Failed password for root from 218.92.0.165 port 29801 ssh2 Sep 26 13:21:50 NPSTNNYC01T sshd[13061]: Failed password for root from 218.92.0.165 port 29801 ssh2 Sep 26 13:21:53 NPSTNNYC01T sshd[13061]: Failed password for root from 218.92.0.165 port 29801 ssh2 Sep 26 13:21:57 NPSTNNYC01T sshd[13061]: Failed password for root from 218.92.0.165 port 29801 ssh2 ... |
2020-09-27 01:50:03 |
| 177.69.67.243 | attack | Sep 26 17:19:55 buvik sshd[14298]: Invalid user jimmy from 177.69.67.243 Sep 26 17:19:55 buvik sshd[14298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.67.243 Sep 26 17:19:57 buvik sshd[14298]: Failed password for invalid user jimmy from 177.69.67.243 port 58113 ssh2 ... |
2020-09-27 02:07:53 |
| 40.121.157.202 | attack | Sep 26 19:53:06 jane sshd[1483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.121.157.202 Sep 26 19:53:09 jane sshd[1483]: Failed password for invalid user 139 from 40.121.157.202 port 12482 ssh2 ... |
2020-09-27 01:56:34 |
| 161.35.171.3 | attack | Numerous bad requests for specific python language files. |
2020-09-27 01:46:14 |
| 45.231.12.37 | attack | 2020-09-26T20:37:00.039303snf-827550 sshd[28885]: Invalid user hadoop from 45.231.12.37 port 32898 2020-09-26T20:37:02.057668snf-827550 sshd[28885]: Failed password for invalid user hadoop from 45.231.12.37 port 32898 ssh2 2020-09-26T20:41:19.674813snf-827550 sshd[28956]: Invalid user Test from 45.231.12.37 port 42792 ... |
2020-09-27 01:59:07 |
| 128.199.204.26 | attackbots | Tried sshing with brute force. |
2020-09-27 01:42:19 |