城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 9.124.102.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43629
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;9.124.102.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 03:58:08 CST 2025
;; MSG SIZE rcvd: 106
Host 142.102.124.9.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.102.124.9.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 159.65.4.64 | attackspambots | Dec 16 10:57:04 auw2 sshd\[17345\]: Invalid user guest2222 from 159.65.4.64 Dec 16 10:57:04 auw2 sshd\[17345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.4.64 Dec 16 10:57:05 auw2 sshd\[17345\]: Failed password for invalid user guest2222 from 159.65.4.64 port 55860 ssh2 Dec 16 11:02:53 auw2 sshd\[17887\]: Invalid user shark from 159.65.4.64 Dec 16 11:02:53 auw2 sshd\[17887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.4.64 |
2019-12-17 05:06:10 |
| 193.32.163.44 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-12-17 05:14:32 |
| 125.104.212.179 | attack | Unauthorized connection attempt detected from IP address 125.104.212.179 to port 1433 |
2019-12-17 04:59:47 |
| 103.139.12.24 | attack | Dec 16 21:10:07 v22018086721571380 sshd[29238]: Failed password for invalid user ching from 103.139.12.24 port 33005 ssh2 |
2019-12-17 05:00:33 |
| 118.174.45.29 | attackbotsspam | Dec 16 11:08:39 web9 sshd\[19661\]: Invalid user ssh from 118.174.45.29 Dec 16 11:08:39 web9 sshd\[19661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29 Dec 16 11:08:42 web9 sshd\[19661\]: Failed password for invalid user ssh from 118.174.45.29 port 54022 ssh2 Dec 16 11:15:13 web9 sshd\[20763\]: Invalid user jolynn from 118.174.45.29 Dec 16 11:15:13 web9 sshd\[20763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29 |
2019-12-17 05:34:04 |
| 200.72.142.197 | attackspambots | Unauthorized connection attempt from IP address 200.72.142.197 on Port 445(SMB) |
2019-12-17 05:25:23 |
| 104.131.111.64 | attackbotsspam | Dec 16 16:15:20 TORMINT sshd\[18521\]: Invalid user jenk1ns from 104.131.111.64 Dec 16 16:15:20 TORMINT sshd\[18521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.111.64 Dec 16 16:15:22 TORMINT sshd\[18521\]: Failed password for invalid user jenk1ns from 104.131.111.64 port 33425 ssh2 ... |
2019-12-17 05:22:00 |
| 80.88.90.86 | attackspam | Dec 16 21:55:34 loxhost sshd\[8651\]: Invalid user vukanovich from 80.88.90.86 port 45350 Dec 16 21:55:34 loxhost sshd\[8651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.90.86 Dec 16 21:55:36 loxhost sshd\[8651\]: Failed password for invalid user vukanovich from 80.88.90.86 port 45350 ssh2 Dec 16 22:00:48 loxhost sshd\[8770\]: Invalid user gasiago from 80.88.90.86 port 51406 Dec 16 22:00:48 loxhost sshd\[8770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.88.90.86 ... |
2019-12-17 05:05:06 |
| 51.75.23.62 | attack | Dec 16 20:48:26 localhost sshd\[32903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.23.62 user=mysql Dec 16 20:48:28 localhost sshd\[32903\]: Failed password for mysql from 51.75.23.62 port 52978 ssh2 Dec 16 20:53:58 localhost sshd\[33061\]: Invalid user slaunl from 51.75.23.62 port 58440 Dec 16 20:53:58 localhost sshd\[33061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.23.62 Dec 16 20:54:01 localhost sshd\[33061\]: Failed password for invalid user slaunl from 51.75.23.62 port 58440 ssh2 ... |
2019-12-17 05:07:45 |
| 58.20.129.76 | attackbotsspam | 2019-12-16T21:10:34.051474shield sshd\[8097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.20.129.76 user=root 2019-12-16T21:10:36.851978shield sshd\[8097\]: Failed password for root from 58.20.129.76 port 35844 ssh2 2019-12-16T21:15:26.590067shield sshd\[9134\]: Invalid user backup from 58.20.129.76 port 57684 2019-12-16T21:15:26.594637shield sshd\[9134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.20.129.76 2019-12-16T21:15:28.481701shield sshd\[9134\]: Failed password for invalid user backup from 58.20.129.76 port 57684 ssh2 |
2019-12-17 05:16:23 |
| 171.221.142.246 | attack | Dec 16 23:15:20 ncomp sshd[11293]: Invalid user postgres from 171.221.142.246 Dec 16 23:15:20 ncomp sshd[11293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.221.142.246 Dec 16 23:15:20 ncomp sshd[11293]: Invalid user postgres from 171.221.142.246 Dec 16 23:15:22 ncomp sshd[11293]: Failed password for invalid user postgres from 171.221.142.246 port 15106 ssh2 |
2019-12-17 05:26:03 |
| 14.241.142.11 | attackbotsspam | Unauthorized connection attempt from IP address 14.241.142.11 on Port 445(SMB) |
2019-12-17 05:32:43 |
| 87.119.114.15 | attack | Netgear DGN Device Remote Command Execution Vulnerability |
2019-12-17 05:28:47 |
| 218.92.0.168 | attackspambots | --- report --- Dec 16 16:09:56 sshd: Connection from 218.92.0.168 port 29357 |
2019-12-17 05:09:13 |
| 104.236.22.133 | attackbots | web-1 [ssh_2] SSH Attack |
2019-12-17 05:19:59 |