城市(city): unknown
省份(region): unknown
国家(country): Lithuania
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 90.142.229.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62474
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;90.142.229.157. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 07:29:25 CST 2025
;; MSG SIZE rcvd: 107
157.229.142.90.in-addr.arpa domain name pointer m90-142-229-157.cust.tele2.lt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
157.229.142.90.in-addr.arpa name = m90-142-229-157.cust.tele2.lt.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.192.62.190 | attackspam | 2020-01-01 17:22:42 | |
| 218.92.0.205 | attack | 2020-01-01T04:24:49.209560xentho-1 sshd[353527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.205 user=root 2020-01-01T04:24:51.556104xentho-1 sshd[353527]: Failed password for root from 218.92.0.205 port 58441 ssh2 2020-01-01T04:24:54.049447xentho-1 sshd[353527]: Failed password for root from 218.92.0.205 port 58441 ssh2 2020-01-01T04:24:49.209560xentho-1 sshd[353527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.205 user=root 2020-01-01T04:24:51.556104xentho-1 sshd[353527]: Failed password for root from 218.92.0.205 port 58441 ssh2 2020-01-01T04:24:54.049447xentho-1 sshd[353527]: Failed password for root from 218.92.0.205 port 58441 ssh2 2020-01-01T04:24:49.209560xentho-1 sshd[353527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.205 user=root 2020-01-01T04:24:51.556104xentho-1 sshd[353527]: Failed password for root from 218.92 ... |
2020-01-01 17:34:56 |
| 182.61.176.45 | attackbotsspam | IP blocked |
2020-01-01 17:57:00 |
| 122.165.207.151 | attackbotsspam | Jan 1 09:23:59 mout sshd[5318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.207.151 user=root Jan 1 09:24:01 mout sshd[5318]: Failed password for root from 122.165.207.151 port 64455 ssh2 |
2020-01-01 17:24:41 |
| 106.51.78.188 | attack | Jan 1 09:31:58 web8 sshd\[15200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.78.188 user=root Jan 1 09:32:00 web8 sshd\[15200\]: Failed password for root from 106.51.78.188 port 60548 ssh2 Jan 1 09:33:49 web8 sshd\[15986\]: Invalid user asterisk from 106.51.78.188 Jan 1 09:33:49 web8 sshd\[15986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.78.188 Jan 1 09:33:50 web8 sshd\[15986\]: Failed password for invalid user asterisk from 106.51.78.188 port 42936 ssh2 |
2020-01-01 17:57:36 |
| 61.218.122.198 | attackspam | Failed password for invalid user predon from 61.218.122.198 port 40954 ssh2 Invalid user hillel from 61.218.122.198 port 38610 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.218.122.198 Failed password for invalid user hillel from 61.218.122.198 port 38610 ssh2 Invalid user PDV from 61.218.122.198 port 36200 |
2020-01-01 17:59:10 |
| 106.12.141.112 | attack | 2020-01-01T09:23:04.396135shield sshd\[9653\]: Invalid user backup from 106.12.141.112 port 32998 2020-01-01T09:23:04.400612shield sshd\[9653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.141.112 2020-01-01T09:23:05.998123shield sshd\[9653\]: Failed password for invalid user backup from 106.12.141.112 port 32998 ssh2 2020-01-01T09:30:03.813461shield sshd\[12467\]: Invalid user Herman from 106.12.141.112 port 45572 2020-01-01T09:30:03.817496shield sshd\[12467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.141.112 |
2020-01-01 17:30:41 |
| 194.186.11.147 | attackspam | Lines containing failures of 194.186.11.147 Dec 31 18:06:42 kmh-vmh-001-fsn05 sshd[31839]: Invalid user azuracast from 194.186.11.147 port 49118 Dec 31 18:06:42 kmh-vmh-001-fsn05 sshd[31839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.186.11.147 Dec 31 18:06:45 kmh-vmh-001-fsn05 sshd[31839]: Failed password for invalid user azuracast from 194.186.11.147 port 49118 ssh2 Dec 31 18:06:45 kmh-vmh-001-fsn05 sshd[31839]: Received disconnect from 194.186.11.147 port 49118:11: Bye Bye [preauth] Dec 31 18:06:45 kmh-vmh-001-fsn05 sshd[31839]: Disconnected from invalid user azuracast 194.186.11.147 port 49118 [preauth] Dec 31 18:26:50 kmh-vmh-001-fsn05 sshd[2998]: Connection closed by 194.186.11.147 port 55816 [preauth] Dec 31 18:33:43 kmh-vmh-001-fsn05 sshd[4138]: Connection closed by 194.186.11.147 port 49847 [preauth] Dec 31 18:40:56 kmh-vmh-001-fsn05 sshd[5359]: Connection closed by 194.186.11.147 port 43972 [preauth] Dec 31 18:........ ------------------------------ |
2020-01-01 17:43:37 |
| 197.220.163.230 | attackspambots | 01/01/2020-09:31:37.675605 197.220.163.230 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-01-01 17:25:43 |
| 51.68.198.113 | attackspam | Jan 1 08:37:47 sd-53420 sshd\[12794\]: User root from 51.68.198.113 not allowed because none of user's groups are listed in AllowGroups Jan 1 08:37:47 sd-53420 sshd\[12794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.113 user=root Jan 1 08:37:49 sd-53420 sshd\[12794\]: Failed password for invalid user root from 51.68.198.113 port 58624 ssh2 Jan 1 08:40:18 sd-53420 sshd\[13659\]: Invalid user stahlnecker from 51.68.198.113 Jan 1 08:40:18 sd-53420 sshd\[13659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.113 ... |
2020-01-01 17:24:01 |
| 173.249.12.113 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-01 17:23:27 |
| 77.247.110.40 | attack | \[2020-01-01 04:17:12\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-01T04:17:12.758-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="670103601148122518016",SessionID="0x7f0fb4a5a908",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.40/59256",ACLName="no_extension_match" \[2020-01-01 04:17:27\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-01T04:17:27.149-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0116755001148778878005",SessionID="0x7f0fb52f0168",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.40/53775",ACLName="no_extension_match" \[2020-01-01 04:17:28\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-01T04:17:28.733-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0100001148957156002",SessionID="0x7f0fb4ca4128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.40/58736 |
2020-01-01 17:32:21 |
| 78.139.216.116 | attackbots | Lines containing failures of 78.139.216.116 Dec 31 12:43:11 siirappi sshd[24268]: Invalid user wwwadmin from 78.139.216.116 port 47398 Dec 31 12:43:11 siirappi sshd[24268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.139.216.116 Dec 31 12:43:14 siirappi sshd[24268]: Failed password for invalid user wwwadmin from 78.139.216.116 port 47398 ssh2 Dec 31 12:43:14 siirappi sshd[24268]: Received disconnect from 78.139.216.116 port 47398:11: Bye Bye [preauth] Dec 31 12:43:14 siirappi sshd[24268]: Disconnected from 78.139.216.116 port 47398 [preauth] Dec 31 13:02:59 siirappi sshd[24556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.139.216.116 user=smmsp Dec 31 13:03:01 siirappi sshd[24556]: Failed password for smmsp from 78.139.216.116 port 51676 ssh2 Dec 31 13:03:01 siirappi sshd[24556]: Received disconnect from 78.139.216.116 port 51676:11: Bye Bye [preauth] Dec 31 13:03:01 siirappi s........ ------------------------------ |
2020-01-01 17:26:06 |
| 113.69.254.201 | attackbotsspam | FTP Brute Force |
2020-01-01 17:54:30 |
| 92.118.37.83 | attackspam | 01/01/2020-04:27:34.449226 92.118.37.83 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-01-01 17:48:35 |