城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.129.105.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.129.105.57. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:26:32 CST 2025
;; MSG SIZE rcvd: 106
57.105.129.93.in-addr.arpa domain name pointer dynamic-093-129-105-057.93.129.pool.telefonica.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
57.105.129.93.in-addr.arpa name = dynamic-093-129-105-057.93.129.pool.telefonica.de.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 173.212.248.207 | attackspam | firewall-block, port(s): 443/tcp |
2019-10-18 07:01:17 |
| 62.234.156.120 | attackspam | Oct 17 23:08:33 ArkNodeAT sshd\[8642\]: Invalid user usuario from 62.234.156.120 Oct 17 23:08:33 ArkNodeAT sshd\[8642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.120 Oct 17 23:08:35 ArkNodeAT sshd\[8642\]: Failed password for invalid user usuario from 62.234.156.120 port 38517 ssh2 |
2019-10-18 07:07:10 |
| 45.162.228.57 | attackbots | Oct 17 21:50:04 vmanager6029 sshd\[11079\]: Invalid user steam from 45.162.228.57 port 48596 Oct 17 21:50:04 vmanager6029 sshd\[11079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.162.228.57 Oct 17 21:50:05 vmanager6029 sshd\[11079\]: Failed password for invalid user steam from 45.162.228.57 port 48596 ssh2 |
2019-10-18 07:02:15 |
| 103.15.226.79 | attackspambots | Wordpress Admin Login attack |
2019-10-18 07:06:21 |
| 201.184.39.104 | attackspambots | Feb 15 18:20:15 odroid64 sshd\[7523\]: Invalid user hallintomies from 201.184.39.104 Feb 15 18:20:15 odroid64 sshd\[7523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.39.104 Feb 15 18:20:16 odroid64 sshd\[7523\]: Failed password for invalid user hallintomies from 201.184.39.104 port 36228 ssh2 May 23 17:00:39 odroid64 sshd\[22768\]: Invalid user math from 201.184.39.104 May 23 17:00:39 odroid64 sshd\[22768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.39.104 May 23 17:00:41 odroid64 sshd\[22768\]: Failed password for invalid user math from 201.184.39.104 port 6410 ssh2 ... |
2019-10-18 06:30:08 |
| 222.186.42.4 | attackspam | Oct 17 19:31:49 firewall sshd[13494]: Failed password for root from 222.186.42.4 port 10982 ssh2 Oct 17 19:31:54 firewall sshd[13494]: Failed password for root from 222.186.42.4 port 10982 ssh2 Oct 17 19:31:58 firewall sshd[13494]: Failed password for root from 222.186.42.4 port 10982 ssh2 ... |
2019-10-18 06:32:56 |
| 218.104.231.2 | attackbotsspam | Oct 17 18:37:09 TORMINT sshd\[30163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.231.2 user=root Oct 17 18:37:11 TORMINT sshd\[30163\]: Failed password for root from 218.104.231.2 port 50401 ssh2 Oct 17 18:41:48 TORMINT sshd\[31532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.231.2 user=root ... |
2019-10-18 06:58:26 |
| 222.186.175.151 | attackspam | 2019-10-17T22:58:55.304276shield sshd\[7637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151 user=root 2019-10-17T22:58:56.666797shield sshd\[7637\]: Failed password for root from 222.186.175.151 port 35218 ssh2 2019-10-17T22:59:00.686436shield sshd\[7637\]: Failed password for root from 222.186.175.151 port 35218 ssh2 2019-10-17T22:59:04.588487shield sshd\[7637\]: Failed password for root from 222.186.175.151 port 35218 ssh2 2019-10-17T22:59:08.372673shield sshd\[7637\]: Failed password for root from 222.186.175.151 port 35218 ssh2 |
2019-10-18 07:05:41 |
| 201.176.27.160 | attack | May 20 01:35:30 odroid64 sshd\[8758\]: User root from 201.176.27.160 not allowed because not listed in AllowUsers May 20 01:35:30 odroid64 sshd\[8758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.176.27.160 user=root May 20 01:35:32 odroid64 sshd\[8758\]: Failed password for invalid user root from 201.176.27.160 port 56636 ssh2 ... |
2019-10-18 06:40:06 |
| 49.235.84.51 | attackspam | Oct 18 00:43:09 MK-Soft-VM7 sshd[9967]: Failed password for root from 49.235.84.51 port 42552 ssh2 ... |
2019-10-18 06:53:55 |
| 201.17.146.80 | attack | Feb 28 17:09:37 odroid64 sshd\[24587\]: Invalid user pablo from 201.17.146.80 Feb 28 17:09:37 odroid64 sshd\[24587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.146.80 Feb 28 17:09:40 odroid64 sshd\[24587\]: Failed password for invalid user pablo from 201.17.146.80 port 10463 ssh2 Mar 6 10:32:21 odroid64 sshd\[2714\]: User root from 201.17.146.80 not allowed because not listed in AllowUsers Mar 6 10:32:21 odroid64 sshd\[2714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.146.80 user=root Mar 6 10:32:23 odroid64 sshd\[2714\]: Failed password for invalid user root from 201.17.146.80 port 46146 ssh2 Mar 9 07:16:00 odroid64 sshd\[19038\]: Invalid user eazye from 201.17.146.80 Mar 9 07:16:00 odroid64 sshd\[19038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.146.80 Mar 9 07:16:02 odroid64 sshd\[19038\]: Failed password for ... |
2019-10-18 06:45:52 |
| 54.91.71.153 | attack | Lines containing failures of 54.91.71.153 Oct 17 21:19:47 hwd04 sshd[2821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.91.71.153 user=r.r Oct 17 21:19:49 hwd04 sshd[2821]: Failed password for r.r from 54.91.71.153 port 45935 ssh2 Oct 17 21:19:50 hwd04 sshd[2821]: Received disconnect from 54.91.71.153 port 45935:11: Bye Bye [preauth] Oct 17 21:19:50 hwd04 sshd[2821]: Disconnected from authenticating user r.r 54.91.71.153 port 45935 [preauth] Oct 17 21:37:07 hwd04 sshd[3582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.91.71.153 user=r.r Oct 17 21:37:09 hwd04 sshd[3582]: Failed password for r.r from 54.91.71.153 port 52187 ssh2 Oct 17 21:37:09 hwd04 sshd[3582]: Received disconnect from 54.91.71.153 port 52187:11: Bye Bye [preauth] Oct 17 21:37:09 hwd04 sshd[3582]: Disconnected from authenticating user r.r 54.91.71.153 port 52187 [preauth] Oct 17 21:40:50 hwd04 sshd[3837]: Inval........ ------------------------------ |
2019-10-18 06:32:34 |
| 201.163.111.42 | attack | Dec 9 18:40:16 odroid64 sshd\[19675\]: Invalid user timothy from 201.163.111.42 Dec 9 18:40:16 odroid64 sshd\[19675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.111.42 Dec 9 18:40:18 odroid64 sshd\[19675\]: Failed password for invalid user timothy from 201.163.111.42 port 40582 ssh2 Dec 13 20:46:03 odroid64 sshd\[424\]: Invalid user user from 201.163.111.42 Dec 13 20:46:04 odroid64 sshd\[424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.111.42 Dec 13 20:46:05 odroid64 sshd\[424\]: Failed password for invalid user user from 201.163.111.42 port 57634 ssh2 Dec 17 18:20:34 odroid64 sshd\[26346\]: Invalid user arif from 201.163.111.42 Dec 17 18:20:34 odroid64 sshd\[26346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.111.42 Dec 17 18:20:36 odroid64 sshd\[26346\]: Failed password for invalid user arif from 201.163.111.42 po ... |
2019-10-18 06:59:59 |
| 78.171.128.30 | attack | Oct 17 22:50:32 server sshd\[12288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.171.128.30 user=root Oct 17 22:50:34 server sshd\[12288\]: Failed password for root from 78.171.128.30 port 41190 ssh2 Oct 17 22:50:35 server sshd\[12288\]: Failed password for root from 78.171.128.30 port 41190 ssh2 Oct 17 22:50:37 server sshd\[12288\]: Failed password for root from 78.171.128.30 port 41190 ssh2 Oct 17 22:50:39 server sshd\[12288\]: Failed password for root from 78.171.128.30 port 41190 ssh2 ... |
2019-10-18 06:35:40 |
| 222.186.175.154 | attackbotsspam | Oct 18 00:51:02 rotator sshd\[8756\]: Failed password for root from 222.186.175.154 port 22202 ssh2Oct 18 00:51:07 rotator sshd\[8756\]: Failed password for root from 222.186.175.154 port 22202 ssh2Oct 18 00:51:12 rotator sshd\[8756\]: Failed password for root from 222.186.175.154 port 22202 ssh2Oct 18 00:51:15 rotator sshd\[8756\]: Failed password for root from 222.186.175.154 port 22202 ssh2Oct 18 00:51:20 rotator sshd\[8756\]: Failed password for root from 222.186.175.154 port 22202 ssh2Oct 18 00:51:31 rotator sshd\[8765\]: Failed password for root from 222.186.175.154 port 34942 ssh2 ... |
2019-10-18 06:52:44 |