城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.212.104.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38920
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.212.104.19. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 02:12:55 CST 2025
;; MSG SIZE rcvd: 106
19.104.212.93.in-addr.arpa domain name pointer p5dd46813.dip0.t-ipconnect.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
19.104.212.93.in-addr.arpa name = p5dd46813.dip0.t-ipconnect.de.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 162.252.57.211 | attackbots | Mar 31 08:19:18 our-server-hostname sshd[3188]: Address 162.252.57.211 maps to nxxxxxxx.miami-servers.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Mar 31 08:19:18 our-server-hostname sshd[3188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.211 user=r.r Mar 31 08:19:19 our-server-hostname sshd[3188]: Failed password for r.r from 162.252.57.211 port 59868 ssh2 Mar 31 08:26:10 our-server-hostname sshd[4810]: Address 162.252.57.211 maps to nxxxxxxx.miami-servers.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Mar 31 08:26:10 our-server-hostname sshd[4810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.211 user=r.r Mar 31 08:26:11 our-server-hostname sshd[4810]: Failed password for r.r from 162.252.57.211 port 57262 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=162.252.57.211 |
2020-04-04 02:43:33 |
| 192.241.220.228 | attack | Apr 3 17:55:17 markkoudstaal sshd[6483]: Failed password for root from 192.241.220.228 port 37090 ssh2 Apr 3 18:00:15 markkoudstaal sshd[7308]: Failed password for root from 192.241.220.228 port 48094 ssh2 |
2020-04-04 02:34:08 |
| 111.3.103.78 | attackbotsspam | $f2bV_matches |
2020-04-04 02:56:39 |
| 114.67.122.89 | attackspambots | 2020-04-03T16:47:49.640956abusebot.cloudsearch.cf sshd[8719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.122.89 user=root 2020-04-03T16:47:51.971810abusebot.cloudsearch.cf sshd[8719]: Failed password for root from 114.67.122.89 port 50556 ssh2 2020-04-03T16:50:40.324338abusebot.cloudsearch.cf sshd[8927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.122.89 user=root 2020-04-03T16:50:41.796941abusebot.cloudsearch.cf sshd[8927]: Failed password for root from 114.67.122.89 port 51276 ssh2 2020-04-03T16:53:20.755046abusebot.cloudsearch.cf sshd[9073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.122.89 user=root 2020-04-03T16:53:22.859918abusebot.cloudsearch.cf sshd[9073]: Failed password for root from 114.67.122.89 port 51960 ssh2 2020-04-03T16:56:01.218127abusebot.cloudsearch.cf sshd[9218]: pam_unix(sshd:auth): authentication failure; lo ... |
2020-04-04 02:53:42 |
| 104.210.215.237 | attack | Invalid user chef from 104.210.215.237 port 39154 |
2020-04-04 02:15:28 |
| 159.65.41.104 | attackspambots | Apr 3 19:45:27 vserver sshd\[14334\]: Failed password for root from 159.65.41.104 port 60988 ssh2Apr 3 19:49:15 vserver sshd\[14365\]: Invalid user user from 159.65.41.104Apr 3 19:49:17 vserver sshd\[14365\]: Failed password for invalid user user from 159.65.41.104 port 60406 ssh2Apr 3 19:53:16 vserver sshd\[14384\]: Failed password for root from 159.65.41.104 port 33340 ssh2 ... |
2020-04-04 02:43:46 |
| 51.91.110.170 | attackspam | Invalid user avisha from 51.91.110.170 port 47224 |
2020-04-04 02:22:38 |
| 187.18.108.73 | attackbotsspam | Apr 3 18:26:40 Ubuntu-1404-trusty-64-minimal sshd\[8261\]: Invalid user shipping from 187.18.108.73 Apr 3 18:26:40 Ubuntu-1404-trusty-64-minimal sshd\[8261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.18.108.73 Apr 3 18:26:42 Ubuntu-1404-trusty-64-minimal sshd\[8261\]: Failed password for invalid user shipping from 187.18.108.73 port 48294 ssh2 Apr 3 18:33:28 Ubuntu-1404-trusty-64-minimal sshd\[17180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.18.108.73 user=root Apr 3 18:33:30 Ubuntu-1404-trusty-64-minimal sshd\[17180\]: Failed password for root from 187.18.108.73 port 37710 ssh2 |
2020-04-04 02:38:06 |
| 54.37.68.191 | attackbots | 2020-04-03T15:53:57.370079Z f6b9b43cfadc New connection: 54.37.68.191:53670 (172.17.0.4:2222) [session: f6b9b43cfadc] 2020-04-03T16:08:49.725005Z 50c157527318 New connection: 54.37.68.191:53026 (172.17.0.4:2222) [session: 50c157527318] |
2020-04-04 02:20:59 |
| 113.160.234.64 | attack | Invalid user tit0nich from 113.160.234.64 port 59962 |
2020-04-04 02:54:44 |
| 59.42.114.203 | attack | Invalid user jboss from 59.42.114.203 port 43682 |
2020-04-04 02:19:43 |
| 195.69.222.169 | attackspam | Apr 3 17:21:42 srv206 sshd[27583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.69.222.169 user=root Apr 3 17:21:45 srv206 sshd[27583]: Failed password for root from 195.69.222.169 port 34756 ssh2 Apr 3 17:30:48 srv206 sshd[27616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.69.222.169 user=root Apr 3 17:30:51 srv206 sshd[27616]: Failed password for root from 195.69.222.169 port 41992 ssh2 ... |
2020-04-04 02:33:43 |
| 190.128.230.206 | attack | Apr 3 15:36:42 localhost sshd\[21311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.206 user=root Apr 3 15:36:44 localhost sshd\[21311\]: Failed password for root from 190.128.230.206 port 51888 ssh2 Apr 3 15:51:49 localhost sshd\[21606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.230.206 user=root ... |
2020-04-04 02:36:51 |
| 134.209.41.198 | attackspambots | 2020-04-03T17:15:27.109402abusebot-5.cloudsearch.cf sshd[14573]: Invalid user mapred from 134.209.41.198 port 55152 2020-04-03T17:15:27.116535abusebot-5.cloudsearch.cf sshd[14573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.41.198 2020-04-03T17:15:27.109402abusebot-5.cloudsearch.cf sshd[14573]: Invalid user mapred from 134.209.41.198 port 55152 2020-04-03T17:15:29.392319abusebot-5.cloudsearch.cf sshd[14573]: Failed password for invalid user mapred from 134.209.41.198 port 55152 ssh2 2020-04-03T17:19:21.006487abusebot-5.cloudsearch.cf sshd[14581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.41.198 user=root 2020-04-03T17:19:23.272255abusebot-5.cloudsearch.cf sshd[14581]: Failed password for root from 134.209.41.198 port 42530 ssh2 2020-04-03T17:23:22.471242abusebot-5.cloudsearch.cf sshd[14586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1 ... |
2020-04-04 02:47:24 |
| 111.229.204.204 | attackbotsspam | $f2bV_matches |
2020-04-04 02:56:11 |