城市(city): unknown
省份(region): unknown
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.42.53.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37498
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.42.53.68. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 13:53:00 CST 2025
;; MSG SIZE rcvd: 104
68.53.42.93.in-addr.arpa domain name pointer 93-42-53-68.ip85.fastwebnet.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.53.42.93.in-addr.arpa name = 93-42-53-68.ip85.fastwebnet.it.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 89.248.174.216 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 23 proto: TCP cat: Misc Attack |
2019-11-07 02:58:35 |
| 124.255.1.200 | attackspam | Automatic report - Banned IP Access |
2019-11-07 02:37:28 |
| 46.101.163.220 | attackspam | 2019-11-06T18:05:28.574365abusebot-8.cloudsearch.cf sshd\[30521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=server.herojus.lt user=ftp |
2019-11-07 03:09:03 |
| 167.114.251.164 | attack | Nov 6 16:47:23 xeon sshd[30962]: Failed password for root from 167.114.251.164 port 46307 ssh2 |
2019-11-07 02:42:36 |
| 23.235.171.246 | attackbots | Lines containing failures of 23.235.171.246 (max 1000) Nov 6 08:08:26 localhost sshd[5917]: User r.r from 23.235.171.246 not allowed because listed in DenyUsers Nov 6 08:08:26 localhost sshd[5917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.235.171.246 user=r.r Nov 6 08:08:28 localhost sshd[5917]: Failed password for invalid user r.r from 23.235.171.246 port 60798 ssh2 Nov 6 08:08:30 localhost sshd[5917]: Received disconnect from 23.235.171.246 port 60798:11: Bye Bye [preauth] Nov 6 08:08:30 localhost sshd[5917]: Disconnected from invalid user r.r 23.235.171.246 port 60798 [preauth] Nov 6 08:26:45 localhost sshd[15990]: User r.r from 23.235.171.246 not allowed because listed in DenyUsers Nov 6 08:26:45 localhost sshd[15990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.235.171.246 user=r.r Nov 6 08:26:47 localhost sshd[15990]: Failed password for invalid user r.r from ........ ------------------------------ |
2019-11-07 02:32:35 |
| 200.68.133.148 | attackspambots | $f2bV_matches |
2019-11-07 02:34:15 |
| 139.199.193.202 | attack | 2019-11-06T14:31:01.996660shield sshd\[25633\]: Invalid user cassidy from 139.199.193.202 port 44314 2019-11-06T14:31:02.002837shield sshd\[25633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.193.202 2019-11-06T14:31:04.256466shield sshd\[25633\]: Failed password for invalid user cassidy from 139.199.193.202 port 44314 ssh2 2019-11-06T14:36:34.498462shield sshd\[26005\]: Invalid user sg-1 from 139.199.193.202 port 51422 2019-11-06T14:36:34.502939shield sshd\[26005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.193.202 |
2019-11-07 03:03:24 |
| 185.143.223.135 | attackspambots | SSH bruteforce |
2019-11-07 02:59:33 |
| 222.186.190.92 | attack | F2B jail: sshd. Time: 2019-11-06 19:45:58, Reported by: VKReport |
2019-11-07 02:47:22 |
| 178.149.114.79 | attack | Nov 6 15:36:49 amit sshd\[16808\]: Invalid user Flipper from 178.149.114.79 Nov 6 15:36:49 amit sshd\[16808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.149.114.79 Nov 6 15:36:51 amit sshd\[16808\]: Failed password for invalid user Flipper from 178.149.114.79 port 56974 ssh2 ... |
2019-11-07 02:51:54 |
| 46.38.144.146 | attackbotsspam | Nov 6 19:23:22 vmanager6029 postfix/smtpd\[7994\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 6 19:24:10 vmanager6029 postfix/smtpd\[7994\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-07 02:31:47 |
| 186.64.116.65 | attackspambots | Automatic report - XMLRPC Attack |
2019-11-07 02:36:21 |
| 109.88.44.32 | attackbots | 19/11/6@09:36:27: FAIL: Alarm-SSH address from=109.88.44.32 19/11/6@09:36:28: FAIL: Alarm-SSH address from=109.88.44.32 ... |
2019-11-07 03:06:14 |
| 5.45.6.66 | attack | Nov 6 05:38:03 auw2 sshd\[8538\]: Invalid user nirvana1 from 5.45.6.66 Nov 6 05:38:03 auw2 sshd\[8538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=066-006-045-005.ip-addr.inexio.net Nov 6 05:38:05 auw2 sshd\[8538\]: Failed password for invalid user nirvana1 from 5.45.6.66 port 39288 ssh2 Nov 6 05:44:32 auw2 sshd\[9221\]: Invalid user cn from 5.45.6.66 Nov 6 05:44:32 auw2 sshd\[9221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=066-006-045-005.ip-addr.inexio.net |
2019-11-07 03:08:41 |
| 92.118.37.70 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 91 - port: 3390 proto: TCP cat: Misc Attack |
2019-11-07 02:50:12 |