城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.124.78.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32262
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.124.78.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:08:02 CST 2025
;; MSG SIZE rcvd: 105
40.78.124.94.in-addr.arpa domain name pointer free.example.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.78.124.94.in-addr.arpa name = free.example.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 153.36.232.139 | attackspambots | Jul 3 17:11:40 MainVPS sshd[6352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.139 user=root Jul 3 17:11:42 MainVPS sshd[6352]: Failed password for root from 153.36.232.139 port 27170 ssh2 Jul 3 17:11:59 MainVPS sshd[6369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.139 user=root Jul 3 17:12:01 MainVPS sshd[6369]: Failed password for root from 153.36.232.139 port 57995 ssh2 Jul 3 17:11:59 MainVPS sshd[6369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.139 user=root Jul 3 17:12:01 MainVPS sshd[6369]: Failed password for root from 153.36.232.139 port 57995 ssh2 Jul 3 17:12:03 MainVPS sshd[6369]: Failed password for root from 153.36.232.139 port 57995 ssh2 ... |
2019-07-03 23:32:18 |
| 5.132.115.161 | attackspambots | Jul 2 04:33:27 shared10 sshd[32109]: Invalid user test from 5.132.115.161 Jul 2 04:33:27 shared10 sshd[32109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.132.115.161 Jul 2 04:33:29 shared10 sshd[32109]: Failed password for invalid user test from 5.132.115.161 port 58674 ssh2 Jul 2 04:33:29 shared10 sshd[32109]: Received disconnect from 5.132.115.161 port 58674:11: Bye Bye [preauth] Jul 2 04:33:29 shared10 sshd[32109]: Disconnected from 5.132.115.161 port 58674 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=5.132.115.161 |
2019-07-03 23:15:01 |
| 35.202.154.229 | attackspambots | Jul 3 15:25:28 localhost sshd\[4147\]: Invalid user mint from 35.202.154.229 port 49904 Jul 3 15:25:28 localhost sshd\[4147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.202.154.229 Jul 3 15:25:30 localhost sshd\[4147\]: Failed password for invalid user mint from 35.202.154.229 port 49904 ssh2 |
2019-07-03 23:38:51 |
| 140.143.227.10 | attack | Jul 3 16:29:43 ArkNodeAT sshd\[7863\]: Invalid user testuser from 140.143.227.10 Jul 3 16:29:43 ArkNodeAT sshd\[7863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.227.10 Jul 3 16:29:44 ArkNodeAT sshd\[7863\]: Failed password for invalid user testuser from 140.143.227.10 port 53620 ssh2 |
2019-07-03 22:47:57 |
| 94.177.163.133 | attack | Jul 3 16:09:04 ubuntu-2gb-nbg1-dc3-1 sshd[13460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.163.133 Jul 3 16:09:05 ubuntu-2gb-nbg1-dc3-1 sshd[13460]: Failed password for invalid user hdfs from 94.177.163.133 port 34932 ssh2 ... |
2019-07-03 22:47:24 |
| 78.31.67.105 | attackbotsspam | Lines containing failures of 78.31.67.105 Jul 3 15:58:14 siirappi sshd[16864]: Invalid user lab from 78.31.67.105 port 52056 Jul 3 15:58:14 siirappi sshd[16864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.31.67.105 Jul 3 15:58:17 siirappi sshd[16864]: Failed password for invalid user lab from 78.31.67.105 port 52056 ssh2 Jul 3 15:58:17 siirappi sshd[16864]: Received disconnect from 78.31.67.105 port 52056:11: Bye Bye [preauth] Jul 3 15:58:17 siirappi sshd[16864]: Disconnected from 78.31.67.105 port 52056 [preauth] Jul 3 16:04:23 siirappi sshd[16959]: Invalid user raghum from 78.31.67.105 port 47570 Jul 3 16:04:23 siirappi sshd[16959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.31.67.105 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=78.31.67.105 |
2019-07-03 22:56:39 |
| 5.75.116.8 | attackbots | port scan and connect, tcp 23 (telnet) |
2019-07-03 23:23:54 |
| 166.111.152.230 | attack | Jul 2 07:32:18 shadeyouvpn sshd[10769]: Invalid user beltrami from 166.111.152.230 Jul 2 07:32:18 shadeyouvpn sshd[10769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.152.230 Jul 2 07:32:20 shadeyouvpn sshd[10769]: Failed password for invalid user beltrami from 166.111.152.230 port 57946 ssh2 Jul 2 07:32:21 shadeyouvpn sshd[10769]: Received disconnect from 166.111.152.230: 11: Bye Bye [preauth] Jul 2 07:43:02 shadeyouvpn sshd[20144]: Invalid user samura from 166.111.152.230 Jul 2 07:43:02 shadeyouvpn sshd[20144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.152.230 Jul 2 07:43:04 shadeyouvpn sshd[20144]: Failed password for invalid user samura from 166.111.152.230 port 48030 ssh2 Jul 2 07:43:04 shadeyouvpn sshd[20144]: Received disconnect from 166.111.152.230: 11: Bye Bye [preauth] Jul 2 07:44:41 shadeyouvpn sshd[21135]: Invalid user ghostname4 from 166.111......... ------------------------------- |
2019-07-03 23:26:58 |
| 51.68.114.77 | attack | Jul 1 20:39:02 nandi sshd[13748]: Address 51.68.114.77 maps to ip-51-68-114.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 1 20:39:02 nandi sshd[13748]: Invalid user owen from 51.68.114.77 Jul 1 20:39:02 nandi sshd[13748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.114.77 Jul 1 20:39:04 nandi sshd[13748]: Failed password for invalid user owen from 51.68.114.77 port 34143 ssh2 Jul 1 20:39:04 nandi sshd[13748]: Received disconnect from 51.68.114.77: 11: Bye Bye [preauth] Jul 1 20:40:57 nandi sshd[15381]: Address 51.68.114.77 maps to ip-51-68-114.eu, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 1 20:40:57 nandi sshd[15381]: Invalid user drupal from 51.68.114.77 Jul 1 20:40:57 nandi sshd[15381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.114.77 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip |
2019-07-03 22:54:46 |
| 221.226.90.126 | attackspam | Jul 3 15:26:19 host sshd\[64736\]: Invalid user exim from 221.226.90.126 port 43014 Jul 3 15:26:19 host sshd\[64736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.90.126 ... |
2019-07-03 23:12:51 |
| 207.180.222.254 | attackbots | Jul 3 14:51:06 keyhelp sshd[2064]: Invalid user temp from 207.180.222.254 Jul 3 14:51:06 keyhelp sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.180.222.254 Jul 3 14:51:08 keyhelp sshd[2064]: Failed password for invalid user temp from 207.180.222.254 port 56076 ssh2 Jul 3 14:51:08 keyhelp sshd[2064]: Received disconnect from 207.180.222.254 port 56076:11: Bye Bye [preauth] Jul 3 14:51:08 keyhelp sshd[2064]: Disconnected from 207.180.222.254 port 56076 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=207.180.222.254 |
2019-07-03 23:18:57 |
| 179.99.9.31 | attackbots | " " |
2019-07-03 23:37:06 |
| 180.166.114.14 | attackspambots | 2019-07-03T13:25:20.984493abusebot-4.cloudsearch.cf sshd\[5675\]: Invalid user space from 180.166.114.14 port 55238 |
2019-07-03 23:41:14 |
| 185.66.108.39 | attack | Jul 2 17:55:21 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 185.66.108.39 port 49394 ssh2 (target: 158.69.100.149:22, password: 1313) Jul 2 17:55:22 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 185.66.108.39 port 49394 ssh2 (target: 158.69.100.149:22, password: 131313) Jul 2 17:55:23 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 185.66.108.39 port 49394 ssh2 (target: 158.69.100.149:22, password: 1316) Jul 2 17:55:23 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 185.66.108.39 port 49394 ssh2 (target: 158.69.100.149:22, password: 1332) Jul 2 17:55:24 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 185.66.108.39 port 49394 ssh2 (target: 158.69.100.149:22, password: 13579) Jul 2 17:55:25 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 185.66.108.39 port 49394 ssh2 (target: 158.69.100.149:22, password: 1412) Jul 2 17:55:26 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 185.66........ ------------------------------ |
2019-07-03 23:32:42 |
| 119.237.59.41 | attack | Jul 3 15:25:56 mail kernel: \[1205899.160958\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=119.237.59.41 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=20633 DF PROTO=TCP SPT=43805 DPT=9527 WINDOW=14600 RES=0x00 SYN URGP=0 Jul 3 15:25:57 mail kernel: \[1205900.156961\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=119.237.59.41 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=20634 DF PROTO=TCP SPT=43805 DPT=9527 WINDOW=14600 RES=0x00 SYN URGP=0 Jul 3 15:25:59 mail kernel: \[1205902.155695\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=119.237.59.41 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=20635 DF PROTO=TCP SPT=43805 DPT=9527 WINDOW=14600 RES=0x00 SYN URGP=0 |
2019-07-03 23:23:04 |