城市(city): unknown
省份(region): unknown
国家(country): Austria
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.136.19.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.136.19.127. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 21:29:01 CST 2025
;; MSG SIZE rcvd: 106
127.19.136.94.in-addr.arpa domain name pointer bcast.kratschmann.2500.kapper.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
127.19.136.94.in-addr.arpa name = bcast.kratschmann.2500.kapper.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.68.211.235 | attackspam | Jun 9 18:25:35 ajax sshd[26741]: Failed password for root from 188.68.211.235 port 33202 ssh2 |
2020-06-10 01:38:02 |
| 167.172.207.89 | attackbots | Jun 9 19:07:43 inter-technics sshd[28234]: Invalid user test from 167.172.207.89 port 56364 Jun 9 19:07:43 inter-technics sshd[28234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.207.89 Jun 9 19:07:43 inter-technics sshd[28234]: Invalid user test from 167.172.207.89 port 56364 Jun 9 19:07:45 inter-technics sshd[28234]: Failed password for invalid user test from 167.172.207.89 port 56364 ssh2 Jun 9 19:11:08 inter-technics sshd[28546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.207.89 user=root Jun 9 19:11:10 inter-technics sshd[28546]: Failed password for root from 167.172.207.89 port 58264 ssh2 ... |
2020-06-10 01:49:02 |
| 81.169.185.148 | attackbots | spam |
2020-06-10 01:28:24 |
| 171.235.186.65 | attackspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-06-10 02:00:04 |
| 106.54.202.131 | attack | Jun 9 17:51:13 root sshd[26782]: Invalid user myv from 106.54.202.131 ... |
2020-06-10 01:49:35 |
| 1.246.222.36 | attackspambots | Firewall Dropped Connection |
2020-06-10 01:50:44 |
| 115.79.28.118 | attack | Port scan denied |
2020-06-10 01:39:21 |
| 106.75.133.250 | attackbots | Jun 9 18:35:14 roki-contabo sshd\[14460\]: Invalid user gyy from 106.75.133.250 Jun 9 18:35:14 roki-contabo sshd\[14460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.133.250 Jun 9 18:35:16 roki-contabo sshd\[14460\]: Failed password for invalid user gyy from 106.75.133.250 port 54457 ssh2 Jun 9 18:45:10 roki-contabo sshd\[14820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.133.250 user=root Jun 9 18:45:12 roki-contabo sshd\[14820\]: Failed password for root from 106.75.133.250 port 42937 ssh2 ... |
2020-06-10 01:35:19 |
| 119.45.5.237 | attackbots | Jun 9 12:59:05 gestao sshd[26529]: Failed password for root from 119.45.5.237 port 39120 ssh2 Jun 9 13:03:44 gestao sshd[26548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.5.237 Jun 9 13:03:46 gestao sshd[26548]: Failed password for invalid user rhdqnkr from 119.45.5.237 port 60164 ssh2 ... |
2020-06-10 01:41:08 |
| 192.241.128.214 | attackspam | Failed password for invalid user gittest from 192.241.128.214 port 56143 ssh2 |
2020-06-10 01:51:32 |
| 104.37.189.85 | attack | Lines containing failures of 104.37.189.85 Jun 9 06:55:14 shared12 sshd[16571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.37.189.85 user=r.r Jun 9 06:55:16 shared12 sshd[16571]: Failed password for r.r from 104.37.189.85 port 43770 ssh2 Jun 9 06:55:16 shared12 sshd[16571]: Received disconnect from 104.37.189.85 port 43770:11: Bye Bye [preauth] Jun 9 06:55:16 shared12 sshd[16571]: Disconnected from authenticating user r.r 104.37.189.85 port 43770 [preauth] Jun 9 09:11:47 shared12 sshd[1549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.37.189.85 user=r.r Jun 9 09:11:48 shared12 sshd[1549]: Failed password for r.r from 104.37.189.85 port 44054 ssh2 Jun 9 09:11:48 shared12 sshd[1549]: Received disconnect from 104.37.189.85 port 44054:11: Bye Bye [preauth] Jun 9 09:11:48 shared12 sshd[1549]: Disconnected from authenticating user r.r 104.37.189.85 port 44054 [preauth] Ju........ ------------------------------ |
2020-06-10 01:54:03 |
| 185.240.65.251 | attack | Jun 9 11:57:19 server1 sshd\[27268\]: Invalid user castis from 185.240.65.251 Jun 9 11:57:19 server1 sshd\[27268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.240.65.251 Jun 9 11:57:21 server1 sshd\[27268\]: Failed password for invalid user castis from 185.240.65.251 port 6664 ssh2 Jun 9 12:06:06 server1 sshd\[30215\]: Invalid user castis from 185.240.65.251 Jun 9 12:06:06 server1 sshd\[30215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.240.65.251 ... |
2020-06-10 02:06:17 |
| 76.214.112.45 | attackspambots | Jun 9 16:57:51 |
2020-06-10 01:43:47 |
| 120.92.114.71 | attackspambots | Jun 9 20:08:26 webhost01 sshd[18338]: Failed password for root from 120.92.114.71 port 49750 ssh2 ... |
2020-06-10 01:39:43 |
| 182.74.25.246 | attackbots | 2020-06-09T14:37:50.068226homeassistant sshd[12788]: Invalid user jewel from 182.74.25.246 port 1902 2020-06-09T14:37:50.081102homeassistant sshd[12788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246 ... |
2020-06-10 01:52:00 |