城市(city): unknown
省份(region): unknown
国家(country): Uzbekistan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.158.56.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.158.56.59. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011200 1800 900 604800 86400
;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 00:12:58 CST 2025
;; MSG SIZE rcvd: 105
59.56.158.94.in-addr.arpa domain name pointer 59.cdn.comnet.uz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
59.56.158.94.in-addr.arpa name = 59.cdn.comnet.uz.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.25.44.66 | attackspam | Failed password for root from 118.25.44.66 port 53808 ssh2 Failed password for root from 118.25.44.66 port 33516 ssh2 |
2020-09-08 06:06:11 |
| 190.186.42.130 | attack | Sep 7 20:01:27 rocket sshd[21396]: Failed password for root from 190.186.42.130 port 8061 ssh2 Sep 7 20:03:31 rocket sshd[21572]: Failed password for root from 190.186.42.130 port 54516 ssh2 ... |
2020-09-08 06:28:59 |
| 41.190.153.35 | attackbots | Sep 7 20:22:09 srv-ubuntu-dev3 sshd[127121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.153.35 user=root Sep 7 20:22:11 srv-ubuntu-dev3 sshd[127121]: Failed password for root from 41.190.153.35 port 57054 ssh2 Sep 7 20:25:34 srv-ubuntu-dev3 sshd[127438]: Invalid user aclocal from 41.190.153.35 Sep 7 20:25:34 srv-ubuntu-dev3 sshd[127438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.153.35 Sep 7 20:25:34 srv-ubuntu-dev3 sshd[127438]: Invalid user aclocal from 41.190.153.35 Sep 7 20:25:35 srv-ubuntu-dev3 sshd[127438]: Failed password for invalid user aclocal from 41.190.153.35 port 46912 ssh2 Sep 7 20:29:00 srv-ubuntu-dev3 sshd[127809]: Invalid user admin from 41.190.153.35 Sep 7 20:29:00 srv-ubuntu-dev3 sshd[127809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.190.153.35 Sep 7 20:29:00 srv-ubuntu-dev3 sshd[127809]: Invalid user ad ... |
2020-09-08 06:22:49 |
| 77.228.97.56 | attackspam | Automatic report - Port Scan Attack |
2020-09-08 06:07:19 |
| 134.17.94.55 | attackbots | 2020-09-07T16:58:02.741746ionos.janbro.de sshd[60568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.55 user=root 2020-09-07T16:58:04.680077ionos.janbro.de sshd[60568]: Failed password for root from 134.17.94.55 port 9716 ssh2 2020-09-07T17:01:51.929099ionos.janbro.de sshd[60591]: Invalid user controller from 134.17.94.55 port 9717 2020-09-07T17:01:51.938157ionos.janbro.de sshd[60591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.55 2020-09-07T17:01:51.929099ionos.janbro.de sshd[60591]: Invalid user controller from 134.17.94.55 port 9717 2020-09-07T17:01:53.981955ionos.janbro.de sshd[60591]: Failed password for invalid user controller from 134.17.94.55 port 9717 ssh2 2020-09-07T17:05:43.945612ionos.janbro.de sshd[60622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.55 user=root 2020-09-07T17:05:45.501882ionos.janbro.de sshd[6062 ... |
2020-09-08 05:58:25 |
| 98.146.212.146 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-07T16:43:59Z and 2020-09-07T16:53:29Z |
2020-09-08 06:27:33 |
| 102.36.164.141 | attack | Sep 7 13:25:24 NPSTNNYC01T sshd[32534]: Failed password for root from 102.36.164.141 port 36468 ssh2 Sep 7 13:29:39 NPSTNNYC01T sshd[597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.36.164.141 Sep 7 13:29:42 NPSTNNYC01T sshd[597]: Failed password for invalid user admin from 102.36.164.141 port 34782 ssh2 ... |
2020-09-08 06:06:54 |
| 195.122.226.164 | attackspam | Sep 7 23:30:44 server sshd[4802]: Failed password for invalid user sysman from 195.122.226.164 port 51999 ssh2 Sep 7 23:34:35 server sshd[10071]: Failed password for root from 195.122.226.164 port 43096 ssh2 Sep 7 23:38:42 server sshd[15530]: Failed password for root from 195.122.226.164 port 40129 ssh2 |
2020-09-08 06:00:00 |
| 192.241.235.210 | attack | /wp-load.php?wp-blog-header=1&daksldlkdsadas=1 |
2020-09-08 05:56:37 |
| 213.158.10.101 | attackbotsspam | Sep 7 20:01:03 plg sshd[8747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.158.10.101 Sep 7 20:01:05 plg sshd[8747]: Failed password for invalid user user from 213.158.10.101 port 38926 ssh2 Sep 7 20:02:52 plg sshd[8760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.158.10.101 user=root Sep 7 20:02:54 plg sshd[8760]: Failed password for invalid user root from 213.158.10.101 port 52571 ssh2 Sep 7 20:04:38 plg sshd[8772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.158.10.101 user=root Sep 7 20:04:40 plg sshd[8772]: Failed password for invalid user root from 213.158.10.101 port 37976 ssh2 ... |
2020-09-08 06:25:13 |
| 97.74.24.214 | attackspambots | Automatic report - XMLRPC Attack |
2020-09-08 06:30:39 |
| 185.139.137.34 | attackbotsspam | Automatic report - Port Scan Attack |
2020-09-08 06:21:11 |
| 218.92.0.145 | attackbots | Failed password for root from 218.92.0.145 port 39483 ssh2 Failed password for root from 218.92.0.145 port 39483 ssh2 Failed password for root from 218.92.0.145 port 39483 ssh2 Failed password for root from 218.92.0.145 port 39483 ssh2 |
2020-09-08 06:10:41 |
| 188.165.223.214 | attack | /wp-content/plugins/wp-file-manager/readme.txt |
2020-09-08 05:57:08 |
| 34.82.217.165 | attackbotsspam | xmlrpc attack |
2020-09-08 06:20:24 |