城市(city): Dubai
省份(region): Dubayy
国家(country): United Arab Emirates
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.206.157.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.206.157.119. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030500 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 05 20:18:16 CST 2025
;; MSG SIZE rcvd: 107
Host 119.157.206.94.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 119.157.206.94.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
49.234.207.226 | attack | Jun 7 08:38:17 ny01 sshd[8900]: Failed password for root from 49.234.207.226 port 60594 ssh2 Jun 7 08:41:09 ny01 sshd[9229]: Failed password for root from 49.234.207.226 port 44366 ssh2 |
2020-06-07 20:56:41 |
106.243.2.244 | attackbots | Jun 7 14:01:59 v22019038103785759 sshd\[5177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.2.244 user=root Jun 7 14:02:00 v22019038103785759 sshd\[5177\]: Failed password for root from 106.243.2.244 port 47136 ssh2 Jun 7 14:05:47 v22019038103785759 sshd\[5429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.2.244 user=root Jun 7 14:05:49 v22019038103785759 sshd\[5429\]: Failed password for root from 106.243.2.244 port 50152 ssh2 Jun 7 14:09:39 v22019038103785759 sshd\[5710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.2.244 user=root ... |
2020-06-07 20:33:07 |
167.114.152.249 | attack | Lines containing failures of 167.114.152.249 Jun 4 12:08:11 zabbix sshd[54270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.249 user=r.r Jun 4 12:08:12 zabbix sshd[54270]: Failed password for r.r from 167.114.152.249 port 57302 ssh2 Jun 4 12:08:12 zabbix sshd[54270]: Received disconnect from 167.114.152.249 port 57302:11: Bye Bye [preauth] Jun 4 12:08:12 zabbix sshd[54270]: Disconnected from authenticating user r.r 167.114.152.249 port 57302 [preauth] Jun 4 12:19:16 zabbix sshd[55119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.249 user=r.r Jun 4 12:19:18 zabbix sshd[55119]: Failed password for r.r from 167.114.152.249 port 33472 ssh2 Jun 4 12:19:18 zabbix sshd[55119]: Received disconnect from 167.114.152.249 port 33472:11: Bye Bye [preauth] Jun 4 12:19:18 zabbix sshd[55119]: Disconnected from authenticating user r.r 167.114.152.249 port 33472 [preau........ ------------------------------ |
2020-06-07 20:25:51 |
111.229.50.131 | attack | Unauthorized SSH login attempts |
2020-06-07 21:00:38 |
49.88.112.113 | attackbotsspam | Jun 7 02:07:51 php1 sshd\[32613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Jun 7 02:07:52 php1 sshd\[32613\]: Failed password for root from 49.88.112.113 port 50702 ssh2 Jun 7 02:08:45 php1 sshd\[32671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Jun 7 02:08:46 php1 sshd\[32671\]: Failed password for root from 49.88.112.113 port 28278 ssh2 Jun 7 02:09:37 php1 sshd\[424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root |
2020-06-07 20:33:21 |
187.189.241.135 | attackbots | Jun 7 14:04:35 vps687878 sshd\[4378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.241.135 user=root Jun 7 14:04:37 vps687878 sshd\[4378\]: Failed password for root from 187.189.241.135 port 12594 ssh2 Jun 7 14:06:52 vps687878 sshd\[4724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.241.135 user=root Jun 7 14:06:54 vps687878 sshd\[4724\]: Failed password for root from 187.189.241.135 port 24381 ssh2 Jun 7 14:09:02 vps687878 sshd\[4827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.241.135 user=root ... |
2020-06-07 20:29:25 |
185.39.11.47 | attack | scans 13 times in preceeding hours on the ports (in chronological order) 35053 35028 35088 35051 35010 35098 35028 35045 35004 35031 35027 35053 35056 resulting in total of 69 scans from 185.39.8.0/22 block. |
2020-06-07 20:31:58 |
49.233.88.25 | attack | 2020-06-07T12:02:19.865166shield sshd\[6124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.88.25 user=root 2020-06-07T12:02:22.201865shield sshd\[6124\]: Failed password for root from 49.233.88.25 port 42590 ssh2 2020-06-07T12:06:08.692938shield sshd\[7532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.88.25 user=root 2020-06-07T12:06:10.798951shield sshd\[7532\]: Failed password for root from 49.233.88.25 port 54540 ssh2 2020-06-07T12:09:58.062985shield sshd\[9118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.88.25 user=root |
2020-06-07 20:19:26 |
134.175.56.12 | attackbotsspam | Jun 7 14:49:10 mail sshd[20298]: Failed password for root from 134.175.56.12 port 35416 ssh2 Jun 7 14:52:59 mail sshd[20736]: Failed password for root from 134.175.56.12 port 45128 ssh2 Jun 7 14:54:34 mail sshd[20946]: Failed password for root from 134.175.56.12 port 59516 ssh2 ... |
2020-06-07 20:58:29 |
106.51.80.198 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-06-07 20:32:16 |
115.238.97.2 | attackbotsspam | $f2bV_matches |
2020-06-07 20:57:44 |
45.237.28.229 | attack | $f2bV_matches |
2020-06-07 20:24:34 |
180.76.246.38 | attackspambots | Jun 7 15:25:42 pkdns2 sshd\[8096\]: Failed password for root from 180.76.246.38 port 39648 ssh2Jun 7 15:27:11 pkdns2 sshd\[8164\]: Failed password for root from 180.76.246.38 port 59964 ssh2Jun 7 15:28:43 pkdns2 sshd\[8221\]: Failed password for root from 180.76.246.38 port 52038 ssh2Jun 7 15:30:21 pkdns2 sshd\[8350\]: Failed password for root from 180.76.246.38 port 44166 ssh2Jun 7 15:31:55 pkdns2 sshd\[8416\]: Failed password for root from 180.76.246.38 port 36268 ssh2Jun 7 15:33:29 pkdns2 sshd\[8487\]: Failed password for root from 180.76.246.38 port 56598 ssh2 ... |
2020-06-07 20:56:00 |
41.33.169.196 | attackspam | 20/6/7@08:09:52: FAIL: Alarm-Network address from=41.33.169.196 ... |
2020-06-07 20:20:34 |
34.93.211.49 | attackspambots | Jun 7 14:40:15 vps639187 sshd\[24098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.211.49 user=root Jun 7 14:40:17 vps639187 sshd\[24098\]: Failed password for root from 34.93.211.49 port 41478 ssh2 Jun 7 14:44:02 vps639187 sshd\[24143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.211.49 user=root ... |
2020-06-07 20:47:28 |