城市(city): Guimarães
省份(region): Braga
国家(country): Portugal
运营商(isp): NOS
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.94.45.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10021
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;95.94.45.146. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:05:09 CST 2025
;; MSG SIZE rcvd: 105
146.45.94.95.in-addr.arpa domain name pointer a95-94-45-146.cpe.netcabo.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
146.45.94.95.in-addr.arpa name = a95-94-45-146.cpe.netcabo.pt.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 201.174.182.159 | attackbots | Aug 28 21:13:23 XXX sshd[42621]: Invalid user strenesse from 201.174.182.159 port 38966 |
2019-08-29 05:34:46 |
| 122.170.5.123 | attackbots | $f2bV_matches |
2019-08-29 05:29:05 |
| 37.230.116.97 | attack | Lines containing failures of 37.230.116.97 Aug 28 14:54:44 kopano sshd[11402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.230.116.97 user=r.r Aug 28 14:54:47 kopano sshd[11402]: Failed password for r.r from 37.230.116.97 port 46810 ssh2 Aug 28 14:54:47 kopano sshd[11402]: Received disconnect from 37.230.116.97 port 46810:11: Bye Bye [preauth] Aug 28 14:54:47 kopano sshd[11402]: Disconnected from authenticating user r.r 37.230.116.97 port 46810 [preauth] Aug 28 15:07:24 kopano sshd[11675]: Invalid user madonna from 37.230.116.97 port 55488 Aug 28 15:07:24 kopano sshd[11675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.230.116.97 Aug 28 15:07:26 kopano sshd[11675]: Failed password for invalid user madonna from 37.230.116.97 port 55488 ssh2 Aug 28 15:07:26 kopano sshd[11675]: Received disconnect from 37.230.116.97 port 55488:11: Bye Bye [preauth] Aug 28 15:07:26 kopano sshd[11675........ ------------------------------ |
2019-08-29 05:20:43 |
| 103.50.148.61 | attackspam | Aug 28 11:44:30 *** sshd[25231]: Failed password for invalid user willy from 103.50.148.61 port 51184 ssh2 Aug 28 11:55:49 *** sshd[25461]: Failed password for invalid user operatore from 103.50.148.61 port 51724 ssh2 Aug 28 12:00:53 *** sshd[25576]: Failed password for invalid user armando from 103.50.148.61 port 37380 ssh2 Aug 28 12:05:49 *** sshd[25721]: Failed password for invalid user odoo from 103.50.148.61 port 51268 ssh2 Aug 28 12:10:42 *** sshd[25863]: Failed password for invalid user myrhodesiaiscom from 103.50.148.61 port 36924 ssh2 Aug 28 12:20:49 *** sshd[26056]: Failed password for invalid user ht from 103.50.148.61 port 36476 ssh2 Aug 28 12:25:44 *** sshd[26216]: Failed password for invalid user dp from 103.50.148.61 port 50354 ssh2 Aug 28 12:30:35 *** sshd[26303]: Failed password for invalid user khelms from 103.50.148.61 port 36016 ssh2 Aug 28 12:35:36 *** sshd[26418]: Failed password for invalid user leon from 103.50.148.61 port 49914 ssh2 Aug 28 12:40:33 *** sshd[26608]: Failed password for |
2019-08-29 05:30:07 |
| 51.68.220.249 | attackspambots | web-1 [ssh] SSH Attack |
2019-08-29 05:07:22 |
| 144.217.243.216 | attackbots | Aug 28 10:55:26 auw2 sshd\[21128\]: Invalid user honey from 144.217.243.216 Aug 28 10:55:26 auw2 sshd\[21128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.ip-144-217-243.net Aug 28 10:55:28 auw2 sshd\[21128\]: Failed password for invalid user honey from 144.217.243.216 port 44512 ssh2 Aug 28 10:59:36 auw2 sshd\[21498\]: Invalid user er from 144.217.243.216 Aug 28 10:59:36 auw2 sshd\[21498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.ip-144-217-243.net |
2019-08-29 05:05:50 |
| 119.235.24.244 | attack | 2019-08-28T19:38:51.111035abusebot-8.cloudsearch.cf sshd\[7820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.24.244 user=root |
2019-08-29 05:16:05 |
| 106.52.202.144 | attackspam | Automatic report - Banned IP Access |
2019-08-29 05:40:43 |
| 122.15.65.70 | attackspam | Aug 28 22:08:50 dedicated sshd[16917]: Invalid user oracle from 122.15.65.70 port 61542 |
2019-08-29 05:35:17 |
| 106.248.41.245 | attackbots | Aug 28 19:43:17 XXX sshd[8061]: Invalid user testuser from 106.248.41.245 port 46684 |
2019-08-29 05:48:56 |
| 177.126.188.2 | attackspam | Aug 28 11:05:53 tdfoods sshd\[6239\]: Invalid user friends from 177.126.188.2 Aug 28 11:05:53 tdfoods sshd\[6239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.126.188.2 Aug 28 11:05:55 tdfoods sshd\[6239\]: Failed password for invalid user friends from 177.126.188.2 port 45439 ssh2 Aug 28 11:10:53 tdfoods sshd\[6799\]: Invalid user tmuser from 177.126.188.2 Aug 28 11:10:53 tdfoods sshd\[6799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.126.188.2 |
2019-08-29 05:16:29 |
| 203.177.19.123 | attackbotsspam | Aug 28 23:45:59 andromeda sshd\[20024\]: Invalid user zorin from 203.177.19.123 port 52171 Aug 28 23:45:59 andromeda sshd\[20024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.177.19.123 Aug 28 23:46:00 andromeda sshd\[20024\]: Failed password for invalid user zorin from 203.177.19.123 port 52171 ssh2 |
2019-08-29 05:47:56 |
| 79.137.4.24 | attackspambots | Aug 28 20:53:05 MK-Soft-VM6 sshd\[11797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.4.24 user=root Aug 28 20:53:08 MK-Soft-VM6 sshd\[11797\]: Failed password for root from 79.137.4.24 port 55140 ssh2 Aug 28 20:57:11 MK-Soft-VM6 sshd\[11839\]: Invalid user linux from 79.137.4.24 port 44230 ... |
2019-08-29 05:29:22 |
| 111.68.46.68 | attack | Aug 28 23:12:42 localhost sshd\[13010\]: Invalid user uranus from 111.68.46.68 port 51702 Aug 28 23:12:42 localhost sshd\[13010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.68.46.68 Aug 28 23:12:43 localhost sshd\[13010\]: Failed password for invalid user uranus from 111.68.46.68 port 51702 ssh2 |
2019-08-29 05:12:53 |
| 23.235.224.118 | attackspambots | SMB Server BruteForce Attack |
2019-08-29 05:37:51 |