城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.139.75.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54765
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;100.139.75.139. IN A
;; AUTHORITY SECTION:
. 252 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020011201 1800 900 604800 86400
;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 13 09:31:45 CST 2020
;; MSG SIZE rcvd: 118
Host 139.75.139.100.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.75.139.100.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.75.170.13 | attackspam | Aug 28 15:50:54 sachi sshd\[17590\]: Invalid user ubuntu from 51.75.170.13 Aug 28 15:50:54 sachi sshd\[17590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.ip-51-75-170.eu Aug 28 15:50:56 sachi sshd\[17590\]: Failed password for invalid user ubuntu from 51.75.170.13 port 41602 ssh2 Aug 28 15:54:46 sachi sshd\[17909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.ip-51-75-170.eu user=root Aug 28 15:54:48 sachi sshd\[17909\]: Failed password for root from 51.75.170.13 port 58230 ssh2 |
2019-08-29 10:01:30 |
| 43.226.40.41 | attackspambots | Aug 29 03:52:19 vps647732 sshd[13814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.40.41 Aug 29 03:52:21 vps647732 sshd[13814]: Failed password for invalid user password from 43.226.40.41 port 49436 ssh2 ... |
2019-08-29 09:57:34 |
| 183.131.83.73 | attack | Aug 28 15:42:05 kapalua sshd\[9888\]: Invalid user abc from 183.131.83.73 Aug 28 15:42:05 kapalua sshd\[9888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.83.73 Aug 28 15:42:06 kapalua sshd\[9888\]: Failed password for invalid user abc from 183.131.83.73 port 59019 ssh2 Aug 28 15:47:01 kapalua sshd\[10394\]: Invalid user mcadmin from 183.131.83.73 Aug 28 15:47:01 kapalua sshd\[10394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.131.83.73 |
2019-08-29 09:54:00 |
| 51.68.198.119 | attackbots | Aug 28 21:01:20 ny01 sshd[29037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.119 Aug 28 21:01:22 ny01 sshd[29037]: Failed password for invalid user pico123 from 51.68.198.119 port 34126 ssh2 Aug 28 21:05:48 ny01 sshd[29772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.198.119 |
2019-08-29 09:50:45 |
| 178.128.79.169 | attackspambots | Aug 29 03:51:35 andromeda sshd\[53411\]: Invalid user user from 178.128.79.169 port 36074 Aug 29 03:51:35 andromeda sshd\[53411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.79.169 Aug 29 03:51:36 andromeda sshd\[53411\]: Failed password for invalid user user from 178.128.79.169 port 36074 ssh2 |
2019-08-29 10:09:23 |
| 106.52.126.205 | attackspambots | 2019-08-29T01:24:56.107482abusebot-7.cloudsearch.cf sshd\[22073\]: Invalid user user1 from 106.52.126.205 port 59967 |
2019-08-29 10:22:56 |
| 36.156.24.43 | attack | Aug 29 08:52:53 itv-usvr-02 sshd[4244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.24.43 user=root |
2019-08-29 09:54:45 |
| 84.63.209.212 | attack | Aug 29 05:12:38 yabzik sshd[15350]: Failed password for root from 84.63.209.212 port 39982 ssh2 Aug 29 05:21:52 yabzik sshd[18410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.63.209.212 Aug 29 05:21:54 yabzik sshd[18410]: Failed password for invalid user ftp_id from 84.63.209.212 port 34191 ssh2 |
2019-08-29 10:28:40 |
| 212.83.149.238 | attackspam | Aug 28 16:00:57 xb3 sshd[31556]: reveeclipse mapping checking getaddrinfo for 212-83-149-238.rev.poneytelecom.eu [212.83.149.238] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 28 16:00:59 xb3 sshd[31556]: Failed password for invalid user jswd from 212.83.149.238 port 39944 ssh2 Aug 28 16:00:59 xb3 sshd[31556]: Received disconnect from 212.83.149.238: 11: Bye Bye [preauth] Aug 28 16:12:34 xb3 sshd[4345]: reveeclipse mapping checking getaddrinfo for 212-83-149-238.rev.poneytelecom.eu [212.83.149.238] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 28 16:12:36 xb3 sshd[4345]: Failed password for invalid user saas from 212.83.149.238 port 49210 ssh2 Aug 28 16:12:36 xb3 sshd[4345]: Received disconnect from 212.83.149.238: 11: Bye Bye [preauth] Aug 28 16:16:36 xb3 sshd[2181]: reveeclipse mapping checking getaddrinfo for 212-83-149-238.rev.poneytelecom.eu [212.83.149.238] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 28 16:16:37 xb3 sshd[2181]: Failed password for invalid user helpdesk from 212.8........ ------------------------------- |
2019-08-29 09:59:18 |
| 182.135.2.172 | attackbotsspam | Aug 28 20:52:56 debian sshd\[26283\]: Invalid user master from 182.135.2.172 port 40368 Aug 28 20:52:56 debian sshd\[26283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.135.2.172 Aug 28 20:52:58 debian sshd\[26283\]: Failed password for invalid user master from 182.135.2.172 port 40368 ssh2 ... |
2019-08-29 10:10:22 |
| 124.93.18.202 | attackbotsspam | Aug 29 03:47:08 vps691689 sshd[21060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.93.18.202 Aug 29 03:47:10 vps691689 sshd[21060]: Failed password for invalid user apache from 124.93.18.202 port 13041 ssh2 Aug 29 03:52:51 vps691689 sshd[21255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.93.18.202 ... |
2019-08-29 10:29:40 |
| 122.116.128.232 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-28 22:22:51,010 INFO [amun_request_handler] PortScan Detected on Port: 445 (122.116.128.232) |
2019-08-29 10:19:11 |
| 221.150.17.93 | attackbots | 2019-08-22T04:53:04.014233wiz-ks3 sshd[31149]: Invalid user shit from 221.150.17.93 port 41650 2019-08-22T04:53:04.016358wiz-ks3 sshd[31149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.150.17.93 2019-08-22T04:53:04.014233wiz-ks3 sshd[31149]: Invalid user shit from 221.150.17.93 port 41650 2019-08-22T04:53:06.462304wiz-ks3 sshd[31149]: Failed password for invalid user shit from 221.150.17.93 port 41650 ssh2 2019-08-22T04:58:55.918734wiz-ks3 sshd[31190]: Invalid user admin from 221.150.17.93 port 56946 2019-08-22T04:58:55.920798wiz-ks3 sshd[31190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.150.17.93 2019-08-22T04:58:55.918734wiz-ks3 sshd[31190]: Invalid user admin from 221.150.17.93 port 56946 2019-08-22T04:58:57.885172wiz-ks3 sshd[31190]: Failed password for invalid user admin from 221.150.17.93 port 56946 ssh2 2019-08-22T05:05:17.053704wiz-ks3 sshd[31256]: pam_unix(sshd:auth): authentication failure; logname= ui |
2019-08-29 10:18:16 |
| 180.100.214.87 | attackspambots | Aug 28 16:10:01 hiderm sshd\[23094\]: Invalid user myer from 180.100.214.87 Aug 28 16:10:01 hiderm sshd\[23094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.100.214.87 Aug 28 16:10:03 hiderm sshd\[23094\]: Failed password for invalid user myer from 180.100.214.87 port 42954 ssh2 Aug 28 16:13:17 hiderm sshd\[23377\]: Invalid user git from 180.100.214.87 Aug 28 16:13:17 hiderm sshd\[23377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.100.214.87 |
2019-08-29 10:13:22 |
| 108.54.164.213 | attackbots | (sshd) Failed SSH login from 108.54.164.213 (US/United States/New York/Queens Village/pool-108-54-164-213.nycmny.fios.verizon.net/[AS701 MCI Communications Services, Inc. d/b/a Verizon Business]): 1 in the last 3600 secs |
2019-08-29 09:54:18 |