城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.14.0.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;100.14.0.139. IN A
;; AUTHORITY SECTION:
. 176 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 20:30:58 CST 2022
;; MSG SIZE rcvd: 105
139.0.14.100.in-addr.arpa domain name pointer pool-100-14-0-139.phlapa.fios.verizon.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.0.14.100.in-addr.arpa name = pool-100-14-0-139.phlapa.fios.verizon.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.98.40.135 | attack | 2019-09-06T23:47:34.865940abusebot-6.cloudsearch.cf sshd\[25732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.135 user=root |
2019-09-07 07:56:44 |
| 146.196.63.178 | attackbotsspam | namecheap spam |
2019-09-07 07:54:13 |
| 193.32.163.123 | attackbotsspam | 2019-09-06T21:45:31.846252abusebot-3.cloudsearch.cf sshd\[29595\]: Invalid user admin from 193.32.163.123 port 36049 |
2019-09-07 07:29:18 |
| 189.223.203.245 | attackspam | Telnet Server BruteForce Attack |
2019-09-07 08:00:16 |
| 122.117.73.48 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-06 22:11:45,133 INFO [shellcode_manager] (122.117.73.48) no match, writing hexdump (9bc76d8f07c88cc297dad74ea22d93f9 :1884622) - MS17010 (EternalBlue) |
2019-09-07 07:40:14 |
| 221.162.255.74 | attack | Sep 7 01:18:39 [host] sshd[26775]: Invalid user japca from 221.162.255.74 Sep 7 01:18:39 [host] sshd[26775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.74 Sep 7 01:18:41 [host] sshd[26775]: Failed password for invalid user japca from 221.162.255.74 port 44178 ssh2 |
2019-09-07 07:28:29 |
| 69.147.154.42 | attackspam | Port Scan: TCP/445 |
2019-09-07 07:37:51 |
| 109.117.117.86 | attackbotsspam | Automatic report - Port Scan Attack |
2019-09-07 07:34:51 |
| 95.111.59.210 | attackspam | $f2bV_matches |
2019-09-07 08:06:00 |
| 58.152.27.8 | attackspam | firewall-block, port(s): 23/tcp |
2019-09-07 07:39:14 |
| 45.55.131.104 | attackbots | Sep 6 21:01:33 microserver sshd[18216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.131.104 user=root Sep 6 21:01:36 microserver sshd[18216]: Failed password for root from 45.55.131.104 port 34665 ssh2 Sep 6 21:06:15 microserver sshd[18847]: Invalid user 83 from 45.55.131.104 port 59086 Sep 6 21:06:15 microserver sshd[18847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.131.104 Sep 6 21:06:17 microserver sshd[18847]: Failed password for invalid user 83 from 45.55.131.104 port 59086 ssh2 Sep 6 21:20:01 microserver sshd[20349]: Invalid user test@123 from 45.55.131.104 port 47321 Sep 6 21:20:01 microserver sshd[20349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.131.104 Sep 6 21:20:03 microserver sshd[20349]: Failed password for invalid user test@123 from 45.55.131.104 port 47321 ssh2 Sep 6 21:24:37 microserver sshd[20967]: Invalid user password from 45.55 |
2019-09-07 08:07:06 |
| 49.234.86.229 | attackspambots | Sep 6 17:46:23 meumeu sshd[6898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.86.229 Sep 6 17:46:25 meumeu sshd[6898]: Failed password for invalid user password123 from 49.234.86.229 port 35740 ssh2 Sep 6 17:50:18 meumeu sshd[7421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.86.229 ... |
2019-09-07 07:59:53 |
| 165.22.6.195 | attackspambots | Sep 6 04:29:52 php1 sshd\[5670\]: Invalid user amsftp from 165.22.6.195 Sep 6 04:29:52 php1 sshd\[5670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.6.195 Sep 6 04:29:54 php1 sshd\[5670\]: Failed password for invalid user amsftp from 165.22.6.195 port 56394 ssh2 Sep 6 04:34:15 php1 sshd\[6030\]: Invalid user mc from 165.22.6.195 Sep 6 04:34:15 php1 sshd\[6030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.6.195 |
2019-09-07 07:53:28 |
| 103.9.90.3 | attackspam | Unauthorized connection attempt from IP address 103.9.90.3 on Port 445(SMB) |
2019-09-07 07:42:28 |
| 128.199.138.31 | attackspambots | Sep 6 05:48:09 php2 sshd\[29335\]: Invalid user adminuser from 128.199.138.31 Sep 6 05:48:09 php2 sshd\[29335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.31 Sep 6 05:48:11 php2 sshd\[29335\]: Failed password for invalid user adminuser from 128.199.138.31 port 50547 ssh2 Sep 6 05:53:13 php2 sshd\[30098\]: Invalid user its from 128.199.138.31 Sep 6 05:53:13 php2 sshd\[30098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.31 |
2019-09-07 07:44:16 |