城市(city): Taichung
省份(region): Taichung
国家(country): Taiwan, China
运营商(isp): Ambit Microsystems
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.137.160.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;101.137.160.239. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031201 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 10:33:54 CST 2025
;; MSG SIZE rcvd: 108
239.160.137.101.in-addr.arpa domain name pointer 101-137-160-239.mobile.dynamic.aptg.com.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
239.160.137.101.in-addr.arpa name = 101-137-160-239.mobile.dynamic.aptg.com.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.210.170.39 | attackbotsspam | Dec 13 20:56:55 srv206 sshd[326]: Invalid user helmersen from 103.210.170.39 ... |
2019-12-14 04:05:35 |
| 159.203.13.171 | attack | Dec 13 21:15:52 sd-53420 sshd\[18161\]: Invalid user qsvr from 159.203.13.171 Dec 13 21:15:52 sd-53420 sshd\[18161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.13.171 Dec 13 21:15:55 sd-53420 sshd\[18161\]: Failed password for invalid user qsvr from 159.203.13.171 port 38100 ssh2 Dec 13 21:20:58 sd-53420 sshd\[18546\]: Invalid user shauhrong from 159.203.13.171 Dec 13 21:20:58 sd-53420 sshd\[18546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.13.171 ... |
2019-12-14 04:26:19 |
| 201.48.206.146 | attackspam | Dec 13 19:05:52 ns3042688 sshd\[29782\]: Invalid user nummedal from 201.48.206.146 Dec 13 19:05:52 ns3042688 sshd\[29782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.206.146 Dec 13 19:05:54 ns3042688 sshd\[29782\]: Failed password for invalid user nummedal from 201.48.206.146 port 43077 ssh2 Dec 13 19:14:41 ns3042688 sshd\[31847\]: Invalid user schillinger from 201.48.206.146 Dec 13 19:14:41 ns3042688 sshd\[31847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.206.146 ... |
2019-12-14 04:20:48 |
| 118.24.89.243 | attack | k+ssh-bruteforce |
2019-12-14 04:11:27 |
| 159.203.59.38 | attackspam | Invalid user englisch from 159.203.59.38 port 49200 |
2019-12-14 04:13:57 |
| 190.6.93.174 | attack | 12/13/2019-16:55:37.813829 190.6.93.174 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-12-14 04:37:41 |
| 138.197.171.149 | attackspam | Dec 13 20:49:57 sd-53420 sshd\[16392\]: Invalid user comtech from 138.197.171.149 Dec 13 20:49:57 sd-53420 sshd\[16392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.171.149 Dec 13 20:49:59 sd-53420 sshd\[16392\]: Failed password for invalid user comtech from 138.197.171.149 port 47886 ssh2 Dec 13 20:57:17 sd-53420 sshd\[16843\]: Invalid user invasion from 138.197.171.149 Dec 13 20:57:17 sd-53420 sshd\[16843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.171.149 ... |
2019-12-14 04:08:47 |
| 169.197.108.197 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-14 04:25:49 |
| 152.136.96.32 | attackspambots | 2019-12-13T19:51:24.230635abusebot.cloudsearch.cf sshd\[8841\]: Invalid user faubert from 152.136.96.32 port 51522 2019-12-13T19:51:24.236805abusebot.cloudsearch.cf sshd\[8841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.96.32 2019-12-13T19:51:26.633015abusebot.cloudsearch.cf sshd\[8841\]: Failed password for invalid user faubert from 152.136.96.32 port 51522 ssh2 2019-12-13T19:58:02.224511abusebot.cloudsearch.cf sshd\[8911\]: Invalid user baisch from 152.136.96.32 port 59520 |
2019-12-14 04:10:57 |
| 111.231.108.97 | attackspam | Dec 13 19:22:25 lnxweb62 sshd[19679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.108.97 |
2019-12-14 04:38:00 |
| 169.197.108.204 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-14 04:13:24 |
| 202.151.30.141 | attackspambots | Dec 13 08:54:07 home sshd[12901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.151.30.141 user=root Dec 13 08:54:09 home sshd[12901]: Failed password for root from 202.151.30.141 port 52808 ssh2 Dec 13 09:08:59 home sshd[12976]: Invalid user damita from 202.151.30.141 port 39050 Dec 13 09:08:59 home sshd[12976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.151.30.141 Dec 13 09:08:59 home sshd[12976]: Invalid user damita from 202.151.30.141 port 39050 Dec 13 09:09:02 home sshd[12976]: Failed password for invalid user damita from 202.151.30.141 port 39050 ssh2 Dec 13 09:17:38 home sshd[13019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.151.30.141 user=root Dec 13 09:17:40 home sshd[13019]: Failed password for root from 202.151.30.141 port 44374 ssh2 Dec 13 09:25:05 home sshd[13060]: Invalid user home from 202.151.30.141 port 49642 Dec 13 09:25:05 home sshd[13060]: pam_ |
2019-12-14 04:20:34 |
| 180.76.159.35 | attackspambots | Invalid user hung from 180.76.159.35 port 43824 |
2019-12-14 04:13:10 |
| 159.138.119.7 | attackbotsspam | fraudulent SSH attempt |
2019-12-14 04:28:28 |
| 159.203.82.104 | attackspambots | leo_www |
2019-12-14 04:08:34 |