城市(city): unknown
省份(region): unknown
国家(country): Taiwan (Province of China)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.139.160.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3625
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;101.139.160.47. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 19:30:03 CST 2025
;; MSG SIZE rcvd: 107
47.160.139.101.in-addr.arpa domain name pointer 101-139-160-47.mobile.dynamic.aptg.com.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
47.160.139.101.in-addr.arpa name = 101-139-160-47.mobile.dynamic.aptg.com.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 117.84.46.250 | attackspam | FTP Brute Force |
2019-12-06 20:42:47 |
| 14.252.249.74 | attackbotsspam | Brute force attempt |
2019-12-06 20:46:44 |
| 181.229.86.194 | attackspambots | Lines containing failures of 181.229.86.194 Dec 6 04:21:04 nextcloud sshd[27869]: Invalid user web from 181.229.86.194 port 55117 Dec 6 04:21:04 nextcloud sshd[27869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.229.86.194 Dec 6 04:21:06 nextcloud sshd[27869]: Failed password for invalid user web from 181.229.86.194 port 55117 ssh2 Dec 6 04:21:06 nextcloud sshd[27869]: Received disconnect from 181.229.86.194 port 55117:11: Bye Bye [preauth] Dec 6 04:21:06 nextcloud sshd[27869]: Disconnected from invalid user web 181.229.86.194 port 55117 [preauth] Dec 6 04:31:50 nextcloud sshd[29894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.229.86.194 user=r.r Dec 6 04:31:52 nextcloud sshd[29894]: Failed password for r.r from 181.229.86.194 port 43233 ssh2 Dec 6 04:31:52 nextcloud sshd[29894]: Received disconnect from 181.229.86.194 port 43233:11: Bye Bye [preauth] Dec 6 04:31:52........ ------------------------------ |
2019-12-06 20:35:36 |
| 124.30.44.214 | attackspam | fail2ban |
2019-12-06 21:06:17 |
| 123.207.88.97 | attackspambots | Brute-force attempt banned |
2019-12-06 20:29:25 |
| 148.70.18.216 | attack | 2019-12-06T13:26:45.307150scmdmz1 sshd\[24179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.216 user=root 2019-12-06T13:26:47.966592scmdmz1 sshd\[24179\]: Failed password for root from 148.70.18.216 port 57742 ssh2 2019-12-06T13:34:25.962852scmdmz1 sshd\[25343\]: Invalid user zonneveld from 148.70.18.216 port 38544 ... |
2019-12-06 20:43:57 |
| 134.73.51.117 | attackspambots | Dec 6 07:08:40 h2421860 postfix/postscreen[9946]: CONNECT from [134.73.51.117]:42002 to [85.214.119.52]:25 Dec 6 07:08:40 h2421860 postfix/dnsblog[9949]: addr 134.73.51.117 listed by domain b.barracudacentral.org as 127.0.0.2 Dec 6 07:08:40 h2421860 postfix/dnsblog[9951]: addr 134.73.51.117 listed by domain Unknown.trblspam.com as 185.53.179.7 Dec 6 07:08:46 h2421860 postfix/postscreen[9946]: DNSBL rank 3 for [134.73.51.117]:42002 Dec x@x Dec 6 07:08:46 h2421860 postfix/postscreen[9946]: DISCONNECT [134.73.51.117]:42002 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=134.73.51.117 |
2019-12-06 21:01:16 |
| 192.241.143.162 | attack | Dec 5 23:22:30 kapalua sshd\[27667\]: Invalid user stever from 192.241.143.162 Dec 5 23:22:30 kapalua sshd\[27667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.143.162 Dec 5 23:22:32 kapalua sshd\[27667\]: Failed password for invalid user stever from 192.241.143.162 port 57810 ssh2 Dec 5 23:28:11 kapalua sshd\[28307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.143.162 user=root Dec 5 23:28:12 kapalua sshd\[28307\]: Failed password for root from 192.241.143.162 port 38502 ssh2 |
2019-12-06 21:13:12 |
| 113.96.60.18 | attack | Dec 6 03:13:10 server sshd\[19629\]: Failed password for invalid user hung from 113.96.60.18 port 56001 ssh2 Dec 6 09:15:27 server sshd\[23444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.96.60.18 user=root Dec 6 09:15:29 server sshd\[23444\]: Failed password for root from 113.96.60.18 port 57526 ssh2 Dec 6 09:23:57 server sshd\[25770\]: Invalid user jboss from 113.96.60.18 Dec 6 09:23:57 server sshd\[25770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.96.60.18 ... |
2019-12-06 20:52:47 |
| 202.155.203.118 | attackspam | Dec 6 07:24:08 andromeda sshd\[20284\]: Invalid user admin from 202.155.203.118 port 33770 Dec 6 07:24:08 andromeda sshd\[20284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.155.203.118 Dec 6 07:24:11 andromeda sshd\[20284\]: Failed password for invalid user admin from 202.155.203.118 port 33770 ssh2 |
2019-12-06 20:38:21 |
| 13.77.142.89 | attackbotsspam | Dec 6 08:44:43 sd-53420 sshd\[30408\]: Invalid user uucpadm from 13.77.142.89 Dec 6 08:44:43 sd-53420 sshd\[30408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.142.89 Dec 6 08:44:46 sd-53420 sshd\[30408\]: Failed password for invalid user uucpadm from 13.77.142.89 port 44394 ssh2 Dec 6 08:51:27 sd-53420 sshd\[31602\]: User root from 13.77.142.89 not allowed because none of user's groups are listed in AllowGroups Dec 6 08:51:27 sd-53420 sshd\[31602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.142.89 user=root ... |
2019-12-06 20:33:33 |
| 14.248.83.163 | attack | Dec 6 13:12:14 MK-Soft-VM5 sshd[29449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.83.163 Dec 6 13:12:16 MK-Soft-VM5 sshd[29449]: Failed password for invalid user fish from 14.248.83.163 port 50976 ssh2 ... |
2019-12-06 20:40:24 |
| 197.155.234.157 | attack | Dec 6 09:20:07 ns41 sshd[11178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.234.157 |
2019-12-06 21:12:47 |
| 2a03:b0c0:3:d0::db7:9001 | attackbotsspam | Forged login request. |
2019-12-06 21:07:56 |
| 51.15.195.124 | attackspambots | Dec 6 10:17:24 server sshd\[7938\]: Invalid user minority from 51.15.195.124 Dec 6 10:17:24 server sshd\[7938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.195.124 Dec 6 10:17:26 server sshd\[7938\]: Failed password for invalid user minority from 51.15.195.124 port 46772 ssh2 Dec 6 10:22:46 server sshd\[9325\]: Invalid user kristensen from 51.15.195.124 Dec 6 10:22:46 server sshd\[9325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.195.124 ... |
2019-12-06 21:04:12 |