城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.139.24.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26333
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.139.24.13. IN A
;; AUTHORITY SECTION:
. 85 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 16:07:51 CST 2022
;; MSG SIZE rcvd: 106
13.24.139.104.in-addr.arpa domain name pointer cpe-104-139-24-13.carolina.res.rr.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
13.24.139.104.in-addr.arpa name = cpe-104-139-24-13.carolina.res.rr.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.0.129.192 | attackbots | May 9 04:48:49 vps639187 sshd\[23815\]: Invalid user tv from 128.0.129.192 port 51202 May 9 04:48:49 vps639187 sshd\[23815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.0.129.192 May 9 04:48:50 vps639187 sshd\[23815\]: Failed password for invalid user tv from 128.0.129.192 port 51202 ssh2 ... |
2020-05-09 12:03:25 |
| 207.246.111.60 | attackbots | Attempted connection to port 3389. |
2020-05-09 12:01:17 |
| 222.186.180.147 | attackbotsspam | May 8 22:59:35 NPSTNNYC01T sshd[12610]: Failed password for root from 222.186.180.147 port 39196 ssh2 May 8 22:59:39 NPSTNNYC01T sshd[12610]: Failed password for root from 222.186.180.147 port 39196 ssh2 May 8 22:59:42 NPSTNNYC01T sshd[12610]: Failed password for root from 222.186.180.147 port 39196 ssh2 May 8 22:59:46 NPSTNNYC01T sshd[12610]: Failed password for root from 222.186.180.147 port 39196 ssh2 ... |
2020-05-09 12:10:41 |
| 209.17.97.58 | attack | port scan and connect, tcp 8080 (http-proxy) |
2020-05-09 08:51:14 |
| 222.186.173.142 | attackspam | May 9 04:51:13 eventyay sshd[9275]: Failed password for root from 222.186.173.142 port 61326 ssh2 May 9 04:51:26 eventyay sshd[9275]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 61326 ssh2 [preauth] May 9 04:51:32 eventyay sshd[9282]: Failed password for root from 222.186.173.142 port 4692 ssh2 ... |
2020-05-09 12:02:47 |
| 4.28.57.42 | attackbots | Unauthorized connection attempt from IP address 4.28.57.42 on Port 445(SMB) |
2020-05-09 08:52:32 |
| 201.150.58.196 | attack | Unauthorized connection attempt from IP address 201.150.58.196 on Port 445(SMB) |
2020-05-09 08:42:27 |
| 51.79.50.172 | attack | May 8 17:16:38 XXX sshd[36622]: Invalid user ed from 51.79.50.172 port 54794 |
2020-05-09 08:39:10 |
| 195.88.208.203 | attackspambots | Attempted connection to port 1972. |
2020-05-09 09:04:40 |
| 160.155.113.19 | attackspambots | May 9 05:36:55 gw1 sshd[9068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.155.113.19 May 9 05:36:57 gw1 sshd[9068]: Failed password for invalid user hadoop from 160.155.113.19 port 56349 ssh2 ... |
2020-05-09 08:54:28 |
| 5.135.129.180 | attack | /wp-login.php IP Address is infected with the Gozi botnet TCP connection from "5.135.129.180" on port "9794" going to IP address "192.42.119.41" botnet command and control domain for this connection was "n4curtispablo.info" |
2020-05-09 08:41:30 |
| 118.45.130.170 | attackspambots | May 9 01:55:13 sso sshd[4029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.45.130.170 May 9 01:55:15 sso sshd[4029]: Failed password for invalid user opt from 118.45.130.170 port 53619 ssh2 ... |
2020-05-09 12:03:06 |
| 118.27.15.50 | attackbots | Triggered by Fail2Ban at Ares web server |
2020-05-09 08:36:27 |
| 193.112.23.7 | attackspam | May 9 01:09:41 mout sshd[13826]: Invalid user hung from 193.112.23.7 port 50560 |
2020-05-09 08:55:46 |
| 186.225.86.235 | attack | Unauthorized connection attempt from IP address 186.225.86.235 on Port 445(SMB) |
2020-05-09 08:56:21 |