城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.139.69.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.139.69.8. IN A
;; AUTHORITY SECTION:
. 187 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:00:23 CST 2022
;; MSG SIZE rcvd: 105
8.69.139.104.in-addr.arpa domain name pointer cpe-104-139-69-8.carolina.res.rr.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
8.69.139.104.in-addr.arpa name = cpe-104-139-69-8.carolina.res.rr.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 148.70.249.72 | attack | Jul 30 09:37:56 microserver sshd[63366]: Invalid user www from 148.70.249.72 port 33476 Jul 30 09:37:56 microserver sshd[63366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72 Jul 30 09:37:57 microserver sshd[63366]: Failed password for invalid user www from 148.70.249.72 port 33476 ssh2 Jul 30 09:43:52 microserver sshd[64427]: Invalid user l4d2 from 148.70.249.72 port 57528 Jul 30 09:43:52 microserver sshd[64427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72 Jul 30 09:56:35 microserver sshd[2184]: Invalid user er from 148.70.249.72 port 48772 Jul 30 09:56:35 microserver sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.249.72 Jul 30 09:56:38 microserver sshd[2184]: Failed password for invalid user er from 148.70.249.72 port 48772 ssh2 Jul 30 10:03:21 microserver sshd[3282]: Invalid user j from 148.70.249.72 port 44026 Jul 30 10:03:21 microser |
2019-07-30 16:42:03 |
| 198.50.175.246 | attackspambots | Jul 30 09:40:50 xb3 sshd[26084]: Failed password for invalid user kuo from 198.50.175.246 port 48821 ssh2 Jul 30 09:40:50 xb3 sshd[26084]: Received disconnect from 198.50.175.246: 11: Bye Bye [preauth] Jul 30 09:49:02 xb3 sshd[403]: Failed password for invalid user rwyzykiewicz from 198.50.175.246 port 41567 ssh2 Jul 30 09:49:02 xb3 sshd[403]: Received disconnect from 198.50.175.246: 11: Bye Bye [preauth] Jul 30 09:53:18 xb3 sshd[30310]: Failed password for invalid user commando from 198.50.175.246 port 39732 ssh2 Jul 30 09:53:18 xb3 sshd[30310]: Received disconnect from 198.50.175.246: 11: Bye Bye [preauth] Jul 30 09:57:30 xb3 sshd[27136]: Failed password for invalid user xxxx from 198.50.175.246 port 37899 ssh2 Jul 30 09:57:30 xb3 sshd[27136]: Received disconnect from 198.50.175.246: 11: Bye Bye [preauth] Jul 30 10:01:41 xb3 sshd[24654]: Failed password for invalid user tez from 198.50.175.246 port 35928 ssh2 Jul 30 10:01:41 xb3 sshd[24654]: Received disconnect from 1........ ------------------------------- |
2019-07-30 17:04:51 |
| 218.92.0.191 | attackspam | 2019-07-30T03:54:22.245081abusebot-8.cloudsearch.cf sshd\[6759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.191 user=root |
2019-07-30 17:11:54 |
| 189.146.199.195 | attackspam | [portscan] tcp/139 [NetBIOS Session Service] *(RWIN=1024)(07301024) |
2019-07-30 16:27:56 |
| 96.32.4.181 | attack | Invalid user franklin from 96.32.4.181 port 39416 |
2019-07-30 16:53:05 |
| 27.79.207.172 | attackbots | 445/tcp 445/tcp 445/tcp... [2019-06-21/07-29]5pkt,1pt.(tcp) |
2019-07-30 16:45:14 |
| 173.11.72.13 | attackspam | Jul 30 09:34:11 h2177944 sshd\[4419\]: Invalid user admanager from 173.11.72.13 port 59968 Jul 30 09:34:11 h2177944 sshd\[4419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.11.72.13 Jul 30 09:34:13 h2177944 sshd\[4419\]: Failed password for invalid user admanager from 173.11.72.13 port 59968 ssh2 Jul 30 09:38:50 h2177944 sshd\[4463\]: Invalid user administrateur from 173.11.72.13 port 56088 Jul 30 09:38:50 h2177944 sshd\[4463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.11.72.13 ... |
2019-07-30 16:41:45 |
| 201.137.245.64 | attack | $f2bV_matches |
2019-07-30 16:58:38 |
| 80.39.113.94 | attackbots | DATE:2019-07-30 10:22:22, IP:80.39.113.94, PORT:ssh brute force auth on SSH service (patata) |
2019-07-30 16:49:31 |
| 200.116.230.154 | attackbots | Sending SPAM email |
2019-07-30 17:13:51 |
| 221.156.116.51 | attack | Jul 30 10:46:12 mout sshd[16802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.116.51 Jul 30 10:46:12 mout sshd[16802]: Invalid user vi from 221.156.116.51 port 48310 Jul 30 10:46:14 mout sshd[16802]: Failed password for invalid user vi from 221.156.116.51 port 48310 ssh2 |
2019-07-30 16:56:08 |
| 93.191.156.114 | attackspambots | 24 attempts against mh-misbehave-ban on cold.magehost.pro |
2019-07-30 16:48:08 |
| 108.4.12.229 | attackspambots | 20 attempts against mh-ssh on fire.magehost.pro |
2019-07-30 17:04:34 |
| 188.134.16.191 | attackspambots | Jul 29 20:20:41 mail postfix/postscreen[26949]: PREGREET 53 after 0.3 from [188.134.16.191]:59907: EHLO 188x134x16x191.static-business.iz.ertelecom.ru ... |
2019-07-30 16:39:33 |
| 192.99.12.24 | attackbotsspam | Jul 30 10:32:28 vps691689 sshd[32569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.12.24 Jul 30 10:32:30 vps691689 sshd[32569]: Failed password for invalid user sun from 192.99.12.24 port 49440 ssh2 ... |
2019-07-30 16:50:34 |