城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.198.103.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.198.103.139. IN A
;; AUTHORITY SECTION:
. 440 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031100 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 11 18:52:13 CST 2022
;; MSG SIZE rcvd: 108
139.103.198.104.in-addr.arpa domain name pointer 139.103.198.104.bc.googleusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.103.198.104.in-addr.arpa name = 139.103.198.104.bc.googleusercontent.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.168.18.227 | attackspambots | $f2bV_matches |
2020-04-12 21:22:33 |
| 138.186.54.141 | attackspambots | Unauthorized connection attempt detected from IP address 138.186.54.141 to port 445 |
2020-04-12 21:41:03 |
| 112.85.42.176 | attackspambots | Apr 12 14:59:08 legacy sshd[31062]: Failed password for root from 112.85.42.176 port 32571 ssh2 Apr 12 14:59:21 legacy sshd[31062]: error: maximum authentication attempts exceeded for root from 112.85.42.176 port 32571 ssh2 [preauth] Apr 12 14:59:26 legacy sshd[31065]: Failed password for root from 112.85.42.176 port 62510 ssh2 ... |
2020-04-12 21:01:25 |
| 183.98.215.91 | attackbotsspam | (sshd) Failed SSH login from 183.98.215.91 (KR/South Korea/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 12 15:22:13 ubnt-55d23 sshd[11496]: Invalid user asterisk from 183.98.215.91 port 48076 Apr 12 15:22:15 ubnt-55d23 sshd[11496]: Failed password for invalid user asterisk from 183.98.215.91 port 48076 ssh2 |
2020-04-12 21:40:39 |
| 185.176.27.26 | attackbots | scans 13 times in preceeding hours on the ports (in chronological order) 20399 20400 20398 20494 20493 20492 20588 20695 20696 20697 20789 20791 20790 resulting in total of 79 scans from 185.176.27.0/24 block. |
2020-04-12 21:11:07 |
| 82.20.249.215 | attackbots | [portscan] Port scan |
2020-04-12 21:29:58 |
| 190.100.148.146 | attackbots | Apr 12 02:24:55 web1 sshd\[23410\]: Invalid user ubnt from 190.100.148.146 Apr 12 02:24:55 web1 sshd\[23410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.100.148.146 Apr 12 02:24:57 web1 sshd\[23410\]: Failed password for invalid user ubnt from 190.100.148.146 port 50822 ssh2 Apr 12 02:32:26 web1 sshd\[24303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.100.148.146 user=root Apr 12 02:32:28 web1 sshd\[24303\]: Failed password for root from 190.100.148.146 port 57180 ssh2 |
2020-04-12 21:05:10 |
| 52.172.221.28 | attackspam | Apr 12 08:14:53 Tower sshd[42888]: Connection from 52.172.221.28 port 57216 on 192.168.10.220 port 22 rdomain "" Apr 12 08:15:00 Tower sshd[42888]: Failed password for root from 52.172.221.28 port 57216 ssh2 Apr 12 08:15:00 Tower sshd[42888]: Received disconnect from 52.172.221.28 port 57216:11: Bye Bye [preauth] Apr 12 08:15:00 Tower sshd[42888]: Disconnected from authenticating user root 52.172.221.28 port 57216 [preauth] |
2020-04-12 21:36:22 |
| 49.88.112.115 | attackbots | Apr 12 02:31:39 php1 sshd\[32436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115 user=root Apr 12 02:31:41 php1 sshd\[32436\]: Failed password for root from 49.88.112.115 port 10125 ssh2 Apr 12 02:31:44 php1 sshd\[32436\]: Failed password for root from 49.88.112.115 port 10125 ssh2 Apr 12 02:31:45 php1 sshd\[32436\]: Failed password for root from 49.88.112.115 port 10125 ssh2 Apr 12 02:32:31 php1 sshd\[32518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115 user=root |
2020-04-12 21:13:16 |
| 51.38.37.254 | attackspambots | Apr 12 12:08:57 *** sshd[27788]: User root from 51.38.37.254 not allowed because not listed in AllowUsers |
2020-04-12 21:21:03 |
| 182.16.103.34 | attack | Apr 12 12:21:03 web8 sshd\[31505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.103.34 user=root Apr 12 12:21:05 web8 sshd\[31505\]: Failed password for root from 182.16.103.34 port 34008 ssh2 Apr 12 12:27:33 web8 sshd\[2530\]: Invalid user dennisse from 182.16.103.34 Apr 12 12:27:33 web8 sshd\[2530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.103.34 Apr 12 12:27:35 web8 sshd\[2530\]: Failed password for invalid user dennisse from 182.16.103.34 port 41734 ssh2 |
2020-04-12 21:39:23 |
| 188.126.113.158 | attackspam | Unauthorized connection attempt from IP address 188.126.113.158 on Port 25(SMTP) |
2020-04-12 21:15:51 |
| 181.123.9.3 | attackbots | Apr 12 14:07:02 DAAP sshd[9162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.9.3 user=root Apr 12 14:07:04 DAAP sshd[9162]: Failed password for root from 181.123.9.3 port 47270 ssh2 Apr 12 14:08:30 DAAP sshd[9212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.9.3 user=root Apr 12 14:08:32 DAAP sshd[9212]: Failed password for root from 181.123.9.3 port 34768 ssh2 Apr 12 14:09:14 DAAP sshd[9290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.9.3 user=root Apr 12 14:09:16 DAAP sshd[9290]: Failed password for root from 181.123.9.3 port 42314 ssh2 ... |
2020-04-12 20:59:48 |
| 121.69.135.162 | attackspam | Apr 12 13:08:50 cdc sshd[5015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.135.162 Apr 12 13:08:52 cdc sshd[5015]: Failed password for invalid user celso from 121.69.135.162 port 27882 ssh2 |
2020-04-12 21:25:49 |
| 112.227.29.85 | attackspam | (ftpd) Failed FTP login from 112.227.29.85 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 12 17:03:22 ir1 pure-ftpd: (?@112.227.29.85) [WARNING] Authentication failed for user [anonymous] |
2020-04-12 21:34:36 |