城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.146.112.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.146.112.141. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 00:32:55 CST 2025
;; MSG SIZE rcvd: 108
141.112.146.107.in-addr.arpa domain name pointer syn-107-146-112-141.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
141.112.146.107.in-addr.arpa name = syn-107-146-112-141.res.spectrum.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 123.207.142.31 | attackbotsspam | Invalid user ugg from 123.207.142.31 port 55149 |
2020-05-22 15:32:34 |
| 142.93.74.248 | attack | Port scanning [2 denied] |
2020-05-22 15:42:44 |
| 103.99.1.31 | attackspam | Detected by Fail2Ban |
2020-05-22 15:29:13 |
| 47.252.6.231 | attack | 47.252.6.231 - - [22/May/2020:08:50:50 +0200] "GET /wp-login.php HTTP/1.1" 200 6614 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 47.252.6.231 - - [22/May/2020:08:50:52 +0200] "POST /wp-login.php HTTP/1.1" 200 6865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 47.252.6.231 - - [22/May/2020:08:50:53 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-05-22 15:27:48 |
| 122.155.11.89 | attack | (sshd) Failed SSH login from 122.155.11.89 (TH/Thailand/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 22 09:38:16 s1 sshd[12518]: Invalid user img from 122.155.11.89 port 60878 May 22 09:38:18 s1 sshd[12518]: Failed password for invalid user img from 122.155.11.89 port 60878 ssh2 May 22 09:49:14 s1 sshd[12728]: Invalid user uno from 122.155.11.89 port 49344 May 22 09:49:16 s1 sshd[12728]: Failed password for invalid user uno from 122.155.11.89 port 49344 ssh2 May 22 09:52:41 s1 sshd[12792]: Invalid user eml from 122.155.11.89 port 44192 |
2020-05-22 15:55:34 |
| 129.149.194.105 | attackbotsspam | May 22 06:59:29 ns382633 sshd\[18183\]: Invalid user sysadmin from 129.149.194.105 port 34312 May 22 06:59:29 ns382633 sshd\[18183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.149.194.105 May 22 06:59:31 ns382633 sshd\[18183\]: Failed password for invalid user sysadmin from 129.149.194.105 port 34312 ssh2 May 22 07:56:30 ns382633 sshd\[28100\]: Invalid user 1234 from 129.149.194.105 port 34312 May 22 07:56:30 ns382633 sshd\[28100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.149.194.105 |
2020-05-22 15:57:08 |
| 183.80.25.18 | attackspam | Unauthorised access (May 22) SRC=183.80.25.18 LEN=52 TTL=109 ID=18051 DF TCP DPT=445 WINDOW=8192 SYN |
2020-05-22 15:23:50 |
| 104.131.231.109 | attackspambots | May 22 09:49:28 * sshd[1272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.231.109 May 22 09:49:30 * sshd[1272]: Failed password for invalid user mmw from 104.131.231.109 port 49766 ssh2 |
2020-05-22 15:49:52 |
| 59.120.250.113 | attackspambots | Port probing on unauthorized port 23 |
2020-05-22 15:51:25 |
| 209.97.134.47 | attackspambots | Invalid user sjn from 209.97.134.47 port 39338 |
2020-05-22 15:28:42 |
| 41.226.11.252 | attackbotsspam | May 22 07:18:39 onepixel sshd[831204]: Invalid user uen from 41.226.11.252 port 2099 May 22 07:18:39 onepixel sshd[831204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.226.11.252 May 22 07:18:39 onepixel sshd[831204]: Invalid user uen from 41.226.11.252 port 2099 May 22 07:18:41 onepixel sshd[831204]: Failed password for invalid user uen from 41.226.11.252 port 2099 ssh2 May 22 07:22:37 onepixel sshd[831779]: Invalid user xmr from 41.226.11.252 port 53217 |
2020-05-22 15:38:58 |
| 192.241.173.142 | attackspambots | May 22 08:12:17 ns382633 sshd\[31083\]: Invalid user benny from 192.241.173.142 port 35382 May 22 08:12:17 ns382633 sshd\[31083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.173.142 May 22 08:12:19 ns382633 sshd\[31083\]: Failed password for invalid user benny from 192.241.173.142 port 35382 ssh2 May 22 08:23:36 ns382633 sshd\[885\]: Invalid user eab from 192.241.173.142 port 45516 May 22 08:23:36 ns382633 sshd\[885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.173.142 |
2020-05-22 15:36:35 |
| 187.174.219.142 | attackspam | $f2bV_matches |
2020-05-22 15:45:14 |
| 1.6.103.18 | attackspambots | Invalid user ppd from 1.6.103.18 port 64187 |
2020-05-22 15:58:33 |
| 103.48.192.48 | attackspambots | Invalid user fov from 103.48.192.48 port 9855 |
2020-05-22 15:22:44 |