城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.19.191.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.19.191.108. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 20:36:49 CST 2025
;; MSG SIZE rcvd: 107
b'108.191.19.107.in-addr.arpa has no PTR record
'
server can't find 107.19.191.108.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 178.32.107.151 | attackspam | TCP Port Scanning |
2020-06-02 23:37:09 |
| 193.112.163.159 | attackbotsspam | Jun 2 16:23:49 sip sshd[509239]: Failed password for root from 193.112.163.159 port 49566 ssh2 Jun 2 16:28:30 sip sshd[509279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.163.159 user=root Jun 2 16:28:32 sip sshd[509279]: Failed password for root from 193.112.163.159 port 39336 ssh2 ... |
2020-06-02 23:28:58 |
| 103.248.85.244 | attackspambots | Spam detected 2020.06.02 14:05:36 blocked until 2020.07.22 07:07:36 |
2020-06-02 23:32:09 |
| 220.156.170.176 | attack | $f2bV_matches |
2020-06-02 23:15:47 |
| 5.135.165.55 | attackbots | Jun 2 16:54:50 sip sshd[509466]: Failed password for root from 5.135.165.55 port 52734 ssh2 Jun 2 16:58:12 sip sshd[509513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.165.55 user=root Jun 2 16:58:14 sip sshd[509513]: Failed password for root from 5.135.165.55 port 58104 ssh2 ... |
2020-06-02 23:10:49 |
| 195.231.3.21 | attack | Jun 2 15:49:47 mail postfix/smtpd\[28130\]: warning: unknown\[195.231.3.21\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 2 16:10:28 mail postfix/smtpd\[28730\]: warning: unknown\[195.231.3.21\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 2 16:29:07 mail postfix/smtpd\[29209\]: warning: unknown\[195.231.3.21\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 2 17:08:38 mail postfix/smtpd\[30735\]: warning: unknown\[195.231.3.21\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-06-02 23:40:32 |
| 185.240.65.251 | attackbotsspam | Jun 2 09:04:42 server1 sshd\[11131\]: Invalid user cisco from 185.240.65.251 Jun 2 09:04:42 server1 sshd\[11131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.240.65.251 Jun 2 09:04:43 server1 sshd\[11131\]: Failed password for invalid user cisco from 185.240.65.251 port 6664 ssh2 Jun 2 09:13:14 server1 sshd\[13590\]: Invalid user cisco from 185.240.65.251 Jun 2 09:13:14 server1 sshd\[13590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.240.65.251 ... |
2020-06-02 23:17:57 |
| 14.145.144.72 | attackbots | Jun 2 16:10:48 h2646465 sshd[12210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.145.144.72 user=root Jun 2 16:10:50 h2646465 sshd[12210]: Failed password for root from 14.145.144.72 port 52638 ssh2 Jun 2 16:27:28 h2646465 sshd[13029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.145.144.72 user=root Jun 2 16:27:31 h2646465 sshd[13029]: Failed password for root from 14.145.144.72 port 40672 ssh2 Jun 2 16:32:49 h2646465 sshd[13295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.145.144.72 user=root Jun 2 16:32:52 h2646465 sshd[13295]: Failed password for root from 14.145.144.72 port 20218 ssh2 Jun 2 16:38:04 h2646465 sshd[13593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.145.144.72 user=root Jun 2 16:38:05 h2646465 sshd[13593]: Failed password for root from 14.145.144.72 port 2789 ssh2 Jun 2 16:43:33 h2646465 sshd |
2020-06-02 23:09:39 |
| 87.246.7.66 | attackbots | 2020-06-02 18:38:37 auth_plain authenticator failed for (User) [87.246.7.66]: 535 Incorrect authentication data (set_id=xyx@lavrinenko.info) 2020-06-02 18:39:26 auth_plain authenticator failed for (User) [87.246.7.66]: 535 Incorrect authentication data (set_id=xyz@lavrinenko.info) ... |
2020-06-02 23:42:46 |
| 91.121.91.82 | attackspam | May 25 00:04:56 v2202003116398111542 sshd[22169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.91.82 user=root |
2020-06-02 23:37:33 |
| 181.48.23.154 | attackspambots | May 26 02:46:20 v2202003116398111542 sshd[11934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.23.154 user=root |
2020-06-02 23:22:46 |
| 61.132.226.140 | attack | 2020-06-01 20:09:03 server sshd[20528]: Failed password for invalid user root from 61.132.226.140 port 43254 ssh2 |
2020-06-02 23:33:44 |
| 120.53.15.134 | attackspambots | $f2bV_matches |
2020-06-02 23:47:39 |
| 190.98.218.178 | attackspambots | 20/6/2@08:05:47: FAIL: Alarm-Intrusion address from=190.98.218.178 ... |
2020-06-02 23:20:46 |
| 31.128.18.22 | attack | Automatic report - Port Scan Attack |
2020-06-02 23:19:16 |