城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.20.246.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.20.246.139. IN A
;; AUTHORITY SECTION:
. 242 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022033100 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 31 17:35:57 CST 2022
;; MSG SIZE rcvd: 107
139.246.20.107.in-addr.arpa domain name pointer ec2-107-20-246-139.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.246.20.107.in-addr.arpa name = ec2-107-20-246-139.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.38.185.131 | attackbotsspam | Jul 19 10:07:08 meumeu sshd[1011581]: Invalid user brook from 54.38.185.131 port 49734 Jul 19 10:07:08 meumeu sshd[1011581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.185.131 Jul 19 10:07:08 meumeu sshd[1011581]: Invalid user brook from 54.38.185.131 port 49734 Jul 19 10:07:10 meumeu sshd[1011581]: Failed password for invalid user brook from 54.38.185.131 port 49734 ssh2 Jul 19 10:11:07 meumeu sshd[1011763]: Invalid user abb from 54.38.185.131 port 33594 Jul 19 10:11:07 meumeu sshd[1011763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.185.131 Jul 19 10:11:07 meumeu sshd[1011763]: Invalid user abb from 54.38.185.131 port 33594 Jul 19 10:11:09 meumeu sshd[1011763]: Failed password for invalid user abb from 54.38.185.131 port 33594 ssh2 Jul 19 10:15:11 meumeu sshd[1011916]: Invalid user alexk from 54.38.185.131 port 45686 ... |
2020-07-19 16:47:09 |
| 218.92.0.168 | attack | Jul 19 10:52:59 srv-ubuntu-dev3 sshd[33975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Jul 19 10:53:01 srv-ubuntu-dev3 sshd[33975]: Failed password for root from 218.92.0.168 port 47838 ssh2 Jul 19 10:53:04 srv-ubuntu-dev3 sshd[33975]: Failed password for root from 218.92.0.168 port 47838 ssh2 Jul 19 10:52:59 srv-ubuntu-dev3 sshd[33975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Jul 19 10:53:01 srv-ubuntu-dev3 sshd[33975]: Failed password for root from 218.92.0.168 port 47838 ssh2 Jul 19 10:53:04 srv-ubuntu-dev3 sshd[33975]: Failed password for root from 218.92.0.168 port 47838 ssh2 Jul 19 10:52:59 srv-ubuntu-dev3 sshd[33975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Jul 19 10:53:01 srv-ubuntu-dev3 sshd[33975]: Failed password for root from 218.92.0.168 port 47838 ssh2 Jul 19 10 ... |
2020-07-19 17:00:36 |
| 203.204.188.11 | attackbots | $f2bV_matches |
2020-07-19 16:48:12 |
| 180.183.246.173 | attack | (imapd) Failed IMAP login from 180.183.246.173 (TH/Thailand/mx-ll-180.183.246-173.dynamic.3bb.in.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 19 12:25:15 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 8 secs): user= |
2020-07-19 16:38:07 |
| 217.182.23.55 | attack | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-19T08:27:10Z and 2020-07-19T09:01:02Z |
2020-07-19 17:03:58 |
| 140.143.136.41 | attackspambots | Jul 19 09:55:19 santamaria sshd\[14569\]: Invalid user user from 140.143.136.41 Jul 19 09:55:19 santamaria sshd\[14569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.136.41 Jul 19 09:55:21 santamaria sshd\[14569\]: Failed password for invalid user user from 140.143.136.41 port 46204 ssh2 ... |
2020-07-19 16:38:55 |
| 222.91.97.134 | attackspam | Jul 19 08:10:20 ns308116 sshd[5912]: Invalid user ys from 222.91.97.134 port 2099 Jul 19 08:10:20 ns308116 sshd[5912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.97.134 Jul 19 08:10:22 ns308116 sshd[5912]: Failed password for invalid user ys from 222.91.97.134 port 2099 ssh2 Jul 19 08:18:25 ns308116 sshd[6176]: Invalid user bos from 222.91.97.134 port 2100 Jul 19 08:18:25 ns308116 sshd[6176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.97.134 ... |
2020-07-19 16:41:09 |
| 150.109.182.166 | attack | Jul 19 09:54:44 debian-2gb-nbg1-2 kernel: \[17403830.293408\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=150.109.182.166 DST=195.201.40.59 LEN=68 TOS=0x08 PREC=0x60 TTL=240 ID=54321 PROTO=UDP SPT=60835 DPT=10080 LEN=48 |
2020-07-19 17:13:23 |
| 142.93.247.221 | attackspambots | *Port Scan* detected from 142.93.247.221 (US/United States/New Jersey/North Bergen/-). 4 hits in the last 260 seconds |
2020-07-19 16:56:21 |
| 139.215.217.181 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-19T07:45:50Z and 2020-07-19T07:55:06Z |
2020-07-19 16:54:33 |
| 182.254.180.17 | attackspambots | Jul 19 09:36:18 ns392434 sshd[21733]: Invalid user daniel from 182.254.180.17 port 50446 Jul 19 09:36:18 ns392434 sshd[21733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.180.17 Jul 19 09:36:18 ns392434 sshd[21733]: Invalid user daniel from 182.254.180.17 port 50446 Jul 19 09:36:20 ns392434 sshd[21733]: Failed password for invalid user daniel from 182.254.180.17 port 50446 ssh2 Jul 19 09:48:19 ns392434 sshd[22360]: Invalid user stewart from 182.254.180.17 port 52526 Jul 19 09:48:19 ns392434 sshd[22360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.180.17 Jul 19 09:48:19 ns392434 sshd[22360]: Invalid user stewart from 182.254.180.17 port 52526 Jul 19 09:48:20 ns392434 sshd[22360]: Failed password for invalid user stewart from 182.254.180.17 port 52526 ssh2 Jul 19 09:54:51 ns392434 sshd[22521]: Invalid user sftp from 182.254.180.17 port 59808 |
2020-07-19 17:09:31 |
| 103.98.17.94 | attackspam | Jul 19 10:44:16 eventyay sshd[2469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.94 Jul 19 10:44:18 eventyay sshd[2469]: Failed password for invalid user dan from 103.98.17.94 port 49612 ssh2 Jul 19 10:48:39 eventyay sshd[2637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.94 ... |
2020-07-19 16:54:59 |
| 192.241.211.215 | attack | Jul 18 22:40:43 php1 sshd\[23487\]: Invalid user lucas from 192.241.211.215 Jul 18 22:40:43 php1 sshd\[23487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.211.215 Jul 18 22:40:44 php1 sshd\[23487\]: Failed password for invalid user lucas from 192.241.211.215 port 36951 ssh2 Jul 18 22:46:27 php1 sshd\[23840\]: Invalid user xutao from 192.241.211.215 Jul 18 22:46:27 php1 sshd\[23840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.211.215 |
2020-07-19 16:48:40 |
| 123.31.26.130 | attackspambots | Jul 19 07:46:58 jumpserver sshd[130486]: Invalid user steamcmd from 123.31.26.130 port 25300 Jul 19 07:46:59 jumpserver sshd[130486]: Failed password for invalid user steamcmd from 123.31.26.130 port 25300 ssh2 Jul 19 07:55:13 jumpserver sshd[130553]: Invalid user ssp from 123.31.26.130 port 16330 ... |
2020-07-19 16:46:53 |
| 154.17.8.73 | attack | Jul 19 07:37:31 XXXXXX sshd[12058]: Invalid user vtiger from 154.17.8.73 port 58094 |
2020-07-19 16:38:23 |