城市(city): Linden
省份(region): New Jersey
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.5.117.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21774
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;108.5.117.140. IN A
;; AUTHORITY SECTION:
. 211 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019100301 1800 900 604800 86400
;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 04 07:46:06 CST 2019
;; MSG SIZE rcvd: 117
140.117.5.108.in-addr.arpa domain name pointer pool-108-5-117-140.nwrknj.fios.verizon.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.117.5.108.in-addr.arpa name = pool-108-5-117-140.nwrknj.fios.verizon.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 15.188.2.5 | attackbotsspam | [munged]::443 15.188.2.5 - - [10/Nov/2019:11:51:15 +0100] "POST /[munged]: HTTP/1.1" 200 9075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 15.188.2.5 - - [10/Nov/2019:11:51:17 +0100] "POST /[munged]: HTTP/1.1" 200 9075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 15.188.2.5 - - [10/Nov/2019:11:51:19 +0100] "POST /[munged]: HTTP/1.1" 200 9075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 15.188.2.5 - - [10/Nov/2019:11:51:20 +0100] "POST /[munged]: HTTP/1.1" 200 9075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 15.188.2.5 - - [10/Nov/2019:11:51:22 +0100] "POST /[munged]: HTTP/1.1" 200 9075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" [munged]::443 15.188.2.5 - - [10/Nov/2019:11:51:24 +0100] "POST /[munged]: HTTP/1.1" 200 9075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; |
2019-11-10 20:11:45 |
| 104.245.144.42 | attackbotsspam | (From doretha.gerard@msn.com) Want more visitors for your website? Receive hundreds of people who are ready to buy sent directly to your website. Boost your profits fast. Start seeing results in as little as 48 hours. For additional information reply to: michael4621gre@gmail.com |
2019-11-10 20:05:38 |
| 185.68.101.171 | attack | Nov 10 06:53:26 zulu1842 sshd[30176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.68.101.171 user=r.r Nov 10 06:53:28 zulu1842 sshd[30176]: Failed password for r.r from 185.68.101.171 port 44862 ssh2 Nov 10 06:53:29 zulu1842 sshd[30176]: Received disconnect from 185.68.101.171: 11: Bye Bye [preauth] Nov 10 07:15:21 zulu1842 sshd[31750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.68.101.171 user=r.r Nov 10 07:15:22 zulu1842 sshd[31750]: Failed password for r.r from 185.68.101.171 port 34674 ssh2 Nov 10 07:15:22 zulu1842 sshd[31750]: Received disconnect from 185.68.101.171: 11: Bye Bye [preauth] Nov 10 07:19:18 zulu1842 sshd[31967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.68.101.171 user=r.r Nov 10 07:19:21 zulu1842 sshd[31967]: Failed password for r.r from 185.68.101.171 port 46362 ssh2 Nov 10 07:19:21 zulu1842 sshd[31967........ ------------------------------- |
2019-11-10 19:35:20 |
| 115.110.207.116 | attackbotsspam | 2019-11-10T06:20:50.472563shield sshd\[26225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.110.207.116 user=root 2019-11-10T06:20:52.165490shield sshd\[26225\]: Failed password for root from 115.110.207.116 port 43008 ssh2 2019-11-10T06:25:16.697552shield sshd\[26614\]: Invalid user conception from 115.110.207.116 port 51930 2019-11-10T06:25:16.705256shield sshd\[26614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.110.207.116 2019-11-10T06:25:18.915059shield sshd\[26614\]: Failed password for invalid user conception from 115.110.207.116 port 51930 ssh2 |
2019-11-10 19:44:08 |
| 41.72.192.190 | attackbots | Unauthorised access (Nov 10) SRC=41.72.192.190 LEN=52 TTL=117 ID=22411 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 10) SRC=41.72.192.190 LEN=52 TTL=117 ID=11010 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-10 20:09:40 |
| 76.73.206.90 | attack | Nov 10 13:09:41 [munged] sshd[31513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.73.206.90 |
2019-11-10 20:10:53 |
| 165.227.41.202 | attackspambots | Nov 10 09:12:02 legacy sshd[16323]: Failed password for root from 165.227.41.202 port 47000 ssh2 Nov 10 09:15:20 legacy sshd[16465]: Failed password for root from 165.227.41.202 port 55516 ssh2 ... |
2019-11-10 19:54:48 |
| 45.224.105.143 | attackbots | (imapd) Failed IMAP login from 45.224.105.143 (AR/Argentina/-): 1 in the last 3600 secs |
2019-11-10 19:58:19 |
| 162.62.17.4 | attack | 1573367118 - 11/10/2019 07:25:18 Host: 162.62.17.4/162.62.17.4 Port: 32793 UDP Blocked |
2019-11-10 19:45:08 |
| 1.207.250.78 | attack | Nov 10 09:09:01 ns381471 sshd[10989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.207.250.78 Nov 10 09:09:03 ns381471 sshd[10989]: Failed password for invalid user mntner from 1.207.250.78 port 20069 ssh2 |
2019-11-10 19:35:02 |
| 82.243.236.16 | attackspambots | Nov 10 10:32:14 **** sshd[31336]: User root from 82.243.236.16 not allowed because not listed in AllowUsers |
2019-11-10 19:36:40 |
| 189.181.234.244 | attackspambots | Nov 10 11:22:38 www4 sshd\[6793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.181.234.244 user=root Nov 10 11:22:40 www4 sshd\[6793\]: Failed password for root from 189.181.234.244 port 64195 ssh2 Nov 10 11:26:28 www4 sshd\[7278\]: Invalid user idc2021 from 189.181.234.244 ... |
2019-11-10 19:47:44 |
| 24.64.76.58 | attackspam | Unauthorised access (Nov 10) SRC=24.64.76.58 LEN=40 TTL=52 ID=61621 TCP DPT=8080 WINDOW=46551 SYN Unauthorised access (Nov 6) SRC=24.64.76.58 LEN=40 TTL=52 ID=21164 TCP DPT=8080 WINDOW=46551 SYN |
2019-11-10 20:00:39 |
| 211.143.246.38 | attack | Nov 10 12:10:26 tux-35-217 sshd\[28379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38 user=root Nov 10 12:10:28 tux-35-217 sshd\[28379\]: Failed password for root from 211.143.246.38 port 36907 ssh2 Nov 10 12:16:11 tux-35-217 sshd\[28433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38 user=root Nov 10 12:16:13 tux-35-217 sshd\[28433\]: Failed password for root from 211.143.246.38 port 52809 ssh2 ... |
2019-11-10 19:40:43 |
| 45.136.109.87 | attackbotsspam | 11/10/2019-06:34:17.916808 45.136.109.87 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-10 20:05:57 |