城市(city): Guiyang
省份(region): Guizhou
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.138.99.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16605
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.138.99.139. IN A
;; AUTHORITY SECTION:
. 109 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019110102 1800 900 604800 86400
;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 04:56:49 CST 2019
;; MSG SIZE rcvd: 118
Host 139.99.138.114.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.99.138.114.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.77.146.136 | attack | Aug 15 11:41:55 sachi sshd\[18003\]: Invalid user rock from 51.77.146.136 Aug 15 11:41:55 sachi sshd\[18003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.ip-51-77-146.eu Aug 15 11:41:56 sachi sshd\[18003\]: Failed password for invalid user rock from 51.77.146.136 port 34486 ssh2 Aug 15 11:46:13 sachi sshd\[18405\]: Invalid user rm from 51.77.146.136 Aug 15 11:46:13 sachi sshd\[18405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.ip-51-77-146.eu |
2019-08-16 05:56:10 |
| 128.65.152.67 | attack | Automatic report - Port Scan Attack |
2019-08-16 06:15:22 |
| 68.183.2.153 | attackbotsspam | Aug 15 22:48:36 mail postfix/smtpd\[11990\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Aug 15 22:51:04 mail postfix/smtpd\[11834\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Aug 15 23:17:47 mail postfix/smtpd\[12829\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Aug 15 23:53:32 mail postfix/smtpd\[13786\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-08-16 06:19:23 |
| 94.102.56.181 | attack | 08/15/2019-17:41:14.303953 94.102.56.181 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-08-16 05:53:05 |
| 128.199.118.81 | attack | $f2bV_matches |
2019-08-16 06:13:48 |
| 52.82.18.101 | attackspambots | Aug 15 19:15:26 db01 sshd[10257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-82-18-101.cn-northwest-1.compute.amazonaws.com.cn user=r.r Aug 15 19:15:28 db01 sshd[10257]: Failed password for r.r from 52.82.18.101 port 20104 ssh2 Aug 15 19:15:28 db01 sshd[10257]: Received disconnect from 52.82.18.101: 11: Bye Bye [preauth] Aug 15 19:39:32 db01 sshd[12243]: Connection closed by 52.82.18.101 [preauth] Aug 15 19:43:14 db01 sshd[12699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-82-18-101.cn-northwest-1.compute.amazonaws.com.cn user=r.r Aug 15 19:43:16 db01 sshd[12699]: Failed password for r.r from 52.82.18.101 port 14681 ssh2 Aug 15 19:43:17 db01 sshd[12699]: Received disconnect from 52.82.18.101: 11: Bye Bye [preauth] Aug 15 19:47:28 db01 sshd[13073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-82-18-101.cn-northwest-1......... ------------------------------- |
2019-08-16 05:48:14 |
| 122.114.212.200 | attackbots | 08/15/2019-17:38:58.511036 122.114.212.200 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306 |
2019-08-16 06:10:49 |
| 139.215.217.181 | attack | Aug 15 18:10:17 xtremcommunity sshd\[8312\]: Invalid user 123 from 139.215.217.181 port 47911 Aug 15 18:10:17 xtremcommunity sshd\[8312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181 Aug 15 18:10:19 xtremcommunity sshd\[8312\]: Failed password for invalid user 123 from 139.215.217.181 port 47911 ssh2 Aug 15 18:13:56 xtremcommunity sshd\[8466\]: Invalid user 123456 from 139.215.217.181 port 35307 Aug 15 18:13:56 xtremcommunity sshd\[8466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.181 ... |
2019-08-16 06:18:53 |
| 34.200.137.172 | attackspambots | Invalid user adriana from 34.200.137.172 port 37488 |
2019-08-16 06:06:42 |
| 114.42.144.246 | attackspambots | 23/tcp [2019-08-15]1pkt |
2019-08-16 06:20:36 |
| 123.25.50.45 | attackspam | 445/tcp [2019-08-15]1pkt |
2019-08-16 06:16:27 |
| 113.23.109.123 | attackspambots | 445/tcp [2019-08-15]1pkt |
2019-08-16 06:07:00 |
| 92.222.92.114 | attackbots | Aug 15 21:38:35 web8 sshd\[25290\]: Invalid user freight from 92.222.92.114 Aug 15 21:38:35 web8 sshd\[25290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.92.114 Aug 15 21:38:37 web8 sshd\[25290\]: Failed password for invalid user freight from 92.222.92.114 port 48342 ssh2 Aug 15 21:42:48 web8 sshd\[27497\]: Invalid user counter from 92.222.92.114 Aug 15 21:42:48 web8 sshd\[27497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.92.114 |
2019-08-16 06:04:51 |
| 112.85.42.172 | attackspam | $f2bV_matches |
2019-08-16 06:09:12 |
| 167.86.114.22 | attack | Aug 15 11:41:24 friendsofhawaii sshd\[8797\]: Invalid user express from 167.86.114.22 Aug 15 11:41:24 friendsofhawaii sshd\[8797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi266900.contaboserver.net Aug 15 11:41:26 friendsofhawaii sshd\[8797\]: Failed password for invalid user express from 167.86.114.22 port 43984 ssh2 Aug 15 11:45:38 friendsofhawaii sshd\[9164\]: Invalid user eva from 167.86.114.22 Aug 15 11:45:38 friendsofhawaii sshd\[9164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi266900.contaboserver.net |
2019-08-16 05:50:43 |