城市(city): unknown
省份(region): unknown
国家(country): Guam
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.142.246.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10682
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.142.246.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 00:50:21 CST 2025
;; MSG SIZE rcvd: 108
139.246.142.114.in-addr.arpa domain name pointer 114-142-246-139.dsl.teleguam.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.246.142.114.in-addr.arpa name = 114-142-246-139.dsl.teleguam.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 60.167.177.107 | attack | Jul 26 14:07:03 mout sshd[9612]: Connection closed by 60.167.177.107 port 40430 [preauth] |
2020-07-26 21:10:18 |
| 185.47.65.30 | attackbotsspam | Jul 26 14:07:03 h2829583 sshd[16714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.47.65.30 |
2020-07-26 21:09:34 |
| 220.133.192.68 | attackbots | port scan and connect, tcp 88 (kerberos-sec) |
2020-07-26 21:08:02 |
| 167.99.137.75 | attack | Jul 26 13:06:33 l02a sshd[7788]: Invalid user admin from 167.99.137.75 Jul 26 13:06:33 l02a sshd[7788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.137.75 Jul 26 13:06:33 l02a sshd[7788]: Invalid user admin from 167.99.137.75 Jul 26 13:06:35 l02a sshd[7788]: Failed password for invalid user admin from 167.99.137.75 port 49726 ssh2 |
2020-07-26 21:37:34 |
| 115.58.198.211 | attackbotsspam | Jul 26 13:06:22 ms-srv sshd[32168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.58.198.211 Jul 26 13:06:25 ms-srv sshd[32168]: Failed password for invalid user ggg from 115.58.198.211 port 54876 ssh2 |
2020-07-26 21:46:37 |
| 43.226.146.129 | attackbots | Jul 26 12:03:17 124388 sshd[29062]: Invalid user anais from 43.226.146.129 port 45376 Jul 26 12:03:17 124388 sshd[29062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.146.129 Jul 26 12:03:17 124388 sshd[29062]: Invalid user anais from 43.226.146.129 port 45376 Jul 26 12:03:18 124388 sshd[29062]: Failed password for invalid user anais from 43.226.146.129 port 45376 ssh2 Jul 26 12:06:51 124388 sshd[29209]: Invalid user mailroom from 43.226.146.129 port 32812 |
2020-07-26 21:22:51 |
| 79.124.62.202 | attackbots | Excessive Port-Scanning |
2020-07-26 21:36:41 |
| 47.74.48.89 | attackspam | $f2bV_matches |
2020-07-26 21:11:00 |
| 211.90.39.117 | attack | Jul 26 13:08:43 scw-6657dc sshd[31034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.90.39.117 Jul 26 13:08:43 scw-6657dc sshd[31034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.90.39.117 Jul 26 13:08:44 scw-6657dc sshd[31034]: Failed password for invalid user transfer from 211.90.39.117 port 41472 ssh2 ... |
2020-07-26 21:40:01 |
| 165.22.253.190 | attack | Jul 26 15:14:44 vps639187 sshd\[23459\]: Invalid user operatore from 165.22.253.190 port 19064 Jul 26 15:14:44 vps639187 sshd\[23459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.253.190 Jul 26 15:14:46 vps639187 sshd\[23459\]: Failed password for invalid user operatore from 165.22.253.190 port 19064 ssh2 ... |
2020-07-26 21:22:12 |
| 144.34.130.211 | attackbots | 2020-07-26T08:09:31.655058morrigan.ad5gb.com sshd[4147748]: Invalid user virtual from 144.34.130.211 port 41516 2020-07-26T08:09:34.060986morrigan.ad5gb.com sshd[4147748]: Failed password for invalid user virtual from 144.34.130.211 port 41516 ssh2 |
2020-07-26 21:17:33 |
| 176.31.11.112 | attack | Jul 25 22:37:44 cumulus sshd[12666]: Invalid user wz from 176.31.11.112 port 59792 Jul 25 22:37:44 cumulus sshd[12666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.11.112 Jul 25 22:37:45 cumulus sshd[12666]: Failed password for invalid user wz from 176.31.11.112 port 59792 ssh2 Jul 25 22:37:45 cumulus sshd[12666]: Received disconnect from 176.31.11.112 port 59792:11: Bye Bye [preauth] Jul 25 22:37:45 cumulus sshd[12666]: Disconnected from 176.31.11.112 port 59792 [preauth] Jul 25 22:43:03 cumulus sshd[13333]: Invalid user gay from 176.31.11.112 port 56200 Jul 25 22:43:03 cumulus sshd[13333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.11.112 Jul 25 22:43:04 cumulus sshd[13333]: Failed password for invalid user gay from 176.31.11.112 port 56200 ssh2 Jul 25 22:43:04 cumulus sshd[13333]: Received disconnect from 176.31.11.112 port 56200:11: Bye Bye [preauth] Jul 25 22:43:0........ ------------------------------- |
2020-07-26 21:12:15 |
| 152.32.166.83 | attackspambots | Jul 26 06:06:28 Host-KLAX-C sshd[26201]: Invalid user thi from 152.32.166.83 port 60420 ... |
2020-07-26 21:44:07 |
| 220.133.18.137 | attack | 2020-07-26T11:57:55.089576shield sshd\[14730\]: Invalid user jian from 220.133.18.137 port 57650 2020-07-26T11:57:55.101521shield sshd\[14730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.18.137 2020-07-26T11:57:57.070724shield sshd\[14730\]: Failed password for invalid user jian from 220.133.18.137 port 57650 ssh2 2020-07-26T12:06:47.558913shield sshd\[16273\]: Invalid user g from 220.133.18.137 port 56902 2020-07-26T12:06:47.569978shield sshd\[16273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.18.137 |
2020-07-26 21:24:42 |
| 111.229.105.250 | attackspam | Jul 26 12:41:27 rush sshd[24019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.105.250 Jul 26 12:41:29 rush sshd[24019]: Failed password for invalid user diesel from 111.229.105.250 port 40348 ssh2 Jul 26 12:47:08 rush sshd[24205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.105.250 ... |
2020-07-26 21:45:29 |