城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.239.141.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.239.141.180. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 01:27:37 CST 2025
;; MSG SIZE rcvd: 108
Host 180.141.239.114.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 180.141.239.114.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.13.193.235 | attack | $f2bV_matches_ltvn |
2019-08-20 15:52:20 |
| 58.249.125.38 | attackspambots | Aug 20 00:06:04 ny01 sshd[11954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.125.38 Aug 20 00:06:06 ny01 sshd[11954]: Failed password for invalid user m1 from 58.249.125.38 port 45458 ssh2 Aug 20 00:08:19 ny01 sshd[12216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.249.125.38 |
2019-08-20 15:59:48 |
| 139.59.90.40 | attack | Aug 20 09:15:36 meumeu sshd[29312]: Failed password for invalid user source from 139.59.90.40 port 41599 ssh2 Aug 20 09:20:32 meumeu sshd[29889]: Failed password for invalid user rebeca from 139.59.90.40 port 24378 ssh2 ... |
2019-08-20 15:44:05 |
| 1.179.182.82 | attackspam | Aug 20 07:50:51 sshgateway sshd\[29101\]: Invalid user postgres from 1.179.182.82 Aug 20 07:50:51 sshgateway sshd\[29101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.182.82 Aug 20 07:50:53 sshgateway sshd\[29101\]: Failed password for invalid user postgres from 1.179.182.82 port 54166 ssh2 |
2019-08-20 16:03:36 |
| 138.94.211.164 | attack | $f2bV_matches |
2019-08-20 16:08:32 |
| 121.67.44.191 | attackspambots | Aug 20 08:44:23 jane sshd\[1460\]: Invalid user user1 from 121.67.44.191 port 37638 Aug 20 08:44:23 jane sshd\[1460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.44.191 Aug 20 08:44:24 jane sshd\[1460\]: Failed password for invalid user user1 from 121.67.44.191 port 37638 ssh2 ... |
2019-08-20 16:01:42 |
| 41.90.8.14 | attack | 2019-08-20T07:30:35.720564abusebot-8.cloudsearch.cf sshd\[18469\]: Invalid user iulian from 41.90.8.14 port 44418 |
2019-08-20 15:47:28 |
| 54.36.126.81 | attackspambots | Aug 20 06:52:56 vps691689 sshd[17584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.126.81 Aug 20 06:52:58 vps691689 sshd[17584]: Failed password for invalid user plesk from 54.36.126.81 port 11208 ssh2 ... |
2019-08-20 15:46:52 |
| 5.88.0.234 | attack | Aug 20 04:08:13 localhost sshd\[59633\]: Invalid user corentin from 5.88.0.234 port 52594 Aug 20 04:08:13 localhost sshd\[59633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.88.0.234 Aug 20 04:08:15 localhost sshd\[59633\]: Failed password for invalid user corentin from 5.88.0.234 port 52594 ssh2 Aug 20 04:08:30 localhost sshd\[59647\]: Invalid user larissa from 5.88.0.234 port 54024 Aug 20 04:08:30 localhost sshd\[59647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.88.0.234 ... |
2019-08-20 15:50:07 |
| 94.230.135.178 | attack | 445/tcp [2019-08-20]1pkt |
2019-08-20 16:02:16 |
| 149.28.135.47 | attackspam | Aug 20 09:38:29 legacy sshd[29392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.28.135.47 Aug 20 09:38:30 legacy sshd[29392]: Failed password for invalid user hal from 149.28.135.47 port 40272 ssh2 Aug 20 09:47:07 legacy sshd[29604]: Failed password for daemon from 149.28.135.47 port 49636 ssh2 ... |
2019-08-20 15:53:09 |
| 175.165.176.138 | attack | 5500/tcp [2019-08-20]1pkt |
2019-08-20 15:54:45 |
| 190.244.20.16 | attack | $f2bV_matches |
2019-08-20 16:04:48 |
| 51.75.169.236 | attack | Aug 20 09:37:00 meumeu sshd[32056]: Failed password for invalid user zl from 51.75.169.236 port 35990 ssh2 Aug 20 09:40:59 meumeu sshd[32480]: Failed password for invalid user ubuntu from 51.75.169.236 port 58591 ssh2 Aug 20 09:45:03 meumeu sshd[428]: Failed password for invalid user joerg from 51.75.169.236 port 52962 ssh2 ... |
2019-08-20 16:03:06 |
| 121.78.137.14 | attack | Aug 19 21:29:29 hcbb sshd\[2765\]: Invalid user db1 from 121.78.137.14 Aug 19 21:29:29 hcbb sshd\[2765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.78.137.14 Aug 19 21:29:31 hcbb sshd\[2765\]: Failed password for invalid user db1 from 121.78.137.14 port 60974 ssh2 Aug 19 21:34:42 hcbb sshd\[3406\]: Invalid user toor from 121.78.137.14 Aug 19 21:34:42 hcbb sshd\[3406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.78.137.14 |
2019-08-20 15:46:31 |