城市(city): unknown
省份(region): unknown
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.219.194.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.219.194.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 14:42:56 CST 2025
;; MSG SIZE rcvd: 108
138.194.219.121.in-addr.arpa domain name pointer cpe-121-219-194-138.bpjl-r-032.lon.vic.bigpond.net.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.194.219.121.in-addr.arpa name = cpe-121-219-194-138.bpjl-r-032.lon.vic.bigpond.net.au.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.235.142.92 | attack | Sep 20 21:30:10 plex sshd[10585]: Invalid user prios from 49.235.142.92 port 51096 |
2019-09-21 04:05:48 |
| 139.59.77.237 | attack | Sep 20 21:45:43 mail sshd\[3807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237 Sep 20 21:45:45 mail sshd\[3807\]: Failed password for invalid user service from 139.59.77.237 port 45815 ssh2 Sep 20 21:50:16 mail sshd\[4609\]: Invalid user yue from 139.59.77.237 port 38169 Sep 20 21:50:16 mail sshd\[4609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.237 Sep 20 21:50:18 mail sshd\[4609\]: Failed password for invalid user yue from 139.59.77.237 port 38169 ssh2 |
2019-09-21 03:59:36 |
| 218.92.0.155 | attackspam | Sep 20 20:59:19 MK-Soft-Root2 sshd\[17723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.155 user=root Sep 20 20:59:21 MK-Soft-Root2 sshd\[17723\]: Failed password for root from 218.92.0.155 port 3039 ssh2 Sep 20 20:59:24 MK-Soft-Root2 sshd\[17723\]: Failed password for root from 218.92.0.155 port 3039 ssh2 ... |
2019-09-21 03:33:33 |
| 43.226.69.143 | attack | Sep 20 21:51:40 mail sshd\[4790\]: Invalid user jeevankala from 43.226.69.143 port 48600 Sep 20 21:51:40 mail sshd\[4790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.143 Sep 20 21:51:42 mail sshd\[4790\]: Failed password for invalid user jeevankala from 43.226.69.143 port 48600 ssh2 Sep 20 21:56:12 mail sshd\[5278\]: Invalid user michielan from 43.226.69.143 port 59474 Sep 20 21:56:12 mail sshd\[5278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.143 |
2019-09-21 04:01:02 |
| 106.12.11.160 | attackspam | Sep 20 21:27:47 rpi sshd[10142]: Failed password for news from 106.12.11.160 port 53624 ssh2 |
2019-09-21 03:44:16 |
| 85.113.60.3 | attack | 2019-09-20T20:00:10.709886abusebot-2.cloudsearch.cf sshd\[21559\]: Invalid user default from 85.113.60.3 port 51594 |
2019-09-21 04:08:17 |
| 77.247.110.138 | attack | \[2019-09-20 14:18:14\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-20T14:18:14.241-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00064201148343508004",SessionID="0x7fcd8c3dbe48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.138/57612",ACLName="no_extension_match" \[2019-09-20 14:20:46\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-20T14:20:46.757-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0002064201148585359005",SessionID="0x7fcd8c0fdb08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.138/51121",ACLName="no_extension_match" \[2019-09-20 14:21:23\] SECURITY\[2283\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-20T14:21:23.384-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0001063601148556213002",SessionID="0x7fcd8c3dbe48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.138/ |
2019-09-21 03:40:23 |
| 80.211.238.5 | attack | Sep 20 20:57:47 mail sshd\[30191\]: Failed password for invalid user admin. from 80.211.238.5 port 48744 ssh2 Sep 20 21:02:07 mail sshd\[31192\]: Invalid user test1 from 80.211.238.5 port 34808 Sep 20 21:02:07 mail sshd\[31192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.238.5 Sep 20 21:02:09 mail sshd\[31192\]: Failed password for invalid user test1 from 80.211.238.5 port 34808 ssh2 Sep 20 21:06:21 mail sshd\[31642\]: Invalid user supervisor from 80.211.238.5 port 49104 |
2019-09-21 04:00:13 |
| 54.39.145.31 | attackbotsspam | Sep 20 09:20:55 hcbb sshd\[25381\]: Invalid user windows from 54.39.145.31 Sep 20 09:20:55 hcbb sshd\[25381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.ip-54-39-145.net Sep 20 09:20:57 hcbb sshd\[25381\]: Failed password for invalid user windows from 54.39.145.31 port 58524 ssh2 Sep 20 09:24:55 hcbb sshd\[25708\]: Invalid user Aaliyah from 54.39.145.31 Sep 20 09:24:55 hcbb sshd\[25708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.ip-54-39-145.net |
2019-09-21 03:33:14 |
| 46.101.43.224 | attackbotsspam | Sep 20 09:33:36 wbs sshd\[26906\]: Invalid user seb from 46.101.43.224 Sep 20 09:33:36 wbs sshd\[26906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224 Sep 20 09:33:38 wbs sshd\[26906\]: Failed password for invalid user seb from 46.101.43.224 port 51935 ssh2 Sep 20 09:38:52 wbs sshd\[27386\]: Invalid user skid from 46.101.43.224 Sep 20 09:38:52 wbs sshd\[27386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224 |
2019-09-21 03:48:34 |
| 202.120.38.28 | attack | Sep 20 19:55:08 ip-172-31-1-72 sshd\[4192\]: Invalid user student from 202.120.38.28 Sep 20 19:55:08 ip-172-31-1-72 sshd\[4192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.38.28 Sep 20 19:55:10 ip-172-31-1-72 sshd\[4192\]: Failed password for invalid user student from 202.120.38.28 port 14785 ssh2 Sep 20 20:00:12 ip-172-31-1-72 sshd\[4252\]: Invalid user ts3bot from 202.120.38.28 Sep 20 20:00:12 ip-172-31-1-72 sshd\[4252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.38.28 |
2019-09-21 04:04:10 |
| 190.191.194.9 | attackbots | Invalid user userftp |
2019-09-21 03:55:47 |
| 70.37.49.155 | attackbotsspam | 2019-09-20T19:26:09.847209abusebot-5.cloudsearch.cf sshd\[16835\]: Invalid user stanphill from 70.37.49.155 port 38126 |
2019-09-21 03:43:28 |
| 197.252.1.238 | attackbotsspam | Sep 20 20:19:26 xzibhostname postfix/smtpd[21324]: connect from unknown[197.252.1.238] Sep 20 20:19:27 xzibhostname postfix/smtpd[21324]: warning: unknown[197.252.1.238]: SASL CRAM-MD5 authentication failed: authentication failure Sep 20 20:19:27 xzibhostname postfix/smtpd[21324]: warning: unknown[197.252.1.238]: SASL PLAIN authentication failed: authentication failure Sep 20 20:19:28 xzibhostname postfix/smtpd[21324]: warning: unknown[197.252.1.238]: SASL LOGIN authentication failed: authentication failure Sep 20 20:19:28 xzibhostname postfix/smtpd[21324]: lost connection after AUTH from unknown[197.252.1.238] Sep 20 20:19:28 xzibhostname postfix/smtpd[21324]: disconnect from unknown[197.252.1.238] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=197.252.1.238 |
2019-09-21 03:41:22 |
| 177.67.75.226 | attack | 19/9/20@14:21:06: FAIL: Alarm-Intrusion address from=177.67.75.226 19/9/20@14:21:06: FAIL: Alarm-Intrusion address from=177.67.75.226 ... |
2019-09-21 03:51:17 |