城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.49.16.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13798
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;121.49.16.139. IN A
;; AUTHORITY SECTION:
. 406 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020021200 1800 900 604800 86400
;; Query time: 384 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 01:04:41 CST 2020
;; MSG SIZE rcvd: 117
Host 139.16.49.121.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server: 100.100.2.136
Address: 100.100.2.136#53
** server can't find 139.16.49.121.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
45.249.94.149 | attackbots | Invalid user felix from 45.249.94.149 port 59037 |
2020-08-26 02:28:54 |
49.233.85.15 | attackspambots | Invalid user back from 49.233.85.15 port 39066 |
2020-08-26 02:28:09 |
118.25.196.31 | attack | 2020-08-25T19:03:52.740807ns386461 sshd\[3389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.196.31 user=root 2020-08-25T19:03:54.594508ns386461 sshd\[3389\]: Failed password for root from 118.25.196.31 port 41956 ssh2 2020-08-25T19:11:30.206066ns386461 sshd\[10042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.196.31 user=root 2020-08-25T19:11:32.270545ns386461 sshd\[10042\]: Failed password for root from 118.25.196.31 port 53374 ssh2 2020-08-25T19:12:25.734482ns386461 sshd\[10853\]: Invalid user postgres from 118.25.196.31 port 58806 ... |
2020-08-26 02:14:49 |
148.235.57.184 | attackspambots | detected by Fail2Ban |
2020-08-26 02:09:29 |
144.34.203.241 | attack | Aug 25 17:13:14 ns382633 sshd\[13693\]: Invalid user lyq from 144.34.203.241 port 52172 Aug 25 17:13:14 ns382633 sshd\[13693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.203.241 Aug 25 17:13:16 ns382633 sshd\[13693\]: Failed password for invalid user lyq from 144.34.203.241 port 52172 ssh2 Aug 25 17:26:15 ns382633 sshd\[16161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.203.241 user=root Aug 25 17:26:16 ns382633 sshd\[16161\]: Failed password for root from 144.34.203.241 port 48530 ssh2 |
2020-08-26 02:10:06 |
148.228.19.2 | attackspam | 2020-08-25 10:38:46.132262-0500 localhost sshd[16041]: Failed password for invalid user dki from 148.228.19.2 port 40234 ssh2 |
2020-08-26 02:09:46 |
34.92.228.170 | attack | Invalid user coracaobobo from 34.92.228.170 port 43396 |
2020-08-26 01:59:07 |
1.179.185.50 | attackbotsspam | Aug 25 07:59:56 george sshd[10199]: Failed password for invalid user uta from 1.179.185.50 port 47896 ssh2 Aug 25 08:04:24 george sshd[10280]: Invalid user jack from 1.179.185.50 port 54166 Aug 25 08:04:24 george sshd[10280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50 Aug 25 08:04:26 george sshd[10280]: Failed password for invalid user jack from 1.179.185.50 port 54166 ssh2 Aug 25 08:08:53 george sshd[10316]: Invalid user hml from 1.179.185.50 port 60436 ... |
2020-08-26 02:00:28 |
181.48.79.178 | attackspambots | Aug 25 19:44:00 abendstille sshd\[614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.79.178 user=root Aug 25 19:44:02 abendstille sshd\[614\]: Failed password for root from 181.48.79.178 port 46700 ssh2 Aug 25 19:48:47 abendstille sshd\[5687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.79.178 user=root Aug 25 19:48:48 abendstille sshd\[5687\]: Failed password for root from 181.48.79.178 port 55434 ssh2 Aug 25 19:53:20 abendstille sshd\[10590\]: Invalid user noc from 181.48.79.178 Aug 25 19:53:20 abendstille sshd\[10590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.79.178 ... |
2020-08-26 02:05:23 |
106.54.140.250 | attack | Aug 25 18:55:08 ajax sshd[21481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.140.250 Aug 25 18:55:10 ajax sshd[21481]: Failed password for invalid user tester from 106.54.140.250 port 60432 ssh2 |
2020-08-26 02:16:52 |
190.12.66.27 | attackbots | Aug 25 19:19:18 marvibiene sshd[25509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.12.66.27 Aug 25 19:19:19 marvibiene sshd[25509]: Failed password for invalid user qadmin from 190.12.66.27 port 42848 ssh2 |
2020-08-26 02:03:39 |
159.65.15.86 | attackspambots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-25T14:46:56Z and 2020-08-25T14:52:15Z |
2020-08-26 02:08:11 |
104.223.143.101 | attack | Aug 25 19:50:53 nextcloud sshd\[648\]: Invalid user student from 104.223.143.101 Aug 25 19:50:53 nextcloud sshd\[648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.223.143.101 Aug 25 19:50:55 nextcloud sshd\[648\]: Failed password for invalid user student from 104.223.143.101 port 57830 ssh2 |
2020-08-26 02:19:00 |
213.32.70.208 | attackbots | $f2bV_matches |
2020-08-26 02:01:29 |
220.133.36.112 | attack | Aug 25 19:25:15 santamaria sshd\[15362\]: Invalid user btc from 220.133.36.112 Aug 25 19:25:15 santamaria sshd\[15362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.36.112 Aug 25 19:25:17 santamaria sshd\[15362\]: Failed password for invalid user btc from 220.133.36.112 port 57557 ssh2 ... |
2020-08-26 02:01:15 |