城市(city): unknown
省份(region): unknown
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.50.96.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42206
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.50.96.139. IN A
;; AUTHORITY SECTION:
. 547 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022120500 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 05 20:09:44 CST 2022
;; MSG SIZE rcvd: 106
139.96.50.137.in-addr.arpa domain name pointer oa-edu-96-139.wireless.abdn.ac.uk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.96.50.137.in-addr.arpa name = oa-edu-96-139.wireless.abdn.ac.uk.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 128.72.31.28 | attackspambots | Jul 23 00:51:48 ws22vmsma01 sshd[144243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.72.31.28 ... |
2020-07-23 18:20:46 |
| 45.225.162.255 | attack | Invalid user crew from 45.225.162.255 port 58418 |
2020-07-23 18:21:51 |
| 138.197.166.66 | attackbotsspam | Fail2Ban Ban Triggered |
2020-07-23 18:04:25 |
| 182.61.49.179 | attackbotsspam | Invalid user felix from 182.61.49.179 port 44032 |
2020-07-23 18:25:10 |
| 45.2.251.126 | attackbots | TCP ports : 5038 / 50802 |
2020-07-23 18:26:53 |
| 60.12.220.16 | attack | 2020-07-22 UTC: (2x) - test(2x) |
2020-07-23 17:56:10 |
| 222.186.30.112 | attackspam | Jul 23 12:18:00 vps sshd[458625]: Failed password for root from 222.186.30.112 port 24945 ssh2 Jul 23 12:18:02 vps sshd[458625]: Failed password for root from 222.186.30.112 port 24945 ssh2 Jul 23 12:18:05 vps sshd[459430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root Jul 23 12:18:06 vps sshd[459430]: Failed password for root from 222.186.30.112 port 48946 ssh2 Jul 23 12:18:08 vps sshd[459430]: Failed password for root from 222.186.30.112 port 48946 ssh2 ... |
2020-07-23 18:23:47 |
| 51.178.78.154 | attack | SmallBizIT.US 3 packets to tcp(2080,3389,4445) |
2020-07-23 18:06:17 |
| 198.211.120.99 | attack | Jul 23 09:30:24 v22019038103785759 sshd\[22725\]: Invalid user vertica from 198.211.120.99 port 36104 Jul 23 09:30:24 v22019038103785759 sshd\[22725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.120.99 Jul 23 09:30:26 v22019038103785759 sshd\[22725\]: Failed password for invalid user vertica from 198.211.120.99 port 36104 ssh2 Jul 23 09:34:16 v22019038103785759 sshd\[22854\]: Invalid user vianney from 198.211.120.99 port 50750 Jul 23 09:34:16 v22019038103785759 sshd\[22854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.120.99 ... |
2020-07-23 18:13:00 |
| 66.249.75.82 | attackbots | Automatic report - Banned IP Access |
2020-07-23 18:19:23 |
| 121.254.254.82 | attackspambots | - |
2020-07-23 18:15:09 |
| 213.32.78.219 | attackspam | Jul 23 05:50:34 ny01 sshd[14550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.78.219 Jul 23 05:50:36 ny01 sshd[14550]: Failed password for invalid user aman from 213.32.78.219 port 55592 ssh2 Jul 23 05:54:37 ny01 sshd[14954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.78.219 |
2020-07-23 17:55:47 |
| 198.199.125.87 | attackbotsspam | Invalid user tong from 198.199.125.87 port 45244 |
2020-07-23 18:03:24 |
| 61.155.233.227 | attackbots | Jul 23 11:41:31 buvik sshd[29475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.155.233.227 Jul 23 11:41:34 buvik sshd[29475]: Failed password for invalid user km from 61.155.233.227 port 46510 ssh2 Jul 23 11:43:11 buvik sshd[29683]: Invalid user overview from 61.155.233.227 ... |
2020-07-23 18:03:50 |
| 200.118.57.190 | attackspam | Jul 23 11:04:29 ncomp sshd[24495]: Invalid user sentry from 200.118.57.190 Jul 23 11:04:29 ncomp sshd[24495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.118.57.190 Jul 23 11:04:29 ncomp sshd[24495]: Invalid user sentry from 200.118.57.190 Jul 23 11:04:31 ncomp sshd[24495]: Failed password for invalid user sentry from 200.118.57.190 port 39156 ssh2 |
2020-07-23 18:13:33 |