城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.129.79.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.129.79.40. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 01:45:05 CST 2025
;; MSG SIZE rcvd: 106
Host 40.79.129.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 40.79.129.138.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 113.182.231.208 | attackspambots | Unauthorized connection attempt from IP address 113.182.231.208 on Port 445(SMB) |
2020-08-06 21:21:26 |
| 164.132.42.32 | attackbotsspam | 2020-08-05 UTC: (42x) - root(42x) |
2020-08-06 21:13:42 |
| 181.49.118.185 | attack | Aug 6 10:31:22 marvibiene sshd[20074]: Failed password for root from 181.49.118.185 port 48478 ssh2 |
2020-08-06 20:35:54 |
| 45.184.24.5 | attack | Aug 6 11:03:09 v22019038103785759 sshd\[25443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.24.5 user=root Aug 6 11:03:12 v22019038103785759 sshd\[25443\]: Failed password for root from 45.184.24.5 port 36450 ssh2 Aug 6 11:07:41 v22019038103785759 sshd\[25575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.24.5 user=root Aug 6 11:07:43 v22019038103785759 sshd\[25575\]: Failed password for root from 45.184.24.5 port 46154 ssh2 Aug 6 11:12:16 v22019038103785759 sshd\[25757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.24.5 user=root ... |
2020-08-06 20:59:40 |
| 139.155.86.214 | attackbotsspam | Aug 6 15:27:03 hosting sshd[24673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.86.214 user=root Aug 6 15:27:06 hosting sshd[24673]: Failed password for root from 139.155.86.214 port 35916 ssh2 ... |
2020-08-06 20:54:52 |
| 129.204.8.130 | attackbotsspam | Unauthorized connection attempt detected from IP address 129.204.8.130 to port 80 |
2020-08-06 21:11:04 |
| 139.155.86.143 | attack | Aug 6 07:06:47 inter-technics sshd[14839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.86.143 user=root Aug 6 07:06:49 inter-technics sshd[14839]: Failed password for root from 139.155.86.143 port 55932 ssh2 Aug 6 07:11:50 inter-technics sshd[15317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.86.143 user=root Aug 6 07:11:52 inter-technics sshd[15317]: Failed password for root from 139.155.86.143 port 56132 ssh2 Aug 6 07:16:47 inter-technics sshd[15567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.86.143 user=root Aug 6 07:16:49 inter-technics sshd[15567]: Failed password for root from 139.155.86.143 port 56336 ssh2 ... |
2020-08-06 21:18:04 |
| 151.232.92.1 | attackbots | 08/06/2020-01:17:37.740235 151.232.92.1 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-08-06 20:37:37 |
| 27.70.200.164 | attack | 08/06/2020-01:17:30.450305 27.70.200.164 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-08-06 20:41:59 |
| 118.140.183.42 | attack | Aug 6 07:56:27 ns382633 sshd\[19438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.140.183.42 user=root Aug 6 07:56:29 ns382633 sshd\[19438\]: Failed password for root from 118.140.183.42 port 58124 ssh2 Aug 6 08:04:06 ns382633 sshd\[20593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.140.183.42 user=root Aug 6 08:04:09 ns382633 sshd\[20593\]: Failed password for root from 118.140.183.42 port 58940 ssh2 Aug 6 08:09:47 ns382633 sshd\[21470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.140.183.42 user=root |
2020-08-06 20:59:59 |
| 88.130.71.153 | attack | Aug 6 07:16:55 prod4 sshd\[20932\]: Invalid user pi from 88.130.71.153 Aug 6 07:16:55 prod4 sshd\[20935\]: Invalid user pi from 88.130.71.153 Aug 6 07:16:57 prod4 sshd\[20932\]: Failed password for invalid user pi from 88.130.71.153 port 40468 ssh2 ... |
2020-08-06 21:07:39 |
| 183.128.233.138 | attackspambots | Aug 5 17:00:38 server sshd[30247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.128.233.138 user=r.r Aug 5 17:00:40 server sshd[30247]: Failed password for r.r from 183.128.233.138 port 39969 ssh2 Aug 5 17:00:41 server sshd[30247]: Received disconnect from 183.128.233.138: 11: Bye Bye [preauth] Aug 5 17:19:42 server sshd[30537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.128.233.138 user=r.r Aug 5 17:19:44 server sshd[30537]: Failed password for r.r from 183.128.233.138 port 4673 ssh2 Aug 5 17:19:44 server sshd[30537]: Received disconnect from 183.128.233.138: 11: Bye Bye [preauth] Aug 5 17:25:04 server sshd[30692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.128.233.138 user=r.r Aug 5 17:25:06 server sshd[30692]: Failed password for r.r from 183.128.233.138 port 18273 ssh2 Aug 5 17:25:06 server sshd[30692]: Received........ ------------------------------- |
2020-08-06 21:17:26 |
| 27.115.50.114 | attack | Aug 6 11:37:25 vps647732 sshd[13842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.115.50.114 Aug 6 11:37:27 vps647732 sshd[13842]: Failed password for invalid user sipa!@#$qwertyuiop from 27.115.50.114 port 27372 ssh2 ... |
2020-08-06 21:14:31 |
| 138.197.194.207 | attackbots | plussize.fitness 138.197.194.207 [06/Aug/2020:13:33:33 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" plussize.fitness 138.197.194.207 [06/Aug/2020:13:33:34 +0200] "POST /wp-login.php HTTP/1.1" 200 5909 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-06 20:57:49 |
| 162.247.74.7 | attackbots | C1,WP POST /wp-login.php |
2020-08-06 20:54:21 |