城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.16.249.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.16.249.13. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 06:49:07 CST 2025
;; MSG SIZE rcvd: 106
Host 13.249.16.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 13.249.16.138.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.42.213 | attack | Oct 3 22:20:39 abendstille sshd\[17704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213 user=root Oct 3 22:20:40 abendstille sshd\[17704\]: Failed password for root from 222.186.42.213 port 14428 ssh2 Oct 3 22:20:52 abendstille sshd\[17817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213 user=root Oct 3 22:20:54 abendstille sshd\[17817\]: Failed password for root from 222.186.42.213 port 48291 ssh2 Oct 3 22:21:03 abendstille sshd\[18154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213 user=root ... |
2020-10-04 04:39:09 |
| 5.39.81.217 | attackspam | 2020-10-03T19:07:50.580702shield sshd\[7384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3268691.ip-5-39-81.eu user=root 2020-10-03T19:07:52.612832shield sshd\[7384\]: Failed password for root from 5.39.81.217 port 50890 ssh2 2020-10-03T19:13:55.218967shield sshd\[7898\]: Invalid user gast from 5.39.81.217 port 58846 2020-10-03T19:13:55.227929shield sshd\[7898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3268691.ip-5-39-81.eu 2020-10-03T19:13:57.033189shield sshd\[7898\]: Failed password for invalid user gast from 5.39.81.217 port 58846 ssh2 |
2020-10-04 05:07:51 |
| 170.239.226.27 | attackspambots | Oct 2 16:26:59 josie sshd[27931]: Did not receive identification string from 170.239.226.27 Oct 2 16:26:59 josie sshd[27930]: Did not receive identification string from 170.239.226.27 Oct 2 16:26:59 josie sshd[27932]: Did not receive identification string from 170.239.226.27 Oct 2 16:26:59 josie sshd[27933]: Did not receive identification string from 170.239.226.27 Oct 2 16:27:04 josie sshd[27961]: Invalid user admina from 170.239.226.27 Oct 2 16:27:04 josie sshd[27959]: Invalid user admina from 170.239.226.27 Oct 2 16:27:04 josie sshd[27956]: Invalid user admina from 170.239.226.27 Oct 2 16:27:04 josie sshd[27958]: Invalid user admina from 170.239.226.27 Oct 2 16:27:04 josie sshd[27961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.239.226.27 Oct 2 16:27:04 josie sshd[27959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.239.226.27 Oct 2 16:27:04 josie sshd[27956]:........ ------------------------------- |
2020-10-04 04:42:55 |
| 188.166.178.42 | attack | 2020-10-03T20:56:11.781414shield sshd\[18569\]: Invalid user ftpuser from 188.166.178.42 port 38880 2020-10-03T20:56:11.788042shield sshd\[18569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.178.42 2020-10-03T20:56:13.950898shield sshd\[18569\]: Failed password for invalid user ftpuser from 188.166.178.42 port 38880 ssh2 2020-10-03T21:00:12.648132shield sshd\[18898\]: Invalid user admin from 188.166.178.42 port 47608 2020-10-03T21:00:12.656530shield sshd\[18898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.178.42 |
2020-10-04 05:06:33 |
| 182.254.195.46 | attackspam | 2020-10-03T03:21:23.160334hostname sshd[49089]: Failed password for invalid user ai from 182.254.195.46 port 35868 ssh2 ... |
2020-10-04 04:44:56 |
| 1.255.48.197 | attackspambots | (From annabelle@merchantpay.top) I have a quick question about working with your business. Like most business owners you just want to survive through to 2021. In order for that to happen you need to save every dollar possible right? This is an honest question, would you continue with the high credit card processing fees if there was another way? New laws are on your side. Test this newly released card processing model this October - just send a phone number and we'll call. $24.99/mo Flat Fee Credit Card Processing (Unlimited) 1) As a small business owner accepting credit/debit, recently passed State Laws are on your side. - Were you aware? New state regulations now in effect, the law was successfully passed in 46 states - effective since August 2019. Since that date you shouldn't be paying above 0.75% Credit Card Processing Fees. 2) You're legally able to demand this new option. Bottom Line: Your processor isn't telling you everything. Why are they hiding the lower fee options? We repre |
2020-10-04 04:44:26 |
| 167.99.66.74 | attackbotsspam | Oct 3 19:42:56 vps-51d81928 sshd[541165]: Failed password for invalid user candy from 167.99.66.74 port 45781 ssh2 Oct 3 19:47:13 vps-51d81928 sshd[541271]: Invalid user oracle from 167.99.66.74 port 49555 Oct 3 19:47:13 vps-51d81928 sshd[541271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.74 Oct 3 19:47:13 vps-51d81928 sshd[541271]: Invalid user oracle from 167.99.66.74 port 49555 Oct 3 19:47:15 vps-51d81928 sshd[541271]: Failed password for invalid user oracle from 167.99.66.74 port 49555 ssh2 ... |
2020-10-04 05:04:25 |
| 61.155.2.142 | attackspambots | SSH Brute-Force reported by Fail2Ban |
2020-10-04 04:49:38 |
| 165.22.98.186 | attackspambots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-03T15:04:51Z and 2020-10-03T15:15:01Z |
2020-10-04 04:46:14 |
| 119.250.155.73 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-10-04 05:05:46 |
| 112.238.151.20 | attackbotsspam | REQUESTED PAGE: /GponForm/diag_Form?images/ |
2020-10-04 05:02:34 |
| 140.143.207.57 | attack | Oct 3 22:20:48 cho sshd[4146872]: Failed password for invalid user lucas from 140.143.207.57 port 33944 ssh2 Oct 3 22:25:26 cho sshd[4147200]: Invalid user noc from 140.143.207.57 port 59114 Oct 3 22:25:26 cho sshd[4147200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.207.57 Oct 3 22:25:26 cho sshd[4147200]: Invalid user noc from 140.143.207.57 port 59114 Oct 3 22:25:29 cho sshd[4147200]: Failed password for invalid user noc from 140.143.207.57 port 59114 ssh2 ... |
2020-10-04 04:57:12 |
| 83.239.38.2 | attack | Oct 2 16:17:17 *hidden* sshd[12275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.239.38.2 Oct 2 16:17:20 *hidden* sshd[12275]: Failed password for invalid user admin from 83.239.38.2 port 58160 ssh2 Oct 2 16:26:41 *hidden* sshd[16513]: Invalid user tom from 83.239.38.2 port 33522 |
2020-10-04 04:46:39 |
| 187.213.150.159 | attackspam | Lines containing failures of 187.213.150.159 Oct 2 22:35:58 shared10 sshd[10165]: Did not receive identification string from 187.213.150.159 port 61862 Oct 2 22:36:03 shared10 sshd[10199]: Invalid user adminixxxr from 187.213.150.159 port 28589 Oct 2 22:36:03 shared10 sshd[10199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.213.150.159 Oct 2 22:36:05 shared10 sshd[10199]: Failed password for invalid user adminixxxr from 187.213.150.159 port 28589 ssh2 Oct 2 22:36:05 shared10 sshd[10199]: Connection closed by invalid user adminixxxr 187.213.150.159 port 28589 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=187.213.150.159 |
2020-10-04 05:14:11 |
| 220.247.201.109 | attackspam | Oct 3 19:00:19 abendstille sshd\[20204\]: Invalid user andre from 220.247.201.109 Oct 3 19:00:19 abendstille sshd\[20204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.201.109 Oct 3 19:00:21 abendstille sshd\[20204\]: Failed password for invalid user andre from 220.247.201.109 port 54014 ssh2 Oct 3 19:05:06 abendstille sshd\[24375\]: Invalid user open from 220.247.201.109 Oct 3 19:05:06 abendstille sshd\[24375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.247.201.109 ... |
2020-10-04 05:06:12 |