城市(city): unknown
省份(region): unknown
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.25.154.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2065
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.25.154.39. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 04:33:19 CST 2025
;; MSG SIZE rcvd: 106
39.154.25.138.in-addr.arpa domain name pointer blackfrias-39.uadmin.uts.edu.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
39.154.25.138.in-addr.arpa name = blackfrias-39.uadmin.uts.edu.au.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 62.231.175.228 | attackbotsspam | 5555/tcp 5555/tcp 5555/tcp [2019-10-30]3pkt |
2019-10-31 00:17:09 |
| 89.6.100.216 | attackspam | Automatic report - Port Scan Attack |
2019-10-30 23:55:55 |
| 221.214.181.243 | attackspambots | firewall-block, port(s): 1433/tcp |
2019-10-31 00:28:46 |
| 201.182.223.59 | attack | Oct 30 05:45:23 hanapaa sshd\[4369\]: Invalid user microgen from 201.182.223.59 Oct 30 05:45:23 hanapaa sshd\[4369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.223.59 Oct 30 05:45:25 hanapaa sshd\[4369\]: Failed password for invalid user microgen from 201.182.223.59 port 38200 ssh2 Oct 30 05:50:21 hanapaa sshd\[4770\]: Invalid user be from 201.182.223.59 Oct 30 05:50:21 hanapaa sshd\[4770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.223.59 |
2019-10-30 23:52:13 |
| 37.133.22.255 | attackspambots | Oct 29 02:03:23 indra sshd[89961]: Invalid user pi from 37.133.22.255 Oct 29 02:03:24 indra sshd[89961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.133.22.255 Oct 29 02:03:24 indra sshd[89963]: Invalid user pi from 37.133.22.255 Oct 29 02:03:24 indra sshd[89963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.133.22.255 Oct 29 02:03:26 indra sshd[89961]: Failed password for invalid user pi from 37.133.22.255 port 32778 ssh2 Oct 29 02:03:26 indra sshd[89961]: Connection closed by 37.133.22.255 [preauth] Oct 29 02:03:26 indra sshd[89963]: Failed password for invalid user pi from 37.133.22.255 port 32782 ssh2 Oct 29 02:03:26 indra sshd[89963]: Connection closed by 37.133.22.255 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=37.133.22.255 |
2019-10-31 00:10:59 |
| 37.139.4.138 | attackbots | " " |
2019-10-31 00:12:58 |
| 220.144.39.98 | attack | 23/tcp [2019-10-30]1pkt |
2019-10-31 00:10:24 |
| 114.36.84.206 | attackbotsspam | 23/tcp [2019-10-30]1pkt |
2019-10-30 23:49:03 |
| 5.143.26.191 | attackbotsspam | 2019-10-30T14:40:52.828656lon01.zurich-datacenter.net sshd\[18479\]: Invalid user eb from 5.143.26.191 port 46066 2019-10-30T14:40:52.837345lon01.zurich-datacenter.net sshd\[18479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.143.26.191 2019-10-30T14:40:54.698822lon01.zurich-datacenter.net sshd\[18479\]: Failed password for invalid user eb from 5.143.26.191 port 46066 ssh2 2019-10-30T14:45:25.267835lon01.zurich-datacenter.net sshd\[18571\]: Invalid user cn2010 from 5.143.26.191 port 55720 2019-10-30T14:45:25.276685lon01.zurich-datacenter.net sshd\[18571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.143.26.191 ... |
2019-10-30 23:46:03 |
| 62.234.68.246 | attack | Oct 30 16:37:08 server sshd\[19952\]: Invalid user adamian from 62.234.68.246 Oct 30 16:37:08 server sshd\[19952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.246 Oct 30 16:37:10 server sshd\[19952\]: Failed password for invalid user adamian from 62.234.68.246 port 42737 ssh2 Oct 30 16:57:36 server sshd\[24521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.68.246 user=root Oct 30 16:57:38 server sshd\[24521\]: Failed password for root from 62.234.68.246 port 36803 ssh2 ... |
2019-10-31 00:12:34 |
| 104.40.18.45 | attack | 2019-10-30T10:33:12.8853431495-001 sshd\[52850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.40.18.45 user=root 2019-10-30T10:33:14.4806541495-001 sshd\[52850\]: Failed password for root from 104.40.18.45 port 17152 ssh2 2019-10-30T10:40:10.9444231495-001 sshd\[53341\]: Invalid user test from 104.40.18.45 port 17152 2019-10-30T10:40:10.9479291495-001 sshd\[53341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.40.18.45 2019-10-30T10:40:13.2603491495-001 sshd\[53341\]: Failed password for invalid user test from 104.40.18.45 port 17152 ssh2 2019-10-30T10:44:15.5613081495-001 sshd\[53473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.40.18.45 user=root ... |
2019-10-30 23:59:03 |
| 222.242.104.188 | attack | 2019-10-30T15:29:50.282978hub.schaetter.us sshd\[28759\]: Invalid user anuj from 222.242.104.188 port 41408 2019-10-30T15:29:50.289762hub.schaetter.us sshd\[28759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.104.188 2019-10-30T15:29:52.035219hub.schaetter.us sshd\[28759\]: Failed password for invalid user anuj from 222.242.104.188 port 41408 ssh2 2019-10-30T15:36:57.159287hub.schaetter.us sshd\[28790\]: Invalid user 123a from 222.242.104.188 port 55496 2019-10-30T15:36:57.167451hub.schaetter.us sshd\[28790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.242.104.188 ... |
2019-10-30 23:51:21 |
| 31.185.11.173 | attack | 445/tcp 445/tcp 445/tcp [2019-10-30]3pkt |
2019-10-31 00:03:40 |
| 61.190.213.226 | attack | 1433/tcp [2019-10-30]1pkt |
2019-10-31 00:05:11 |
| 52.138.9.178 | attackspam | Oct 30 14:17:44 vps647732 sshd[25394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.138.9.178 Oct 30 14:17:46 vps647732 sshd[25394]: Failed password for invalid user irenee from 52.138.9.178 port 36316 ssh2 ... |
2019-10-30 23:58:36 |