城市(city): Jakarta
省份(region): Jakarta
国家(country): Indonesia
运营商(isp): Esia
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.0.43.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2398
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.0.43.237. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:03:25 CST 2022
;; MSG SIZE rcvd: 105
237.43.0.139.in-addr.arpa domain name pointer fm-dyn-139-0-43-237.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
237.43.0.139.in-addr.arpa name = fm-dyn-139-0-43-237.fast.net.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.131.79.140 | attackspambots | 10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined node-superagent/4.1.0 |
2019-07-20 23:28:44 |
| 142.254.109.204 | attackspam | Wordpress Admin Login attack |
2019-07-20 22:46:22 |
| 103.61.37.14 | attack | Jul 20 17:42:47 srv-4 sshd\[32527\]: Invalid user developer from 103.61.37.14 Jul 20 17:42:47 srv-4 sshd\[32527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.61.37.14 Jul 20 17:42:48 srv-4 sshd\[32527\]: Failed password for invalid user developer from 103.61.37.14 port 59166 ssh2 ... |
2019-07-20 22:48:44 |
| 210.77.89.215 | attackspambots | Jul 20 16:31:39 OPSO sshd\[7087\]: Invalid user cashier from 210.77.89.215 port 45319 Jul 20 16:31:39 OPSO sshd\[7087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.77.89.215 Jul 20 16:31:41 OPSO sshd\[7087\]: Failed password for invalid user cashier from 210.77.89.215 port 45319 ssh2 Jul 20 16:37:33 OPSO sshd\[8083\]: Invalid user ubuntu from 210.77.89.215 port 4255 Jul 20 16:37:33 OPSO sshd\[8083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.77.89.215 |
2019-07-20 22:50:47 |
| 134.209.98.58 | attackspam | Jul 20 13:39:55 XXX sshd[29697]: Invalid user admin from 134.209.98.58 port 60056 |
2019-07-20 23:22:54 |
| 153.36.242.114 | attackbotsspam | Jul 20 16:55:26 * sshd[5381]: Failed password for root from 153.36.242.114 port 29389 ssh2 |
2019-07-20 23:38:06 |
| 51.75.21.57 | attack | Jul 20 14:53:01 animalibera sshd[21750]: Invalid user sdtdserver from 51.75.21.57 port 38384 ... |
2019-07-20 23:14:42 |
| 111.223.73.20 | attack | Jul 20 16:48:38 ubuntu-2gb-nbg1-dc3-1 sshd[19848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.223.73.20 Jul 20 16:48:40 ubuntu-2gb-nbg1-dc3-1 sshd[19848]: Failed password for invalid user cloud from 111.223.73.20 port 59732 ssh2 ... |
2019-07-20 23:15:17 |
| 94.244.179.119 | attackspam | Jul 16 13:09:53 mail sshd[12891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.244.179.119.nash.net.ua Jul 16 13:09:55 mail sshd[12891]: Failed password for invalid user XXX from 94.244.179.119 port 43400 ssh2 Jul 16 13:09:55 mail sshd[12891]: Received disconnect from 94.244.179.119: 11: Bye Bye [preauth] Jul 16 14:04:43 mail sshd[21768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.244.179.119.nash.net.ua ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=94.244.179.119 |
2019-07-20 23:20:17 |
| 188.166.31.205 | attack | Invalid user peng from 188.166.31.205 port 39698 |
2019-07-20 23:44:24 |
| 86.195.244.22 | attackbotsspam | Jul 20 13:39:39 rpi sshd[11238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.195.244.22 Jul 20 13:39:41 rpi sshd[11238]: Failed password for invalid user ssh from 86.195.244.22 port 57472 ssh2 |
2019-07-20 22:53:13 |
| 68.183.83.166 | attackspambots | Jul 20 12:54:48 master sshd[18047]: Failed password for invalid user fake from 68.183.83.166 port 60630 ssh2 Jul 20 12:54:51 master sshd[18050]: Failed password for invalid user user from 68.183.83.166 port 36898 ssh2 Jul 20 12:54:56 master sshd[18060]: Failed password for invalid user ubnt from 68.183.83.166 port 41392 ssh2 Jul 20 12:54:59 master sshd[18062]: Failed password for invalid user admin from 68.183.83.166 port 46412 ssh2 Jul 20 12:55:03 master sshd[18064]: Failed password for root from 68.183.83.166 port 50494 ssh2 Jul 20 12:55:07 master sshd[18066]: Failed password for invalid user admin from 68.183.83.166 port 54488 ssh2 |
2019-07-20 23:28:05 |
| 186.121.243.218 | attackbotsspam | Jul 20 05:29:42 cac1d2 sshd\[22641\]: Invalid user nms from 186.121.243.218 port 51573 Jul 20 05:29:42 cac1d2 sshd\[22641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.121.243.218 Jul 20 05:29:43 cac1d2 sshd\[22641\]: Failed password for invalid user nms from 186.121.243.218 port 51573 ssh2 ... |
2019-07-20 23:15:54 |
| 161.142.162.144 | attackbots | C1,WP GET /lappan/wp-login.php |
2019-07-20 22:44:03 |
| 36.91.50.251 | attackspam | 2019-07-20T14:34:54.806925abusebot-3.cloudsearch.cf sshd\[27520\]: Invalid user anna from 36.91.50.251 port 44460 |
2019-07-20 22:54:33 |