城市(city): unknown
省份(region): unknown
国家(country): Norway
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.107.28.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.107.28.14. IN A
;; AUTHORITY SECTION:
. 389 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019100800 1800 900 604800 86400
;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 08 22:48:28 CST 2019
;; MSG SIZE rcvd: 117
Host 14.28.107.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 14.28.107.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 111.223.53.117 | attackspambots | 2019-08-20T05:42:06.307757abusebot.cloudsearch.cf sshd\[1821\]: Invalid user ritchie from 111.223.53.117 port 52810 |
2019-08-20 16:34:05 |
| 139.215.217.180 | attackspam | Aug 19 21:34:07 lcdev sshd\[13652\]: Invalid user mellow from 139.215.217.180 Aug 19 21:34:07 lcdev sshd\[13652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180 Aug 19 21:34:09 lcdev sshd\[13652\]: Failed password for invalid user mellow from 139.215.217.180 port 57265 ssh2 Aug 19 21:40:09 lcdev sshd\[14292\]: Invalid user bc from 139.215.217.180 Aug 19 21:40:09 lcdev sshd\[14292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180 |
2019-08-20 15:46:02 |
| 94.102.56.151 | attackspambots | *Port Scan* detected from 94.102.56.151 (NL/Netherlands/no-reverse-dns-configured.com). 11 hits in the last 155 seconds |
2019-08-20 16:14:28 |
| 37.139.13.105 | attackspambots | 2019-08-20T07:37:20.261513abusebot-5.cloudsearch.cf sshd\[28168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105 user=root |
2019-08-20 16:31:03 |
| 41.90.8.14 | attack | 2019-08-20T07:30:35.720564abusebot-8.cloudsearch.cf sshd\[18469\]: Invalid user iulian from 41.90.8.14 port 44418 |
2019-08-20 15:47:28 |
| 174.138.20.132 | attack | SSH/22 MH Probe, BF, Hack - |
2019-08-20 16:12:37 |
| 64.210.41.86 | attackspambots | Aug 20 09:39:24 srv206 sshd[1450]: Invalid user gitlab from 64.210.41.86 ... |
2019-08-20 15:58:02 |
| 68.183.148.29 | attackbots | SSH Brute-Force attacks |
2019-08-20 15:59:07 |
| 140.143.25.160 | attackspam | Triggered by Fail2Ban at Ares web server |
2019-08-20 16:17:57 |
| 201.22.95.52 | attack | Aug 19 21:53:06 hcbb sshd\[5247\]: Invalid user sudo from 201.22.95.52 Aug 19 21:53:06 hcbb sshd\[5247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.95.52.static.gvt.net.br Aug 19 21:53:08 hcbb sshd\[5247\]: Failed password for invalid user sudo from 201.22.95.52 port 45497 ssh2 Aug 19 21:59:04 hcbb sshd\[5798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.95.52.static.gvt.net.br user=root Aug 19 21:59:06 hcbb sshd\[5798\]: Failed password for root from 201.22.95.52 port 38948 ssh2 |
2019-08-20 16:16:10 |
| 144.76.236.112 | attackbots | 20 attempts against mh-misbehave-ban on plane.magehost.pro |
2019-08-20 16:17:30 |
| 1.179.182.82 | attackspam | Aug 20 07:50:51 sshgateway sshd\[29101\]: Invalid user postgres from 1.179.182.82 Aug 20 07:50:51 sshgateway sshd\[29101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.182.82 Aug 20 07:50:53 sshgateway sshd\[29101\]: Failed password for invalid user postgres from 1.179.182.82 port 54166 ssh2 |
2019-08-20 16:03:36 |
| 175.165.176.138 | attack | 5500/tcp [2019-08-20]1pkt |
2019-08-20 15:54:45 |
| 121.78.137.14 | attack | Aug 19 21:29:29 hcbb sshd\[2765\]: Invalid user db1 from 121.78.137.14 Aug 19 21:29:29 hcbb sshd\[2765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.78.137.14 Aug 19 21:29:31 hcbb sshd\[2765\]: Failed password for invalid user db1 from 121.78.137.14 port 60974 ssh2 Aug 19 21:34:42 hcbb sshd\[3406\]: Invalid user toor from 121.78.137.14 Aug 19 21:34:42 hcbb sshd\[3406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.78.137.14 |
2019-08-20 15:46:31 |
| 125.27.83.134 | attackspam | 445/tcp [2019-08-20]1pkt |
2019-08-20 15:57:11 |