城市(city): unknown
省份(region): unknown
国家(country): Norway
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.111.13.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.111.13.34. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 22:11:17 CST 2025
;; MSG SIZE rcvd: 106
34.13.111.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-111-13-x.hidden-host.tietoevry.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.13.111.139.in-addr.arpa name = tietoevry-owned-address-139-111-13-x.hidden-host.tietoevry.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 39.108.6.185 | attack | Failed password for root from 39.108.6.185 port 40648 ssh2 |
2020-06-30 06:53:08 |
| 134.175.129.204 | attack | Invalid user kgn from 134.175.129.204 port 55654 |
2020-06-30 07:05:32 |
| 2.224.168.43 | attackspam | Invalid user bca from 2.224.168.43 port 54464 |
2020-06-30 06:59:44 |
| 124.167.226.214 | attackspam | SSH/22 MH Probe, BF, Hack - |
2020-06-30 07:01:03 |
| 112.85.42.178 | attackspambots | Jun 29 23:46:27 gestao sshd[9329]: Failed password for root from 112.85.42.178 port 33611 ssh2 Jun 29 23:46:31 gestao sshd[9329]: Failed password for root from 112.85.42.178 port 33611 ssh2 Jun 29 23:46:35 gestao sshd[9329]: Failed password for root from 112.85.42.178 port 33611 ssh2 Jun 29 23:46:39 gestao sshd[9329]: Failed password for root from 112.85.42.178 port 33611 ssh2 ... |
2020-06-30 06:52:31 |
| 95.167.225.81 | attack | 5x Failed Password |
2020-06-30 06:38:17 |
| 207.154.236.97 | attack | C1,WP POST /suche/wp-login.php |
2020-06-30 06:44:47 |
| 13.82.169.159 | attack | 2020-06-29 16:57:37.596524-0500 localhost sshd[46941]: Failed password for root from 13.82.169.159 port 41793 ssh2 |
2020-06-30 06:37:57 |
| 190.12.62.252 | attack | Brute forcing RDP port 3389 |
2020-06-30 06:47:43 |
| 109.239.58.100 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-06-30 07:04:46 |
| 84.241.56.76 | attackspam | attack to sql! |
2020-06-30 06:54:58 |
| 124.42.83.34 | attackspambots | 2020-06-29T04:26:53.4902741495-001 sshd[41992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.83.34 user=root 2020-06-29T04:26:55.0440511495-001 sshd[41992]: Failed password for root from 124.42.83.34 port 50262 ssh2 2020-06-29T04:30:25.4398851495-001 sshd[42171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.83.34 user=root 2020-06-29T04:30:26.7630541495-001 sshd[42171]: Failed password for root from 124.42.83.34 port 44140 ssh2 2020-06-29T17:57:06.6960131495-001 sshd[9593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.83.34 user=root 2020-06-29T17:57:08.9667191495-001 sshd[9593]: Failed password for root from 124.42.83.34 port 50648 ssh2 ... |
2020-06-30 07:03:35 |
| 146.185.163.81 | attackbotsspam | WordPress wp-login brute force :: 146.185.163.81 0.100 BYPASS [29/Jun/2020:19:47:32 0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2003 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-30 06:40:24 |
| 119.17.221.61 | attack | Jun 29 23:40:49 pkdns2 sshd\[28527\]: Invalid user francois from 119.17.221.61Jun 29 23:40:51 pkdns2 sshd\[28527\]: Failed password for invalid user francois from 119.17.221.61 port 33956 ssh2Jun 29 23:44:40 pkdns2 sshd\[28689\]: Invalid user zj from 119.17.221.61Jun 29 23:44:42 pkdns2 sshd\[28689\]: Failed password for invalid user zj from 119.17.221.61 port 34334 ssh2Jun 29 23:48:33 pkdns2 sshd\[28920\]: Invalid user jader from 119.17.221.61Jun 29 23:48:34 pkdns2 sshd\[28920\]: Failed password for invalid user jader from 119.17.221.61 port 34692 ssh2 ... |
2020-06-30 06:49:30 |
| 106.13.92.150 | attackbotsspam | Jun 30 00:08:33 * sshd[27692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.92.150 Jun 30 00:08:35 * sshd[27692]: Failed password for invalid user ms from 106.13.92.150 port 41002 ssh2 |
2020-06-30 06:33:22 |