城市(city): unknown
省份(region): unknown
国家(country): Norway
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.113.140.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.113.140.207. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:22:54 CST 2025
;; MSG SIZE rcvd: 108
207.140.113.139.in-addr.arpa domain name pointer tietoevry-owned-address-139-113-140-x.hidden-host.tietoevry.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
207.140.113.139.in-addr.arpa name = tietoevry-owned-address-139-113-140-x.hidden-host.tietoevry.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 178.128.107.61 | attack | SSH-BruteForce |
2019-07-25 06:46:44 |
| 58.241.227.3 | attackbotsspam | k+ssh-bruteforce |
2019-07-25 06:25:59 |
| 45.122.221.122 | attackbotsspam | Automatic report - Banned IP Access |
2019-07-25 06:47:19 |
| 187.45.193.221 | attack | WordPress brute force |
2019-07-25 06:43:48 |
| 170.245.112.162 | attackspam | Jul 24 11:36:21 mail postfix/postscreen[95761]: PREGREET 43 after 0.58 from [170.245.112.162]:48842: EHLO dynamic-170.245.112.162.fbnet.com.br ... |
2019-07-25 06:33:08 |
| 139.219.0.173 | attack | Many RDP login attempts detected by IDS script |
2019-07-25 07:02:39 |
| 207.244.70.35 | attackbots | Jul 25 00:22:48 apollo sshd\[25604\]: Failed password for root from 207.244.70.35 port 34256 ssh2Jul 25 00:22:52 apollo sshd\[25604\]: Failed password for root from 207.244.70.35 port 34256 ssh2Jul 25 00:22:54 apollo sshd\[25604\]: Failed password for root from 207.244.70.35 port 34256 ssh2 ... |
2019-07-25 06:32:44 |
| 117.60.141.200 | attack | Jul 24 19:19:26 lively sshd[7868]: Bad protocol version identification '' from 117.60.141.200 port 33318 Jul 24 19:19:28 lively sshd[7869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.60.141.200 user=r.r Jul 24 19:19:30 lively sshd[7869]: Failed password for r.r from 117.60.141.200 port 33451 ssh2 Jul 24 19:19:31 lively sshd[7869]: Connection closed by authenticating user r.r 117.60.141.200 port 33451 [preauth] Jul 24 19:19:34 lively sshd[7871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.60.141.200 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=117.60.141.200 |
2019-07-25 06:22:49 |
| 59.145.221.103 | attackspam | Jul 25 00:47:34 eventyay sshd[24391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.145.221.103 Jul 25 00:47:35 eventyay sshd[24391]: Failed password for invalid user api from 59.145.221.103 port 42676 ssh2 Jul 25 00:54:36 eventyay sshd[26094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.145.221.103 ... |
2019-07-25 07:07:46 |
| 160.153.153.29 | attack | Automatic report - Banned IP Access |
2019-07-25 06:51:22 |
| 103.234.38.123 | attackbots | WordPress brute force |
2019-07-25 06:56:48 |
| 68.183.83.82 | attack | Jul 25 01:49:43 server2 sshd\[1439\]: Invalid user fake from 68.183.83.82 Jul 25 01:49:44 server2 sshd\[1443\]: Invalid user user from 68.183.83.82 Jul 25 01:49:46 server2 sshd\[1445\]: Invalid user ubnt from 68.183.83.82 Jul 25 01:49:47 server2 sshd\[1447\]: Invalid user admin from 68.183.83.82 Jul 25 01:49:48 server2 sshd\[1450\]: User root from 68.183.83.82 not allowed because not listed in AllowUsers Jul 25 01:49:50 server2 sshd\[1453\]: Invalid user admin from 68.183.83.82 |
2019-07-25 06:53:28 |
| 185.94.111.1 | attackbotsspam | Unauthorized connection attempt from IP address 185.94.111.1 on Port 137(NETBIOS) |
2019-07-25 06:28:23 |
| 5.152.148.252 | attackbots | Jul 24 19:37:56 srv-4 sshd\[13476\]: Invalid user admin from 5.152.148.252 Jul 24 19:37:56 srv-4 sshd\[13476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.152.148.252 Jul 24 19:37:58 srv-4 sshd\[13476\]: Failed password for invalid user admin from 5.152.148.252 port 46316 ssh2 ... |
2019-07-25 06:28:04 |
| 185.176.26.101 | attackbots | Splunk® : port scan detected: Jul 24 18:53:42 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=185.176.26.101 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=38198 PROTO=TCP SPT=41515 DPT=7079 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-07-25 07:07:31 |