城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.127.117.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17769
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.127.117.54. IN A
;; AUTHORITY SECTION:
. 179 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 23:01:09 CST 2022
;; MSG SIZE rcvd: 107
Host 54.117.127.139.in-addr.arpa not found: 2(SERVFAIL)
server can't find 139.127.117.54.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 152.136.220.127 | attack | Oct 12 22:30:51 PorscheCustomer sshd[9729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.220.127 Oct 12 22:30:53 PorscheCustomer sshd[9729]: Failed password for invalid user joy from 152.136.220.127 port 44448 ssh2 Oct 12 22:36:06 PorscheCustomer sshd[9892]: Failed password for root from 152.136.220.127 port 35782 ssh2 ... |
2020-10-13 04:41:50 |
| 92.63.197.74 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 82 - port: 21111 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-13 04:51:28 |
| 221.9.189.52 | attack | Telnet Server BruteForce Attack |
2020-10-13 04:30:45 |
| 218.245.5.248 | attack | 2020-10-12T10:37:52.661424yoshi.linuxbox.ninja sshd[3171265]: Invalid user nut from 218.245.5.248 port 63184 2020-10-12T10:37:54.808026yoshi.linuxbox.ninja sshd[3171265]: Failed password for invalid user nut from 218.245.5.248 port 63184 ssh2 2020-10-12T10:40:59.538645yoshi.linuxbox.ninja sshd[3173336]: Invalid user tomcat from 218.245.5.248 port 35013 ... |
2020-10-13 04:41:20 |
| 71.6.147.254 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 63 - port: 8822 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-13 04:51:45 |
| 201.208.234.162 | attackspam | Port scan on 1 port(s): 445 |
2020-10-13 04:53:41 |
| 175.123.253.220 | attack | 2020-10-12T22:42:00.388153mail0 sshd[15079]: User root from 175.123.253.220 not allowed because not listed in AllowUsers 2020-10-12T22:42:02.696010mail0 sshd[15079]: Failed password for invalid user root from 175.123.253.220 port 37286 ssh2 2020-10-12T22:45:46.257301mail0 sshd[15455]: User root from 175.123.253.220 not allowed because not listed in AllowUsers ... |
2020-10-13 04:47:31 |
| 198.46.154.246 | attack | Criminal Connection Attempt(s) On Port 3389 Referred For Investigation |
2020-10-13 04:19:47 |
| 60.215.202.140 | attackspambots | Blocked by Sophos UTM Network Protection / proto=6 . srcport=9910 . dstport=23 Telnet . (3492) |
2020-10-13 04:42:20 |
| 139.59.84.29 | attackbots | Oct 12 22:08:20 electroncash sshd[65175]: Failed password for root from 139.59.84.29 port 33886 ssh2 Oct 12 22:12:01 electroncash sshd[1507]: Invalid user wesley from 139.59.84.29 port 37440 Oct 12 22:12:01 electroncash sshd[1507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29 Oct 12 22:12:01 electroncash sshd[1507]: Invalid user wesley from 139.59.84.29 port 37440 Oct 12 22:12:03 electroncash sshd[1507]: Failed password for invalid user wesley from 139.59.84.29 port 37440 ssh2 ... |
2020-10-13 04:27:24 |
| 118.25.114.245 | attackspambots | SSH login attempts. |
2020-10-13 04:45:04 |
| 157.245.237.33 | attack | (sshd) Failed SSH login from 157.245.237.33 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 12 09:15:51 server2 sshd[4215]: Invalid user zy from 157.245.237.33 Oct 12 09:15:51 server2 sshd[4215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.237.33 Oct 12 09:15:53 server2 sshd[4215]: Failed password for invalid user zy from 157.245.237.33 port 37958 ssh2 Oct 12 09:25:36 server2 sshd[9552]: Invalid user rd from 157.245.237.33 Oct 12 09:25:36 server2 sshd[9552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.237.33 |
2020-10-13 04:29:05 |
| 167.248.133.18 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-10-13 04:55:22 |
| 101.109.70.70 | attackbots | Automatic report - Port Scan Attack |
2020-10-13 04:18:22 |
| 187.189.11.49 | attackbotsspam | Oct 12 19:11:24 XXX sshd[40294]: Invalid user ttmsmail from 187.189.11.49 port 42518 |
2020-10-13 04:38:28 |