城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.129.148.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9275
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.129.148.54. IN A
;; AUTHORITY SECTION:
. 236 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:32:41 CST 2022
;; MSG SIZE rcvd: 107
Host 54.148.129.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 54.148.129.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 176.192.126.27 | attackspam | Ssh brute force |
2020-09-08 08:31:28 |
| 45.162.4.67 | attack | "$f2bV_matches" |
2020-09-08 07:58:09 |
| 173.231.59.196 | attack | arw-Joomla User : try to access forms... |
2020-09-08 08:05:36 |
| 123.59.62.57 | attackspam | Sep 7 19:51:10 server sshd[17914]: Failed password for root from 123.59.62.57 port 41108 ssh2 Sep 7 19:53:47 server sshd[21224]: Failed password for root from 123.59.62.57 port 56361 ssh2 Sep 7 19:56:34 server sshd[24903]: Failed password for root from 123.59.62.57 port 43380 ssh2 |
2020-09-08 08:16:41 |
| 106.13.134.142 | attackspambots | k+ssh-bruteforce |
2020-09-08 08:18:33 |
| 178.128.72.84 | attack | Sep 7 19:51:53 pve1 sshd[7173]: Failed password for root from 178.128.72.84 port 50032 ssh2 ... |
2020-09-08 08:25:05 |
| 77.87.32.146 | attack | Lines containing failures of 77.87.32.146 (max 1000) Sep 7 05:06:18 UTC__SANYALnet-Labs__cac12 sshd[28289]: Connection from 77.87.32.146 port 38802 on 64.137.176.96 port 22 Sep 7 05:06:40 UTC__SANYALnet-Labs__cac12 sshd[28289]: Failed password for invalid user r.r from 77.87.32.146 port 38802 ssh2 Sep 7 05:06:41 UTC__SANYALnet-Labs__cac12 sshd[28289]: Connection closed by 77.87.32.146 port 38802 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=77.87.32.146 |
2020-09-08 08:02:12 |
| 139.99.5.210 | attackbotsspam | Sep 8 00:02:55 fhem-rasp sshd[4268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.5.210 user=daemon Sep 8 00:02:57 fhem-rasp sshd[4268]: Failed password for invalid user daemon from 139.99.5.210 port 43603 ssh2 ... |
2020-09-08 08:00:19 |
| 117.69.159.58 | attack | Sep 7 20:06:21 srv01 postfix/smtpd\[19167\]: warning: unknown\[117.69.159.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 7 20:06:32 srv01 postfix/smtpd\[19167\]: warning: unknown\[117.69.159.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 7 20:06:48 srv01 postfix/smtpd\[19167\]: warning: unknown\[117.69.159.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 7 20:07:06 srv01 postfix/smtpd\[19167\]: warning: unknown\[117.69.159.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 7 20:07:17 srv01 postfix/smtpd\[19167\]: warning: unknown\[117.69.159.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-08 08:06:44 |
| 167.71.134.241 | attackbotsspam | Sep 7 21:48:54 plex-server sshd[3137048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.134.241 Sep 7 21:48:54 plex-server sshd[3137048]: Invalid user apps from 167.71.134.241 port 57634 Sep 7 21:48:56 plex-server sshd[3137048]: Failed password for invalid user apps from 167.71.134.241 port 57634 ssh2 Sep 7 21:52:29 plex-server sshd[3138628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.134.241 user=root Sep 7 21:52:31 plex-server sshd[3138628]: Failed password for root from 167.71.134.241 port 33460 ssh2 ... |
2020-09-08 08:03:31 |
| 151.255.234.212 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-08 08:35:05 |
| 175.181.104.69 | attackspam | Sep 7 18:50:52 ks10 sshd[894800]: Failed password for root from 175.181.104.69 port 57794 ssh2 ... |
2020-09-08 08:21:45 |
| 94.102.49.159 | attackspam | [H1] Blocked by UFW |
2020-09-08 08:27:31 |
| 185.108.182.94 | attackbots | Sep 8 01:00:05 mail sshd[14633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.108.182.94 Sep 8 01:00:07 mail sshd[14633]: Failed password for invalid user nagios from 185.108.182.94 port 27414 ssh2 ... |
2020-09-08 08:07:44 |
| 167.71.146.237 | attack | SSH Invalid Login |
2020-09-08 07:57:33 |