城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.133.197.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.133.197.126. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 07:32:33 CST 2025
;; MSG SIZE rcvd: 108
Host 126.197.133.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 126.197.133.139.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
79.106.191.5 | attackspambots | Jan 15 20:00:38 vpn sshd[14296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.106.191.5 Jan 15 20:00:39 vpn sshd[14296]: Failed password for invalid user simran from 79.106.191.5 port 48232 ssh2 Jan 15 20:03:52 vpn sshd[14315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.106.191.5 |
2020-01-05 13:13:44 |
107.173.85.112 | attackspam | (From virginia.mitchell228@gmail.com) Hello there! I'm a freelance web designer seeking new clients who are open to new ideas in web design to boost their sales. I saw what you were trying to do with your site, I'd like to share a few helpful and effective ideas on how to you can improve your approach on the online market. I am also able integrate features that can help your website run the business for both you and your clients. In my 12 years of experience in web design and development, I've seen cases where upgrades on the user-interface of a website helped attract more clients and consequently gave a significant amount of business growth. If you'd like to be more familiar with the work I do, I'll send you my portfolio of designs from my past clients. I'll also give you a free consultation via a phone call, so I can share with you some expert design advice and to also know about your ideas as well. Please let me know about the best time to give you a call. Talk to you soon! Best regards, Virgin |
2020-01-05 13:24:33 |
222.186.180.142 | attack | Unauthorized connection attempt detected from IP address 222.186.180.142 to port 22 [J] |
2020-01-05 13:27:37 |
117.131.60.51 | attackspam | Jan 5 05:57:34 [munged] sshd[18832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.60.51 |
2020-01-05 13:24:02 |
79.137.33.20 | attack | Dec 22 17:21:55 vpn sshd[11106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20 Dec 22 17:21:57 vpn sshd[11106]: Failed password for invalid user cameron from 79.137.33.20 port 55721 ssh2 Dec 22 17:25:48 vpn sshd[11142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.33.20 |
2020-01-05 13:02:09 |
78.5.0.195 | attackspambots | Dec 15 17:19:20 vpn sshd[2138]: Failed password for root from 78.5.0.195 port 37184 ssh2 Dec 15 17:25:23 vpn sshd[2194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.5.0.195 Dec 15 17:25:26 vpn sshd[2194]: Failed password for invalid user www from 78.5.0.195 port 42746 ssh2 |
2020-01-05 13:32:07 |
183.220.146.249 | attackbots | Unauthorized connection attempt detected from IP address 183.220.146.249 to port 2220 [J] |
2020-01-05 13:20:16 |
78.231.133.117 | attackspam | Feb 25 11:10:22 vpn sshd[6937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.231.133.117 Feb 25 11:10:23 vpn sshd[6937]: Failed password for invalid user teamspeak from 78.231.133.117 port 46676 ssh2 Feb 25 11:18:06 vpn sshd[6959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.231.133.117 |
2020-01-05 13:41:22 |
221.146.69.105 | attack | Unauthorized connection attempt detected from IP address 221.146.69.105 to port 8080 [J] |
2020-01-05 09:46:40 |
79.109.239.49 | attackspambots | Mar 13 11:15:01 vpn sshd[15009]: Failed password for root from 79.109.239.49 port 56616 ssh2 Mar 13 11:22:03 vpn sshd[15055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.109.239.49 Mar 13 11:22:05 vpn sshd[15055]: Failed password for invalid user test from 79.109.239.49 port 38460 ssh2 |
2020-01-05 13:11:28 |
80.211.177.213 | attackspam | Unauthorized connection attempt detected from IP address 80.211.177.213 to port 2220 [J] |
2020-01-05 13:11:59 |
222.186.175.148 | attack | Jan 5 02:30:21 firewall sshd[14134]: Failed password for root from 222.186.175.148 port 40046 ssh2 Jan 5 02:30:34 firewall sshd[14134]: error: maximum authentication attempts exceeded for root from 222.186.175.148 port 40046 ssh2 [preauth] Jan 5 02:30:34 firewall sshd[14134]: Disconnecting: Too many authentication failures [preauth] ... |
2020-01-05 13:31:10 |
79.106.97.130 | attackbots | Jan 20 01:30:48 vpn sshd[6833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.106.97.130 Jan 20 01:30:50 vpn sshd[6833]: Failed password for invalid user test from 79.106.97.130 port 40365 ssh2 Jan 20 01:34:02 vpn sshd[6848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.106.97.130 |
2020-01-05 13:12:56 |
79.0.181.149 | attack | Mar 26 11:28:28 vpn sshd[30623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.0.181.149 Mar 26 11:28:29 vpn sshd[30623]: Failed password for invalid user admin from 79.0.181.149 port 58899 ssh2 Mar 26 11:35:32 vpn sshd[30645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.0.181.149 |
2020-01-05 13:16:47 |
132.232.93.48 | attack | Jan 5 04:57:50 ms-srv sshd[59994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.93.48 Jan 5 04:57:52 ms-srv sshd[59994]: Failed password for invalid user liorder from 132.232.93.48 port 44643 ssh2 |
2020-01-05 13:03:05 |