城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.140.76.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55721
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.140.76.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030201 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 03 03:20:34 CST 2025
;; MSG SIZE rcvd: 106
Host 42.76.140.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 42.76.140.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.198.191.217 | attackbotsspam | Jul 24 22:00:38 rush sshd[20667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217 Jul 24 22:00:40 rush sshd[20667]: Failed password for invalid user support from 139.198.191.217 port 45264 ssh2 Jul 24 22:02:22 rush sshd[20777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217 ... |
2020-07-25 06:11:22 |
| 119.242.206.166 | attackbots | Unauthorized connection attempt from IP address 119.242.206.166 on Port 445(SMB) |
2020-07-25 06:29:42 |
| 77.210.180.9 | attackbots | Jul 24 23:49:21 ovpn sshd\[7742\]: Invalid user stage from 77.210.180.9 Jul 24 23:49:21 ovpn sshd\[7742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.210.180.9 Jul 24 23:49:23 ovpn sshd\[7742\]: Failed password for invalid user stage from 77.210.180.9 port 53508 ssh2 Jul 25 00:02:25 ovpn sshd\[10941\]: Invalid user pj from 77.210.180.9 Jul 25 00:02:25 ovpn sshd\[10941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.210.180.9 |
2020-07-25 06:07:51 |
| 113.196.32.36 | attackbotsspam | Honeypot attack, port: 445, PTR: 113.196.32.36.ll.static.sparqnet.net. |
2020-07-25 06:01:07 |
| 167.172.195.99 | attack | Jul 24 15:00:24 dignus sshd[15303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.195.99 Jul 24 15:00:26 dignus sshd[15303]: Failed password for invalid user swa from 167.172.195.99 port 35088 ssh2 Jul 24 15:02:10 dignus sshd[15478]: Invalid user admin from 167.172.195.99 port 35554 Jul 24 15:02:10 dignus sshd[15478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.195.99 Jul 24 15:02:12 dignus sshd[15478]: Failed password for invalid user admin from 167.172.195.99 port 35554 ssh2 ... |
2020-07-25 06:21:01 |
| 138.68.92.121 | attackbotsspam | 2020-07-24T17:36:40.2197961495-001 sshd[61250]: Invalid user rrl from 138.68.92.121 port 53882 2020-07-24T17:36:42.9010231495-001 sshd[61250]: Failed password for invalid user rrl from 138.68.92.121 port 53882 ssh2 2020-07-24T17:42:29.3729111495-001 sshd[61535]: Invalid user admin from 138.68.92.121 port 39020 2020-07-24T17:42:29.3763921495-001 sshd[61535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.92.121 2020-07-24T17:42:29.3729111495-001 sshd[61535]: Invalid user admin from 138.68.92.121 port 39020 2020-07-24T17:42:31.6319811495-001 sshd[61535]: Failed password for invalid user admin from 138.68.92.121 port 39020 ssh2 ... |
2020-07-25 06:09:35 |
| 179.191.88.58 | attackbots | Jul 25 00:02:26 lnxmysql61 sshd[11836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.88.58 |
2020-07-25 06:06:21 |
| 87.250.74.253 | attackbotsspam | Unauthorized access to SSH at 24/Jul/2020:22:02:28 +0000. Received: (SSH-2.0-libssh2_1.8.0) |
2020-07-25 06:05:26 |
| 122.51.127.17 | attackspambots | 2020-07-25T00:56:51.046145mail.standpoint.com.ua sshd[31267]: Invalid user ftp2 from 122.51.127.17 port 38234 2020-07-25T00:56:51.048887mail.standpoint.com.ua sshd[31267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.127.17 2020-07-25T00:56:51.046145mail.standpoint.com.ua sshd[31267]: Invalid user ftp2 from 122.51.127.17 port 38234 2020-07-25T00:56:53.641377mail.standpoint.com.ua sshd[31267]: Failed password for invalid user ftp2 from 122.51.127.17 port 38234 ssh2 2020-07-25T01:00:53.363208mail.standpoint.com.ua sshd[32094]: Invalid user user2 from 122.51.127.17 port 45598 ... |
2020-07-25 06:20:06 |
| 14.18.190.5 | attack | Jul 25 00:02:01 santamaria sshd\[16216\]: Invalid user wzj from 14.18.190.5 Jul 25 00:02:01 santamaria sshd\[16216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.190.5 Jul 25 00:02:02 santamaria sshd\[16216\]: Failed password for invalid user wzj from 14.18.190.5 port 40902 ssh2 ... |
2020-07-25 06:30:52 |
| 60.167.177.172 | attackspambots | malicious Brute-Force reported by https://www.patrick-binder.de ... |
2020-07-25 06:11:10 |
| 47.184.64.96 | attack | 2020-07-24T21:56:18.938231shield sshd\[21226\]: Invalid user test from 47.184.64.96 port 54724 2020-07-24T21:56:18.947441shield sshd\[21226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-184-64-96.dlls.tx.frontiernet.net 2020-07-24T21:56:21.683750shield sshd\[21226\]: Failed password for invalid user test from 47.184.64.96 port 54724 ssh2 2020-07-24T22:02:18.207892shield sshd\[21822\]: Invalid user ian from 47.184.64.96 port 43328 2020-07-24T22:02:18.217461shield sshd\[21822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47-184-64-96.dlls.tx.frontiernet.net |
2020-07-25 06:16:36 |
| 106.12.171.65 | attack | Jul 24 23:17:13 rocket sshd[7190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.171.65 Jul 24 23:17:15 rocket sshd[7190]: Failed password for invalid user duke from 106.12.171.65 port 45482 ssh2 ... |
2020-07-25 06:25:08 |
| 5.196.72.11 | attack | 2020-07-25 00:02:21,615 fail2ban.actions: WARNING [ssh] Ban 5.196.72.11 |
2020-07-25 06:17:24 |
| 106.124.135.232 | attackspambots | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-24T21:43:28Z and 2020-07-24T22:02:22Z |
2020-07-25 06:11:37 |