城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.152.141.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.152.141.193. IN A
;; AUTHORITY SECTION:
. 542 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031401 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 15 03:56:59 CST 2022
;; MSG SIZE rcvd: 108
b'Host 193.141.152.139.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 193.141.152.139.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
165.22.16.240 | attackbots | \[2019-07-01 08:31:18\] SECURITY\[5156\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-01T08:31:18.122-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="90110026287717491711",SessionID="0x7f13a8e39958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/165.22.16.240/49420",ACLName="no_extension_match" \[2019-07-01 08:33:54\] SECURITY\[5156\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-01T08:33:54.904-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="90901000116287717491711",SessionID="0x7f13a97428a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/165.22.16.240/50693",ACLName="no_extension_match" \[2019-07-01 08:36:40\] SECURITY\[5156\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-01T08:36:40.120-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1287450116287717491711",SessionID="0x7f13a925aa18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/165.22.16.240/56 |
2019-07-01 20:54:41 |
191.53.248.101 | attack | Jun 30 23:41:54 web1 postfix/smtpd[20674]: warning: unknown[191.53.248.101]: SASL PLAIN authentication failed: authentication failure ... |
2019-07-01 20:41:25 |
46.101.34.80 | attack | Jul 1 12:19:55 vpn01 sshd\[27152\]: Invalid user peter from 46.101.34.80 Jul 1 12:19:55 vpn01 sshd\[27152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.34.80 Jul 1 12:19:56 vpn01 sshd\[27152\]: Failed password for invalid user peter from 46.101.34.80 port 43403 ssh2 |
2019-07-01 20:22:11 |
138.94.210.114 | attack | smtp auth brute force |
2019-07-01 20:25:49 |
139.59.90.40 | attackspam | Jul 1 14:19:47 ns41 sshd[29571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.40 Jul 1 14:19:47 ns41 sshd[29571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.40 |
2019-07-01 20:52:29 |
192.99.70.12 | attackspambots | Jul 1 14:04:57 ns37 sshd[15321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.12 Jul 1 14:04:59 ns37 sshd[15321]: Failed password for invalid user nathan from 192.99.70.12 port 42160 ssh2 Jul 1 14:06:40 ns37 sshd[15452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.12 |
2019-07-01 20:32:40 |
182.61.170.251 | attack | Invalid user nagios from 182.61.170.251 port 40698 |
2019-07-01 20:53:10 |
119.42.175.200 | attack | Invalid user nagios from 119.42.175.200 port 45495 |
2019-07-01 20:30:21 |
184.105.139.68 | attack | 11211/tcp 7547/tcp 445/tcp... [2019-05-01/06-30]33pkt,17pt.(tcp),1pt.(udp) |
2019-07-01 20:29:28 |
67.205.135.127 | attackbotsspam | Invalid user vagrant4 from 67.205.135.127 port 50660 |
2019-07-01 20:47:19 |
162.212.130.145 | attack | NAME : INTERNET-BLK-A2HOS-5 CIDR : 162.212.128.0/21 DDoS attack USA - Michigan - block certain countries :) IP: 162.212.130.145 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-07-01 20:50:35 |
183.143.30.63 | attackbots | port scan and connect, tcp 23 (telnet) |
2019-07-01 21:02:35 |
85.254.72.27 | attackspambots | 0,41-02/02 concatform PostRequest-Spammer scoring: maputo01_x2b |
2019-07-01 20:38:50 |
182.255.63.57 | attackspam | Invalid user applmgr from 182.255.63.57 port 35186 |
2019-07-01 20:39:49 |
109.123.117.236 | attackbotsspam | 8080/tcp 4434/tcp 2086/tcp... [2019-05-01/07-01]16pkt,15pt.(tcp),1pt.(udp) |
2019-07-01 21:11:02 |