城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.161.27.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.161.27.10. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012901 1800 900 604800 86400
;; Query time: 183 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 02:11:58 CST 2025
;; MSG SIZE rcvd: 106
Host 10.27.161.139.in-addr.arpa not found: 2(SERVFAIL)
server can't find 139.161.27.10.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 103.118.222.82 | attackspambots | (sshd) Failed SSH login from 103.118.222.82 (CN/China/-): 5 in the last 3600 secs |
2020-08-28 13:57:04 |
| 219.139.78.58 | attackbots | Aug 28 03:54:06 IngegnereFirenze sshd[15759]: Failed password for invalid user ubuntu from 219.139.78.58 port 42614 ssh2 ... |
2020-08-28 14:07:52 |
| 88.91.13.216 | attackbots | *Port Scan* detected from 88.91.13.216 (NO/Norway/Viken/Fornebu/ti2999a430-0215.bb.online.no). 4 hits in the last 185 seconds |
2020-08-28 13:51:03 |
| 195.154.42.43 | attackbots | Aug 28 03:50:42 game-panel sshd[17070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.42.43 Aug 28 03:50:44 game-panel sshd[17070]: Failed password for invalid user liu from 195.154.42.43 port 39090 ssh2 Aug 28 03:54:14 game-panel sshd[17312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.42.43 |
2020-08-28 14:02:28 |
| 111.40.50.116 | attackspam | $f2bV_matches |
2020-08-28 13:40:14 |
| 171.251.0.51 | attack | Unauthorised access (Aug 28) SRC=171.251.0.51 LEN=52 TTL=48 ID=29495 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-28 13:29:33 |
| 51.210.107.217 | attackbotsspam | Aug 28 08:39:38 hosting sshd[2008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-bf0981e3.vps.ovh.net user=postgres Aug 28 08:39:40 hosting sshd[2008]: Failed password for postgres from 51.210.107.217 port 56452 ssh2 ... |
2020-08-28 13:55:08 |
| 218.92.0.171 | attackspam | 2020-08-28T07:41:04.150331vps751288.ovh.net sshd\[16834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171 user=root 2020-08-28T07:41:06.123916vps751288.ovh.net sshd\[16834\]: Failed password for root from 218.92.0.171 port 21918 ssh2 2020-08-28T07:41:09.117996vps751288.ovh.net sshd\[16834\]: Failed password for root from 218.92.0.171 port 21918 ssh2 2020-08-28T07:41:12.523554vps751288.ovh.net sshd\[16834\]: Failed password for root from 218.92.0.171 port 21918 ssh2 2020-08-28T07:41:16.014658vps751288.ovh.net sshd\[16834\]: Failed password for root from 218.92.0.171 port 21918 ssh2 |
2020-08-28 13:45:15 |
| 165.227.62.103 | attack | Aug 28 07:37:39 ns381471 sshd[17858]: Failed password for jira from 165.227.62.103 port 40592 ssh2 Aug 28 07:41:40 ns381471 sshd[18227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.62.103 |
2020-08-28 14:04:24 |
| 222.186.173.142 | attack | Aug 28 07:56:00 sso sshd[16401]: Failed password for root from 222.186.173.142 port 24240 ssh2 Aug 28 07:56:04 sso sshd[16401]: Failed password for root from 222.186.173.142 port 24240 ssh2 ... |
2020-08-28 14:02:00 |
| 73.207.192.158 | attackspambots | $f2bV_matches |
2020-08-28 14:02:52 |
| 190.145.192.106 | attackbots | Aug 28 06:51:13 kh-dev-server sshd[11582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.192.106 ... |
2020-08-28 13:57:24 |
| 113.89.12.21 | attack | Aug 28 07:14:07 mail sshd[1916537]: Invalid user temp from 113.89.12.21 port 56287 Aug 28 07:14:09 mail sshd[1916537]: Failed password for invalid user temp from 113.89.12.21 port 56287 ssh2 Aug 28 07:24:46 mail sshd[1916939]: Invalid user hadoop from 113.89.12.21 port 53552 ... |
2020-08-28 13:31:26 |
| 14.63.167.192 | attackspam | Aug 28 07:37:18 PorscheCustomer sshd[16575]: Failed password for root from 14.63.167.192 port 54606 ssh2 Aug 28 07:41:13 PorscheCustomer sshd[16725]: Failed password for root from 14.63.167.192 port 57270 ssh2 ... |
2020-08-28 13:52:07 |
| 213.226.40.167 | attackspambots | Port probing on unauthorized port 2323 |
2020-08-28 13:39:15 |