城市(city): Frankfurt am Main
省份(region): Hesse
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.191.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8010
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.162.191.106.		IN	A
;; AUTHORITY SECTION:
.			234	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:08:17 CST 2022
;; MSG SIZE  rcvd: 108
        106.191.162.139.in-addr.arpa domain name pointer li1508-106.members.linode.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
106.191.162.139.in-addr.arpa	name = li1508-106.members.linode.com.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 27.71.81.174 | attackspambots | Unauthorized connection attempt from IP address 27.71.81.174 on Port 445(SMB)  | 
                    2020-05-08 21:01:37 | 
| 64.225.70.13 | attackspam | May 8 06:37:05 server1 sshd\[21289\]: Failed password for invalid user asm from 64.225.70.13 port 51030 ssh2 May 8 06:40:38 server1 sshd\[2038\]: Invalid user anton from 64.225.70.13 May 8 06:40:38 server1 sshd\[2038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.70.13 May 8 06:40:40 server1 sshd\[2038\]: Failed password for invalid user anton from 64.225.70.13 port 60210 ssh2 May 8 06:44:12 server1 sshd\[16216\]: Invalid user heather from 64.225.70.13 ...  | 
                    2020-05-08 20:59:29 | 
| 218.92.0.190 | attack | May 8 14:35:36 dcd-gentoo sshd[1380]: User root from 218.92.0.190 not allowed because none of user's groups are listed in AllowGroups May 8 14:35:38 dcd-gentoo sshd[1380]: error: PAM: Authentication failure for illegal user root from 218.92.0.190 May 8 14:35:38 dcd-gentoo sshd[1380]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.190 port 58900 ssh2 ...  | 
                    2020-05-08 20:38:24 | 
| 180.249.202.121 | attackspam | Unauthorized connection attempt from IP address 180.249.202.121 on Port 445(SMB)  | 
                    2020-05-08 20:50:25 | 
| 165.22.250.105 | attackbotsspam | Wordpress login scanning  | 
                    2020-05-08 20:47:20 | 
| 119.28.180.136 | attackbotsspam | May 8 14:06:58 dev0-dcde-rnet sshd[25777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.180.136 May 8 14:07:00 dev0-dcde-rnet sshd[25777]: Failed password for invalid user bq from 119.28.180.136 port 46262 ssh2 May 8 14:19:15 dev0-dcde-rnet sshd[25931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.180.136  | 
                    2020-05-08 21:02:57 | 
| 207.38.86.148 | attackbots | Automatic report - XMLRPC Attack  | 
                    2020-05-08 20:52:16 | 
| 59.16.206.61 | attack | Unauthorized connection attempt detected from IP address 59.16.206.61 to port 22  | 
                    2020-05-08 20:30:24 | 
| 203.135.20.36 | attack | (sshd) Failed SSH login from 203.135.20.36 (PK/Pakistan/-): 5 in the last 3600 secs  | 
                    2020-05-08 20:26:52 | 
| 95.216.1.46 | attackbotsspam | 20 attempts against mh-misbehave-ban on twig  | 
                    2020-05-08 20:36:19 | 
| 151.84.135.188 | attack | May 8 08:27:51 ny01 sshd[9660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.84.135.188 May 8 08:27:53 ny01 sshd[9660]: Failed password for invalid user sharon from 151.84.135.188 port 58921 ssh2 May 8 08:36:44 ny01 sshd[10993]: Failed password for root from 151.84.135.188 port 41506 ssh2  | 
                    2020-05-08 20:54:09 | 
| 195.54.160.243 | attack | May 8 14:31:11 debian-2gb-nbg1-2 kernel: \[11199951.856066\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.160.243 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=12510 PROTO=TCP SPT=58124 DPT=12472 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-05-08 20:32:15 | 
| 202.72.242.138 | attack | Unauthorized connection attempt from IP address 202.72.242.138 on Port 445(SMB)  | 
                    2020-05-08 20:54:41 | 
| 118.24.71.83 | attack | $f2bV_matches  | 
                    2020-05-08 20:44:33 | 
| 106.12.94.186 | attack | ssh intrusion attempt  | 
                    2020-05-08 20:35:55 |