城市(city): unknown
省份(region): unknown
国家(country): Taiwan (Province of China)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.175.26.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.175.26.128. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:52:03 CST 2025
;; MSG SIZE rcvd: 107
128.26.175.139.in-addr.arpa domain name pointer ksnbg-128.seed.net.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
128.26.175.139.in-addr.arpa name = ksnbg-128.seed.net.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.92.0.251 | attackspam | Jul 24 10:41:53 rush sshd[869]: Failed password for root from 218.92.0.251 port 34001 ssh2 Jul 24 10:42:03 rush sshd[869]: Failed password for root from 218.92.0.251 port 34001 ssh2 Jul 24 10:42:06 rush sshd[869]: Failed password for root from 218.92.0.251 port 34001 ssh2 Jul 24 10:42:06 rush sshd[869]: error: maximum authentication attempts exceeded for root from 218.92.0.251 port 34001 ssh2 [preauth] ... |
2020-07-24 18:44:22 |
| 193.228.91.11 | attack | 2020-07-24T12:53:15.351769afi-git.jinr.ru sshd[6254]: Invalid user oracle from 193.228.91.11 port 49904 2020-07-24T12:53:17.019989afi-git.jinr.ru sshd[6254]: Failed password for invalid user oracle from 193.228.91.11 port 49904 ssh2 2020-07-24T12:53:48.118441afi-git.jinr.ru sshd[6309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.228.91.11 user=root 2020-07-24T12:53:49.978791afi-git.jinr.ru sshd[6309]: Failed password for root from 193.228.91.11 port 51164 ssh2 2020-07-24T12:54:20.676026afi-git.jinr.ru sshd[6461]: Invalid user postgres from 193.228.91.11 port 52408 ... |
2020-07-24 18:19:22 |
| 62.57.227.12 | attackbotsspam | Invalid user ruth from 62.57.227.12 port 40916 |
2020-07-24 18:22:34 |
| 5.135.186.52 | attackspambots | Invalid user sol from 5.135.186.52 port 34136 |
2020-07-24 18:19:58 |
| 106.53.127.49 | attack | $f2bV_matches |
2020-07-24 18:47:16 |
| 203.90.80.58 | attackspambots | Jul 24 10:40:19 server sshd[11131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.90.80.58 Jul 24 10:40:21 server sshd[11131]: Failed password for invalid user isabella from 203.90.80.58 port 53060 ssh2 Jul 24 10:58:08 server sshd[14796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.90.80.58 Jul 24 10:58:10 server sshd[14796]: Failed password for invalid user yao from 203.90.80.58 port 49554 ssh2 |
2020-07-24 18:24:58 |
| 187.34.245.58 | attackbots | Jul 24 09:46:22 eventyay sshd[5397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.34.245.58 Jul 24 09:46:24 eventyay sshd[5397]: Failed password for invalid user zhangsheng from 187.34.245.58 port 60950 ssh2 Jul 24 09:51:20 eventyay sshd[5531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.34.245.58 ... |
2020-07-24 18:34:14 |
| 112.85.42.172 | attack | Jul 24 12:14:12 abendstille sshd\[14900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172 user=root Jul 24 12:14:15 abendstille sshd\[14900\]: Failed password for root from 112.85.42.172 port 42802 ssh2 Jul 24 12:14:29 abendstille sshd\[14900\]: Failed password for root from 112.85.42.172 port 42802 ssh2 Jul 24 12:14:32 abendstille sshd\[15146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172 user=root Jul 24 12:14:34 abendstille sshd\[15146\]: Failed password for root from 112.85.42.172 port 8502 ssh2 ... |
2020-07-24 18:21:28 |
| 187.150.114.250 | attackspam | Unauthorized connection attempt from IP address 187.150.114.250 on Port 445(SMB) |
2020-07-24 18:48:22 |
| 119.45.10.225 | attackbots | Jul 24 03:09:44 george sshd[30404]: Failed password for invalid user admin from 119.45.10.225 port 45126 ssh2 Jul 24 03:12:59 george sshd[30454]: Invalid user ana from 119.45.10.225 port 52660 Jul 24 03:12:59 george sshd[30454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.10.225 Jul 24 03:13:01 george sshd[30454]: Failed password for invalid user ana from 119.45.10.225 port 52660 ssh2 Jul 24 03:16:14 george sshd[30477]: Invalid user inma from 119.45.10.225 port 60186 ... |
2020-07-24 18:37:29 |
| 187.234.40.122 | attackbotsspam | Lines containing failures of 187.234.40.122 (max 1000) Jul 22 10:42:51 UTC__SANYALnet-Labs__cac1 sshd[3885]: Connection from 187.234.40.122 port 36596 on 64.137.179.160 port 22 Jul 22 10:43:48 UTC__SANYALnet-Labs__cac1 sshd[3885]: reveeclipse mapping checking getaddrinfo for dsl-187-234-40-122-dyn.prod-infinhostnameum.com.mx [187.234.40.122] failed - POSSIBLE BREAK-IN ATTEMPT! Jul 22 10:43:48 UTC__SANYALnet-Labs__cac1 sshd[3885]: Invalid user lhy from 187.234.40.122 port 36596 Jul 22 10:43:48 UTC__SANYALnet-Labs__cac1 sshd[3885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.234.40.122 Jul 22 10:43:50 UTC__SANYALnet-Labs__cac1 sshd[3885]: Failed password for invalid user lhy from 187.234.40.122 port 36596 ssh2 Jul 22 10:43:50 UTC__SANYALnet-Labs__cac1 sshd[3885]: Received disconnect from 187.234.40.122 port 36596:11: Bye Bye [preauth] Jul 22 10:43:50 UTC__SANYALnet-Labs__cac1 sshd[3885]: Disconnected from 187.234.40.122 port ........ ------------------------------ |
2020-07-24 18:55:36 |
| 120.203.160.18 | attackbots | Invalid user info from 120.203.160.18 port 20247 |
2020-07-24 18:48:49 |
| 51.77.41.246 | attack | Invalid user info from 51.77.41.246 port 39244 |
2020-07-24 18:56:59 |
| 123.207.8.86 | attack | Invalid user ts from 123.207.8.86 port 53084 |
2020-07-24 18:28:29 |
| 222.232.29.235 | attack | Jul 24 09:44:25 fhem-rasp sshd[21647]: Invalid user nexus from 222.232.29.235 port 39458 ... |
2020-07-24 18:53:29 |