城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.180.135.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.180.135.49. IN A
;; AUTHORITY SECTION:
. 165 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:02:16 CST 2022
;; MSG SIZE rcvd: 107
b'49.135.180.139.in-addr.arpa domain name pointer 139.180.135.49.vultr.com.
'
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
49.135.180.139.in-addr.arpa name = 139.180.135.49.vultr.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.168.34.0 | attackspam | Jan 26 05:28:50 vzmaster sshd[2363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.168.34.0 user=r.r Jan 26 05:28:52 vzmaster sshd[2363]: Failed password for r.r from 45.168.34.0 port 34539 ssh2 Jan 26 05:28:53 vzmaster sshd[2363]: Failed password for r.r from 45.168.34.0 port 34539 ssh2 Jan 26 05:28:56 vzmaster sshd[2363]: Failed password for r.r from 45.168.34.0 port 34539 ssh2 Jan 26 05:28:58 vzmaster sshd[2363]: Failed password for r.r from 45.168.34.0 port 34539 ssh2 Jan 26 05:29:00 vzmaster sshd[2363]: Failed password for r.r from 45.168.34.0 port 34539 ssh2 Jan 26 05:29:02 vzmaster sshd[2363]: Failed password for r.r from 45.168.34.0 port 34539 ssh2 Jan 26 05:29:02 vzmaster sshd[2363]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.168.34.0 user=r.r Jan 26 05:29:06 vzmaster sshd[2796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.168.34......... ------------------------------- |
2020-01-26 20:11:54 |
| 109.195.149.166 | attackspam | Unauthorised access (Jan 26) SRC=109.195.149.166 LEN=52 TOS=0x10 PREC=0x60 TTL=117 ID=2047 DF TCP DPT=1433 WINDOW=8192 SYN |
2020-01-26 20:21:38 |
| 190.255.39.38 | attackspambots | unauthorized connection attempt |
2020-01-26 20:13:21 |
| 164.132.46.197 | attackbots | Jan 26 12:32:07 ovpn sshd\[28631\]: Invalid user web from 164.132.46.197 Jan 26 12:32:07 ovpn sshd\[28631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197 Jan 26 12:32:09 ovpn sshd\[28631\]: Failed password for invalid user web from 164.132.46.197 port 43098 ssh2 Jan 26 12:51:42 ovpn sshd\[1036\]: Invalid user adi from 164.132.46.197 Jan 26 12:51:42 ovpn sshd\[1036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197 |
2020-01-26 20:06:33 |
| 223.71.167.164 | attackspambots | 26.01.2020 12:24:36 Connection to port 25105 blocked by firewall |
2020-01-26 20:23:37 |
| 104.248.227.130 | attackbots | Unauthorized connection attempt detected from IP address 104.248.227.130 to port 2220 [J] |
2020-01-26 19:49:57 |
| 148.70.236.112 | attackbotsspam | Automatic report - Banned IP Access |
2020-01-26 20:07:30 |
| 123.21.99.40 | attackbotsspam | Unauthorized connection attempt detected from IP address 123.21.99.40 to port 22 |
2020-01-26 20:13:00 |
| 144.172.70.112 | attackspambots | Unauthorized connection attempt detected from IP address 144.172.70.112 to port 23 [J] |
2020-01-26 20:15:16 |
| 106.39.31.44 | attackbots | Unauthorized connection attempt detected from IP address 106.39.31.44 to port 2220 [J] |
2020-01-26 20:25:00 |
| 192.99.11.207 | attackspam | Port scan on 1 port(s): 445 |
2020-01-26 20:09:52 |
| 37.114.161.157 | attack | Lines containing failures of 37.114.161.157 Jan 26 05:32:27 shared09 sshd[16932]: Invalid user admin from 37.114.161.157 port 34676 Jan 26 05:32:27 shared09 sshd[16932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.114.161.157 Jan 26 05:32:28 shared09 sshd[16932]: Failed password for invalid user admin from 37.114.161.157 port 34676 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=37.114.161.157 |
2020-01-26 20:20:43 |
| 103.233.122.155 | attackbotsspam | " " |
2020-01-26 19:53:16 |
| 210.209.72.232 | attack | Unauthorized connection attempt detected from IP address 210.209.72.232 to port 2220 [J] |
2020-01-26 20:33:16 |
| 166.145.142.208 | attack | Unauthorized connection attempt detected from IP address 166.145.142.208 to port 2220 [J] |
2020-01-26 20:26:18 |