城市(city): unknown
省份(region): unknown
国家(country): Indonesia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.193.106.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.193.106.254. IN A
;; AUTHORITY SECTION:
. 360 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:36:44 CST 2022
;; MSG SIZE rcvd: 108
254.106.193.139.in-addr.arpa domain name pointer fm-dyn-139-193-106-254.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
254.106.193.139.in-addr.arpa name = fm-dyn-139-193-106-254.fast.net.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 61.164.246.45 | attackbots | Jul 11 02:29:14 pkdns2 sshd\[50703\]: Invalid user admin from 61.164.246.45Jul 11 02:29:16 pkdns2 sshd\[50703\]: Failed password for invalid user admin from 61.164.246.45 port 53376 ssh2Jul 11 02:32:02 pkdns2 sshd\[50824\]: Invalid user maruei from 61.164.246.45Jul 11 02:32:03 pkdns2 sshd\[50824\]: Failed password for invalid user maruei from 61.164.246.45 port 40936 ssh2Jul 11 02:34:40 pkdns2 sshd\[50933\]: Invalid user linux from 61.164.246.45Jul 11 02:34:43 pkdns2 sshd\[50933\]: Failed password for invalid user linux from 61.164.246.45 port 56722 ssh2 ... |
2020-07-11 07:49:09 |
| 202.107.188.12 | attackbotsspam | Port Scan ... |
2020-07-11 08:02:18 |
| 181.57.153.190 | attackspam | 2020-07-11T00:02:22+0200 Failed SSH Authentication/Brute Force Attack. (Server 5) |
2020-07-11 07:53:45 |
| 179.180.3.247 | attack | Automatic report - Port Scan Attack |
2020-07-11 08:14:32 |
| 106.55.9.175 | attackspam | DATE:2020-07-11 01:16:21, IP:106.55.9.175, PORT:ssh SSH brute force auth (docker-dc) |
2020-07-11 07:47:29 |
| 222.186.190.2 | attackbotsspam | Jul 10 16:42:03 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2 Jul 10 16:42:06 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2 Jul 10 16:42:10 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2 Jul 10 16:42:13 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2 Jul 10 16:42:17 dignus sshd[21427]: Failed password for root from 222.186.190.2 port 64232 ssh2 ... |
2020-07-11 07:44:06 |
| 176.222.56.39 | spambotsattackproxy | hacker |
2020-07-11 08:02:51 |
| 185.234.219.12 | attackbotsspam | 2020-07-10T17:20:55.746108linuxbox-skyline auth[829262]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=norton rhost=185.234.219.12 ... |
2020-07-11 08:09:11 |
| 36.156.155.192 | attackspambots | 2020-07-10T21:15:08.960387mail.csmailer.org sshd[30071]: Invalid user admin2 from 36.156.155.192 port 43367 2020-07-10T21:15:08.963520mail.csmailer.org sshd[30071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.155.192 2020-07-10T21:15:08.960387mail.csmailer.org sshd[30071]: Invalid user admin2 from 36.156.155.192 port 43367 2020-07-10T21:15:11.258252mail.csmailer.org sshd[30071]: Failed password for invalid user admin2 from 36.156.155.192 port 43367 ssh2 2020-07-10T21:18:33.369102mail.csmailer.org sshd[30241]: Invalid user sebastian from 36.156.155.192 port 10214 ... |
2020-07-11 08:04:29 |
| 61.177.172.54 | attack | SSHD unauthorised connection attempt (b) |
2020-07-11 08:20:02 |
| 217.182.204.34 | attackbots | Jul 10 15:17:34 dignus sshd[14621]: Failed password for invalid user zita from 217.182.204.34 port 33540 ssh2 Jul 10 15:20:18 dignus sshd[14863]: Invalid user trips from 217.182.204.34 port 59180 Jul 10 15:20:18 dignus sshd[14863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.204.34 Jul 10 15:20:20 dignus sshd[14863]: Failed password for invalid user trips from 217.182.204.34 port 59180 ssh2 Jul 10 15:23:08 dignus sshd[15090]: Invalid user kkk from 217.182.204.34 port 55130 ... |
2020-07-11 07:39:34 |
| 49.88.112.69 | attack | Jul 11 01:48:46 server sshd[10162]: Failed password for root from 49.88.112.69 port 46734 ssh2 Jul 11 01:48:50 server sshd[10162]: Failed password for root from 49.88.112.69 port 46734 ssh2 Jul 11 01:48:54 server sshd[10162]: Failed password for root from 49.88.112.69 port 46734 ssh2 |
2020-07-11 07:55:47 |
| 49.235.226.166 | attackbotsspam | odoo8 ... |
2020-07-11 08:03:09 |
| 27.109.113.186 | attackbotsspam | Subject: 100% customer satisfaction is what everyone at our online pharmacy is dreaming about! |
2020-07-11 08:00:03 |
| 61.177.172.142 | attackspam | Jul 11 01:24:21 vps333114 sshd[1352]: Failed password for root from 61.177.172.142 port 45813 ssh2 Jul 11 01:24:25 vps333114 sshd[1352]: Failed password for root from 61.177.172.142 port 45813 ssh2 ... |
2020-07-11 07:45:17 |