城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.194.241.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11304
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.194.241.117. IN A
;; AUTHORITY SECTION:
. 13 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:16:45 CST 2022
;; MSG SIZE rcvd: 108
117.241.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-241-117.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
117.241.194.139.in-addr.arpa name = fm-dyn-139-194-241-117.fast.net.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.91.212.81 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 8443 proto: TCP cat: Misc Attack |
2020-05-13 22:39:38 |
| 129.21.39.191 | attackspambots | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-05-13 22:43:28 |
| 58.210.172.118 | attack | 05/13/2020-08:37:31.216251 58.210.172.118 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-05-13 22:48:53 |
| 1.245.61.144 | attackspam | 2020-05-13T08:29:57.531272linuxbox-skyline sshd[145615]: Invalid user ehi from 1.245.61.144 port 48504 ... |
2020-05-13 22:49:47 |
| 45.142.195.15 | attack | May 13 16:00:09 relay postfix/smtpd\[11416\]: warning: unknown\[45.142.195.15\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 13 16:00:10 relay postfix/smtpd\[19187\]: warning: unknown\[45.142.195.15\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 13 16:00:52 relay postfix/smtpd\[19187\]: warning: unknown\[45.142.195.15\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 13 16:00:54 relay postfix/smtpd\[11416\]: warning: unknown\[45.142.195.15\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 13 16:01:35 relay postfix/smtpd\[11416\]: warning: unknown\[45.142.195.15\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 13 16:01:35 relay postfix/smtpd\[19187\]: warning: unknown\[45.142.195.15\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-13 22:10:32 |
| 203.49.234.122 | attack | May 13 16:15:33 PorscheCustomer sshd[22126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.49.234.122 May 13 16:15:35 PorscheCustomer sshd[22126]: Failed password for invalid user amax from 203.49.234.122 port 42885 ssh2 May 13 16:19:49 PorscheCustomer sshd[22230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.49.234.122 ... |
2020-05-13 22:24:02 |
| 211.145.49.253 | attack | May 13 18:23:07 gw1 sshd[4934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.145.49.253 May 13 18:23:09 gw1 sshd[4934]: Failed password for invalid user leyton from 211.145.49.253 port 59625 ssh2 ... |
2020-05-13 22:15:27 |
| 165.227.225.195 | attackspam | May 13 16:34:22 pornomens sshd\[10412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.225.195 user=root May 13 16:34:24 pornomens sshd\[10412\]: Failed password for root from 165.227.225.195 port 42128 ssh2 May 13 16:38:15 pornomens sshd\[10505\]: Invalid user deploy from 165.227.225.195 port 48652 May 13 16:38:15 pornomens sshd\[10505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.225.195 ... |
2020-05-13 22:43:06 |
| 157.245.95.16 | attackspam | May 13 08:11:07 server1 sshd\[8669\]: Failed password for invalid user ts3server3 from 157.245.95.16 port 13582 ssh2 May 13 08:13:48 server1 sshd\[9688\]: Invalid user rishou from 157.245.95.16 May 13 08:13:48 server1 sshd\[9688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.95.16 May 13 08:13:51 server1 sshd\[9688\]: Failed password for invalid user rishou from 157.245.95.16 port 60206 ssh2 May 13 08:16:34 server1 sshd\[10542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.95.16 user=root ... |
2020-05-13 22:18:30 |
| 179.191.123.46 | attackspambots | May 13 14:21:48 onepixel sshd[3371381]: Invalid user catchall from 179.191.123.46 port 60399 May 13 14:21:48 onepixel sshd[3371381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.123.46 May 13 14:21:48 onepixel sshd[3371381]: Invalid user catchall from 179.191.123.46 port 60399 May 13 14:21:50 onepixel sshd[3371381]: Failed password for invalid user catchall from 179.191.123.46 port 60399 ssh2 May 13 14:26:06 onepixel sshd[3371801]: Invalid user paul from 179.191.123.46 port 35770 |
2020-05-13 22:33:05 |
| 115.135.91.51 | attackspam | Unauthorized IMAP connection attempt |
2020-05-13 22:04:47 |
| 221.237.189.26 | attackspam | (pop3d) Failed POP3 login from 221.237.189.26 (CN/China/26.189.237.221.broad.cd.sc.dynamic.163data.com.cn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 13 17:17:22 ir1 dovecot[264309]: pop3-login: Aborted login (auth failed, 1 attempts in 4 secs): user= |
2020-05-13 22:40:58 |
| 54.36.148.223 | attackspam | [Wed May 13 19:37:44.289927 2020] [:error] [pid 23649:tid 140604151064320] [client 54.36.148.223:42464] [client 54.36.148.223] ModSecurity: Access denied with code 403 (phase 2). Matched phrase "AhrefsBot" at REQUEST_HEADERS:User-Agent. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-913-SCANNER-DETECTION.conf"] [line "183"] [id "913102"] [msg "Found User-Agent associated with web crawler/bot"] [data "Matched Data: AhrefsBot found within REQUEST_HEADERS:User-Agent: mozilla/5.0 (compatible; ahrefsbot/6.1; +http://ahrefs.com/robot/)"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-reputation-crawler"] [tag "OWASP_CRS"] [tag "OWASP_CRS/AUTOMATION/CRAWLER"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/profil-pegawai/1980-klimatologi/agroklimatologi/kalender-tanam-katam-terpadu/kalender- ... |
2020-05-13 22:30:47 |
| 109.194.54.94 | attack | Many RDP attempts : 4 packets 62Bytes 13/05/2020 16:18:44:426 sniffing : 00000000 03 00 00 2B 26 E0 00 00 00 00 00 43 6F 6F 6B 69 ...+&... ...Cooki 00000010 65 3A 20 6D 73 74 73 68 61 73 68 3D 68 65 6C 6C e: mstsh ash=hell 00000020 6F 0D 0A 01 00 08 00 03 00 00 00 o....... ... 00000000 03 00 00 13 0E D0 00 00 12 34 00 03 00 08 00 02 ........ .4...... 00000010 00 00 00 ... |
2020-05-13 22:51:38 |
| 111.26.172.222 | attack | nft/Honeypot/22/73e86 |
2020-05-13 22:09:32 |