城市(city): Medan
省份(region): North Sumatra
国家(country): Indonesia
运营商(isp): Esia
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.194.82.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19674
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.194.82.31. IN A
;; AUTHORITY SECTION:
. 366 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022070200 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 02 17:09:53 CST 2022
;; MSG SIZE rcvd: 106
31.82.194.139.in-addr.arpa domain name pointer fm-dyn-139-194-82-31.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
31.82.194.139.in-addr.arpa name = fm-dyn-139-194-82-31.fast.net.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 184.13.240.142 | attackspam | 2019-10-04T23:13:01.359269tmaserv sshd\[10627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.13.240.142 2019-10-04T23:13:03.411976tmaserv sshd\[10627\]: Failed password for invalid user !@\#QAZWSX from 184.13.240.142 port 58218 ssh2 2019-10-04T23:24:50.061791tmaserv sshd\[11670\]: Invalid user Remote@123 from 184.13.240.142 port 33764 2019-10-04T23:24:50.066496tmaserv sshd\[11670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.13.240.142 2019-10-04T23:24:52.119804tmaserv sshd\[11670\]: Failed password for invalid user Remote@123 from 184.13.240.142 port 33764 ssh2 2019-10-04T23:28:17.544235tmaserv sshd\[11951\]: Invalid user P4ssw0rd from 184.13.240.142 port 34712 ... |
2019-10-05 04:32:57 |
| 103.92.84.102 | attack | Oct 4 10:38:53 hanapaa sshd\[26387\]: Invalid user Qwerty@10 from 103.92.84.102 Oct 4 10:38:53 hanapaa sshd\[26387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.84.102 Oct 4 10:38:56 hanapaa sshd\[26387\]: Failed password for invalid user Qwerty@10 from 103.92.84.102 port 47730 ssh2 Oct 4 10:43:59 hanapaa sshd\[26927\]: Invalid user 0okm\(IJN8uhb from 103.92.84.102 Oct 4 10:43:59 hanapaa sshd\[26927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.84.102 |
2019-10-05 04:45:38 |
| 211.161.90.99 | attack | IMAP |
2019-10-05 04:17:03 |
| 117.7.230.113 | attackbotsspam | Automatic report - XMLRPC Attack |
2019-10-05 04:45:12 |
| 42.5.155.149 | attackbotsspam | Unauthorised access (Oct 4) SRC=42.5.155.149 LEN=40 TTL=49 ID=52252 TCP DPT=8080 WINDOW=13951 SYN Unauthorised access (Oct 3) SRC=42.5.155.149 LEN=40 TTL=49 ID=64986 TCP DPT=8080 WINDOW=37071 SYN Unauthorised access (Oct 3) SRC=42.5.155.149 LEN=40 TTL=49 ID=3348 TCP DPT=8080 WINDOW=50791 SYN Unauthorised access (Oct 3) SRC=42.5.155.149 LEN=40 TTL=49 ID=15882 TCP DPT=8080 WINDOW=41479 SYN |
2019-10-05 04:25:15 |
| 62.234.73.249 | attackspambots | Oct 4 23:25:28 www sshd\[7573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.73.249 user=root Oct 4 23:25:30 www sshd\[7573\]: Failed password for root from 62.234.73.249 port 47372 ssh2 Oct 4 23:29:17 www sshd\[7621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.73.249 user=root ... |
2019-10-05 04:35:52 |
| 190.186.170.83 | attackspambots | Oct 4 23:16:48 sauna sshd[144693]: Failed password for root from 190.186.170.83 port 38928 ssh2 ... |
2019-10-05 04:24:48 |
| 213.32.69.98 | attackbotsspam | 2019-10-04T20:16:28.462777abusebot-5.cloudsearch.cf sshd\[27203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-213-32-69.eu user=root |
2019-10-05 04:21:59 |
| 45.55.6.105 | attack | Automatic report - Banned IP Access |
2019-10-05 04:28:39 |
| 199.119.158.2 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-05 04:22:31 |
| 49.235.222.199 | attackbots | Oct 4 10:24:54 kapalua sshd\[2742\]: Invalid user Vendor@123 from 49.235.222.199 Oct 4 10:24:54 kapalua sshd\[2742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.222.199 Oct 4 10:24:55 kapalua sshd\[2742\]: Failed password for invalid user Vendor@123 from 49.235.222.199 port 50570 ssh2 Oct 4 10:28:32 kapalua sshd\[3097\]: Invalid user Eduardo123 from 49.235.222.199 Oct 4 10:28:32 kapalua sshd\[3097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.222.199 |
2019-10-05 04:51:27 |
| 14.215.46.94 | attack | ssh failed login |
2019-10-05 04:46:12 |
| 116.192.241.123 | attackspam | Oct 4 07:02:29 friendsofhawaii sshd\[8848\]: Invalid user 123Firewall from 116.192.241.123 Oct 4 07:02:29 friendsofhawaii sshd\[8848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.192.241.123 Oct 4 07:02:31 friendsofhawaii sshd\[8848\]: Failed password for invalid user 123Firewall from 116.192.241.123 port 40896 ssh2 Oct 4 07:06:01 friendsofhawaii sshd\[9162\]: Invalid user 123Star from 116.192.241.123 Oct 4 07:06:01 friendsofhawaii sshd\[9162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.192.241.123 |
2019-10-05 04:20:26 |
| 167.114.103.140 | attackbots | Sep 16 13:38:03 vtv3 sshd\[11961\]: Invalid user git from 167.114.103.140 port 48766 Sep 16 13:38:03 vtv3 sshd\[11961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.103.140 Sep 16 13:38:05 vtv3 sshd\[11961\]: Failed password for invalid user git from 167.114.103.140 port 48766 ssh2 Sep 16 13:47:42 vtv3 sshd\[16679\]: Invalid user origin from 167.114.103.140 port 38511 Sep 16 13:47:42 vtv3 sshd\[16679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.103.140 Sep 16 14:12:42 vtv3 sshd\[29167\]: Invalid user rolf from 167.114.103.140 port 38976 Sep 16 14:12:42 vtv3 sshd\[29167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.103.140 Sep 16 14:12:44 vtv3 sshd\[29167\]: Failed password for invalid user rolf from 167.114.103.140 port 38976 ssh2 Sep 16 14:16:29 vtv3 sshd\[31263\]: Invalid user stormtech from 167.114.103.140 port 60261 Sep 16 14:16:29 vtv3 ssh |
2019-10-05 04:31:24 |
| 145.239.87.109 | attackspambots | 2019-10-04T20:28:49.920296abusebot-4.cloudsearch.cf sshd\[30950\]: Invalid user Colorado123 from 145.239.87.109 port 43040 |
2019-10-05 04:39:38 |