城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.196.142.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33936
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.196.142.1. IN A
;; AUTHORITY SECTION:
. 532 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:38:15 CST 2022
;; MSG SIZE rcvd: 106
Host 1.142.196.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 1.142.196.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 192.241.212.33 | attackbotsspam | port scan and connect, tcp 1521 (oracle-old) |
2020-03-12 13:20:23 |
| 63.80.185.75 | attack | Mar 12 04:26:20 mail.srvfarm.net postfix/smtpd[1637570]: NOQUEUE: reject: RCPT from unknown[63.80.185.75]: 450 4.1.8 |
2020-03-12 13:24:32 |
| 83.14.199.49 | attackbots | Mar 12 05:58:57 jane sshd[7193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.14.199.49 Mar 12 05:58:59 jane sshd[7193]: Failed password for invalid user user from 83.14.199.49 port 49362 ssh2 ... |
2020-03-12 12:59:47 |
| 218.92.0.178 | attackspam | Mar 12 05:47:30 jane sshd[23090]: Failed password for root from 218.92.0.178 port 10149 ssh2 Mar 12 05:47:34 jane sshd[23090]: Failed password for root from 218.92.0.178 port 10149 ssh2 ... |
2020-03-12 12:49:52 |
| 146.88.240.4 | attackbots | 1583988860 - 03/12/2020 05:54:20 Host: 146.88.240.4/146.88.240.4 Port: 161 UDP Blocked ... |
2020-03-12 13:26:06 |
| 185.11.22.132 | attack | Automatic report - Port Scan Attack |
2020-03-12 13:05:03 |
| 211.193.58.173 | attackbotsspam | SSH login attempts. |
2020-03-12 12:55:41 |
| 45.148.10.175 | attackspam | SSH brute-force: detected 36 distinct usernames within a 24-hour window. |
2020-03-12 13:01:28 |
| 49.235.138.111 | attack | Mar 12 04:31:33 ip-172-31-62-245 sshd\[3052\]: Invalid user cpaneleximscanner from 49.235.138.111\ Mar 12 04:31:35 ip-172-31-62-245 sshd\[3052\]: Failed password for invalid user cpaneleximscanner from 49.235.138.111 port 43290 ssh2\ Mar 12 04:34:46 ip-172-31-62-245 sshd\[3076\]: Invalid user daniele from 49.235.138.111\ Mar 12 04:34:48 ip-172-31-62-245 sshd\[3076\]: Failed password for invalid user daniele from 49.235.138.111 port 52670 ssh2\ Mar 12 04:41:27 ip-172-31-62-245 sshd\[3219\]: Invalid user christian from 49.235.138.111\ |
2020-03-12 12:56:45 |
| 195.231.3.155 | attack | Mar 12 05:44:47 mail.srvfarm.net postfix/smtpd[1658056]: warning: unknown[195.231.3.155]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 12 05:44:47 mail.srvfarm.net postfix/smtpd[1658056]: lost connection after AUTH from unknown[195.231.3.155] Mar 12 05:45:20 mail.srvfarm.net postfix/smtpd[1659045]: warning: unknown[195.231.3.155]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 12 05:45:20 mail.srvfarm.net postfix/smtpd[1659045]: lost connection after AUTH from unknown[195.231.3.155] Mar 12 05:46:06 mail.srvfarm.net postfix/smtpd[1662530]: warning: unknown[195.231.3.155]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-03-12 13:19:53 |
| 157.245.128.217 | attackspam | CMS (WordPress or Joomla) login attempt. |
2020-03-12 12:51:23 |
| 123.1.154.227 | attackspam | Mar 12 04:55:52 mailserver sshd\[1169\]: Invalid user ts3server from 123.1.154.227 ... |
2020-03-12 12:49:11 |
| 134.122.64.59 | attackspambots | [2020-03-12 00:42:19] NOTICE[1148][C-00010e17] chan_sip.c: Call from '' (134.122.64.59:65023) to extension '201146812111443' rejected because extension not found in context 'public'. [2020-03-12 00:42:19] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-12T00:42:19.936-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="201146812111443",SessionID="0x7fd82c530768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/134.122.64.59/65023",ACLName="no_extension_match" [2020-03-12 00:47:16] NOTICE[1148][C-00010e1b] chan_sip.c: Call from '' (134.122.64.59:51018) to extension '101146812111443' rejected because extension not found in context 'public'. [2020-03-12 00:47:16] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-12T00:47:16.942-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="101146812111443",SessionID="0x7fd82c3f03d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/ ... |
2020-03-12 13:00:42 |
| 110.136.131.95 | attack | SMB Server BruteForce Attack |
2020-03-12 12:45:28 |
| 68.183.102.246 | attackbots | leo_www |
2020-03-12 12:55:08 |