城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.196.159.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54529
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.196.159.89. IN A
;; AUTHORITY SECTION:
. 596 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:18:30 CST 2022
;; MSG SIZE rcvd: 107
Host 89.159.196.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 89.159.196.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 78.96.209.42 | attackspam | Apr 12 05:34:33 nextcloud sshd\[23164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.96.209.42 user=root Apr 12 05:34:35 nextcloud sshd\[23164\]: Failed password for root from 78.96.209.42 port 48960 ssh2 Apr 12 05:53:56 nextcloud sshd\[10363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.96.209.42 user=root |
2020-04-12 15:41:15 |
| 49.233.46.219 | attack | Apr 12 08:47:37 cdc sshd[6787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.46.219 Apr 12 08:47:39 cdc sshd[6787]: Failed password for invalid user grandma from 49.233.46.219 port 35106 ssh2 |
2020-04-12 16:08:24 |
| 138.68.81.162 | attackspambots | Apr 12 07:56:46 meumeu sshd[19706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.81.162 Apr 12 07:56:48 meumeu sshd[19706]: Failed password for invalid user midnight from 138.68.81.162 port 44952 ssh2 Apr 12 08:01:18 meumeu sshd[20785]: Failed password for root from 138.68.81.162 port 55064 ssh2 ... |
2020-04-12 15:53:09 |
| 218.28.108.237 | attackbotsspam | Apr 12 10:05:28 gw1 sshd[26550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.108.237 Apr 12 10:05:30 gw1 sshd[26550]: Failed password for invalid user ubnt from 218.28.108.237 port 3030 ssh2 ... |
2020-04-12 16:22:02 |
| 122.51.109.222 | attackspambots | ssh brute force |
2020-04-12 15:42:52 |
| 180.164.51.146 | attackspam | $f2bV_matches |
2020-04-12 15:53:38 |
| 99.86.181.27 | attackspambots | This ip 99.86.181.83 :443 and 99.86.181.27 : 443 related to the NSA in Malaysia. Try to pass data to their server. |
2020-04-12 16:03:13 |
| 103.136.40.31 | attackbotsspam | Apr 11 20:05:13 sachi sshd\[32723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.40.31 user=root Apr 11 20:05:14 sachi sshd\[32723\]: Failed password for root from 103.136.40.31 port 52268 ssh2 Apr 11 20:08:49 sachi sshd\[559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.40.31 user=root Apr 11 20:08:51 sachi sshd\[559\]: Failed password for root from 103.136.40.31 port 60278 ssh2 Apr 11 20:12:23 sachi sshd\[957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.40.31 user=root |
2020-04-12 16:08:41 |
| 178.159.11.115 | attackspam | 2020-04-12T07:29:22.167738ionos.janbro.de sshd[104968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.11.115 user=root 2020-04-12T07:29:24.507927ionos.janbro.de sshd[104968]: Failed password for root from 178.159.11.115 port 39330 ssh2 2020-04-12T07:32:27.292704ionos.janbro.de sshd[104984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.11.115 user=root 2020-04-12T07:32:29.035415ionos.janbro.de sshd[104984]: Failed password for root from 178.159.11.115 port 40572 ssh2 2020-04-12T07:35:39.606823ionos.janbro.de sshd[105011]: Invalid user safina from 178.159.11.115 port 41826 2020-04-12T07:35:39.751774ionos.janbro.de sshd[105011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.11.115 2020-04-12T07:35:39.606823ionos.janbro.de sshd[105011]: Invalid user safina from 178.159.11.115 port 41826 2020-04-12T07:35:41.853630ionos.janbro.de sshd[105011 ... |
2020-04-12 15:57:16 |
| 204.48.27.62 | attackspambots | Apr 12 09:17:04 eventyay sshd[26924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.27.62 Apr 12 09:17:06 eventyay sshd[26924]: Failed password for invalid user zabbix from 204.48.27.62 port 36326 ssh2 Apr 12 09:21:04 eventyay sshd[27009]: Failed password for root from 204.48.27.62 port 46154 ssh2 ... |
2020-04-12 16:15:42 |
| 117.23.205.122 | attackbots | Unauthorized connection attempt detected from IP address 117.23.205.122 to port 80 |
2020-04-12 16:01:10 |
| 121.235.46.46 | attackbotsspam | 121.235.46.46 - - \[12/Apr/2020:05:53:43 +0200\] "GET http://api.gxout.com/proxy/check.aspx HTTP/1.1" 400 666 "http://api.gxout.com/proxy/check.aspx" "Mozilla/4.0 \(compatible\; MSIE 6.0\; Windows NT 5.1\)" ... |
2020-04-12 15:51:01 |
| 133.242.231.162 | attackbots | Invalid user admin from 133.242.231.162 port 43124 |
2020-04-12 16:02:08 |
| 152.136.34.52 | attackbots | SSH Brute Force |
2020-04-12 15:58:00 |
| 134.209.49.6 | attack | SSH login attempts. |
2020-04-12 16:05:13 |