城市(city): Karrinyup
省份(region): Western Australia
国家(country): Australia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.216.226.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38982
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.216.226.77. IN A
;; AUTHORITY SECTION:
. 2733 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019091300 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Sep 14 02:09:49 CST 2019
;; MSG SIZE rcvd: 118
77.226.216.139.in-addr.arpa domain name pointer 77.226.216.139.sta.dodo.net.au.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
77.226.216.139.in-addr.arpa name = 77.226.216.139.sta.dodo.net.au.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 188.159.61.153 | attack | 20/2/21@23:52:53: FAIL: Alarm-Network address from=188.159.61.153 20/2/21@23:52:53: FAIL: Alarm-Network address from=188.159.61.153 ... |
2020-02-22 14:27:03 |
| 66.240.219.146 | attackspam | Portscan or hack attempt detected by psad/fwsnort |
2020-02-22 15:15:16 |
| 142.93.128.73 | attack | Feb 22 05:48:44 silence02 sshd[18287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.128.73 Feb 22 05:48:46 silence02 sshd[18287]: Failed password for invalid user webadmin from 142.93.128.73 port 55788 ssh2 Feb 22 05:51:37 silence02 sshd[18586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.128.73 |
2020-02-22 15:15:28 |
| 109.99.230.5 | attackspam | Automatic report - Port Scan Attack |
2020-02-22 15:08:52 |
| 196.189.91.138 | attackspam | Feb 21 20:55:53 php1 sshd\[29864\]: Invalid user wp from 196.189.91.138 Feb 21 20:55:53 php1 sshd\[29864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.91.138 Feb 21 20:55:55 php1 sshd\[29864\]: Failed password for invalid user wp from 196.189.91.138 port 60790 ssh2 Feb 21 20:59:25 php1 sshd\[30202\]: Invalid user niiv from 196.189.91.138 Feb 21 20:59:25 php1 sshd\[30202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.91.138 |
2020-02-22 15:12:42 |
| 183.82.149.102 | attackspam | Feb 22 07:21:55 MK-Soft-VM5 sshd[32128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.149.102 Feb 22 07:21:57 MK-Soft-VM5 sshd[32128]: Failed password for invalid user user from 183.82.149.102 port 49743 ssh2 ... |
2020-02-22 15:17:23 |
| 92.118.37.70 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2020-02-22 15:21:43 |
| 64.94.211.102 | attack | 64.94.211.102 - - [22/Feb/2020:05:51:25 +0100] "GET /awstats.pl?lang=en&output=main HTTP/1.0" 404 280 "https://oraux.pnzone.net/" "Mozilla/5.0 (Windows NT 6.1; rv:57.0) Gecko/20100101 Firefox/B8A7" |
2020-02-22 15:20:17 |
| 70.45.133.188 | attackbotsspam | Feb 22 05:52:15 [snip] sshd[15309]: Invalid user jiayuanyang from 70.45.133.188 port 33872 Feb 22 05:52:15 [snip] sshd[15309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.45.133.188 Feb 22 05:52:17 [snip] sshd[15309]: Failed password for invalid user jiayuanyang from 70.45.133.188 port 33872 ssh2[...] |
2020-02-22 14:54:22 |
| 140.143.151.93 | attack | Feb 22 07:05:04 sd-53420 sshd\[8982\]: User root from 140.143.151.93 not allowed because none of user's groups are listed in AllowGroups Feb 22 07:05:04 sd-53420 sshd\[8982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.151.93 user=root Feb 22 07:05:06 sd-53420 sshd\[8982\]: Failed password for invalid user root from 140.143.151.93 port 40944 ssh2 Feb 22 07:08:34 sd-53420 sshd\[9268\]: User uucp from 140.143.151.93 not allowed because none of user's groups are listed in AllowGroups Feb 22 07:08:34 sd-53420 sshd\[9268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.151.93 user=uucp ... |
2020-02-22 14:50:20 |
| 49.232.61.104 | attackbotsspam | Feb 22 06:33:11 legacy sshd[10719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.61.104 Feb 22 06:33:13 legacy sshd[10719]: Failed password for invalid user andy from 49.232.61.104 port 50502 ssh2 Feb 22 06:37:03 legacy sshd[10767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.61.104 ... |
2020-02-22 15:17:04 |
| 218.92.0.158 | attack | Feb 22 07:53:23 vpn01 sshd[11537]: Failed password for root from 218.92.0.158 port 59442 ssh2 Feb 22 07:53:37 vpn01 sshd[11537]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 59442 ssh2 [preauth] ... |
2020-02-22 15:01:45 |
| 13.234.213.182 | attackbots | until 2020-02-21T21:56:10+00:00, observations: 4, bad account names: 1 |
2020-02-22 14:29:41 |
| 222.186.42.155 | attackbotsspam | Feb 22 07:27:09 vpn01 sshd[11180]: Failed password for root from 222.186.42.155 port 18668 ssh2 Feb 22 07:27:10 vpn01 sshd[11180]: Failed password for root from 222.186.42.155 port 18668 ssh2 ... |
2020-02-22 14:30:04 |
| 31.211.65.102 | attackspam | 2020-02-22T06:17:49.185760dmca.cloudsearch.cf sshd[22451]: Invalid user angel from 31.211.65.102 port 53654 2020-02-22T06:17:49.191159dmca.cloudsearch.cf sshd[22451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.211.65.102 2020-02-22T06:17:49.185760dmca.cloudsearch.cf sshd[22451]: Invalid user angel from 31.211.65.102 port 53654 2020-02-22T06:17:51.749967dmca.cloudsearch.cf sshd[22451]: Failed password for invalid user angel from 31.211.65.102 port 53654 ssh2 2020-02-22T06:26:07.116518dmca.cloudsearch.cf sshd[22953]: Invalid user wordpress from 31.211.65.102 port 35114 2020-02-22T06:26:07.123857dmca.cloudsearch.cf sshd[22953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.211.65.102 2020-02-22T06:26:07.116518dmca.cloudsearch.cf sshd[22953]: Invalid user wordpress from 31.211.65.102 port 35114 2020-02-22T06:26:09.717526dmca.cloudsearch.cf sshd[22953]: Failed password for invalid user wordpress fro ... |
2020-02-22 15:14:01 |