城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.22.77.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.22.77.148. IN A
;; AUTHORITY SECTION:
. 402 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061302 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 14 05:25:28 CST 2022
;; MSG SIZE rcvd: 106
Host 148.77.22.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 148.77.22.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 213.251.41.52 | attackspambots | $f2bV_matches |
2019-11-10 16:42:34 |
| 14.37.38.213 | attackspam | Nov 10 07:20:06 srv-ubuntu-dev3 sshd[119704]: Invalid user teamspeak from 14.37.38.213 Nov 10 07:20:06 srv-ubuntu-dev3 sshd[119704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.37.38.213 Nov 10 07:20:06 srv-ubuntu-dev3 sshd[119704]: Invalid user teamspeak from 14.37.38.213 Nov 10 07:20:08 srv-ubuntu-dev3 sshd[119704]: Failed password for invalid user teamspeak from 14.37.38.213 port 35414 ssh2 Nov 10 07:24:44 srv-ubuntu-dev3 sshd[120107]: Invalid user video from 14.37.38.213 Nov 10 07:24:44 srv-ubuntu-dev3 sshd[120107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.37.38.213 Nov 10 07:24:44 srv-ubuntu-dev3 sshd[120107]: Invalid user video from 14.37.38.213 Nov 10 07:24:46 srv-ubuntu-dev3 sshd[120107]: Failed password for invalid user video from 14.37.38.213 port 44760 ssh2 Nov 10 07:29:27 srv-ubuntu-dev3 sshd[120476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus ... |
2019-11-10 17:10:07 |
| 201.150.5.14 | attackspam | Nov 10 01:29:30 srv3 sshd\[22805\]: Invalid user hayden from 201.150.5.14 Nov 10 01:29:30 srv3 sshd\[22805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.150.5.14 Nov 10 01:29:32 srv3 sshd\[22805\]: Failed password for invalid user hayden from 201.150.5.14 port 48972 ssh2 ... |
2019-11-10 17:07:52 |
| 167.99.85.183 | attackspambots | Nov 9 13:34:01 server sshd[1931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.85.183 user=r.r Nov 9 13:34:04 server sshd[1931]: Failed password for r.r from 167.99.85.183 port 50938 ssh2 Nov 9 13:34:04 server sshd[1931]: Received disconnect from 167.99.85.183: 11: Bye Bye [preauth] Nov 9 13:42:11 server sshd[2159]: Failed password for invalid user acct from 167.99.85.183 port 57332 ssh2 Nov 9 13:42:11 server sshd[2159]: Received disconnect from 167.99.85.183: 11: Bye Bye [preauth] Nov 9 13:45:57 server sshd[2244]: Failed password for invalid user admin from 167.99.85.183 port 41640 ssh2 Nov 9 13:45:57 server sshd[2244]: Received disconnect from 167.99.85.183: 11: Bye Bye [preauth] Nov 9 13:49:40 server sshd[2306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.85.183 user=messagebus Nov 9 13:49:42 server sshd[2306]: Failed password for messagebus from 167.99.85......... ------------------------------- |
2019-11-10 16:58:55 |
| 121.139.230.97 | attackbotsspam | Nov 10 07:29:06 |
2019-11-10 16:50:04 |
| 162.241.129.247 | attackspam | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services |
2019-11-10 16:59:24 |
| 187.188.240.236 | attackspam | Brute force attempt |
2019-11-10 16:43:30 |
| 193.112.77.113 | attackbotsspam | Nov 10 09:28:22 dedicated sshd[29320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.77.113 user=root Nov 10 09:28:24 dedicated sshd[29320]: Failed password for root from 193.112.77.113 port 54224 ssh2 |
2019-11-10 16:53:14 |
| 139.199.35.66 | attack | Nov 9 22:46:26 web1 sshd\[25838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.35.66 user=root Nov 9 22:46:28 web1 sshd\[25838\]: Failed password for root from 139.199.35.66 port 51762 ssh2 Nov 9 22:50:33 web1 sshd\[26180\]: Invalid user niclas from 139.199.35.66 Nov 9 22:50:33 web1 sshd\[26180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.35.66 Nov 9 22:50:35 web1 sshd\[26180\]: Failed password for invalid user niclas from 139.199.35.66 port 53034 ssh2 |
2019-11-10 16:52:03 |
| 190.117.62.241 | attackspam | Nov 10 09:45:52 dedicated sshd[32172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.117.62.241 user=root Nov 10 09:45:54 dedicated sshd[32172]: Failed password for root from 190.117.62.241 port 35134 ssh2 |
2019-11-10 17:09:08 |
| 35.185.45.244 | attackbots | Nov 10 02:22:44 plusreed sshd[13022]: Invalid user mei from 35.185.45.244 ... |
2019-11-10 16:40:00 |
| 222.186.15.33 | attackbotsspam | Nov 10 10:39:24 sauna sshd[106368]: Failed password for root from 222.186.15.33 port 18808 ssh2 ... |
2019-11-10 16:54:18 |
| 79.148.125.113 | attackspambots | Automatic report - SSH Brute-Force Attack |
2019-11-10 16:37:06 |
| 209.235.23.125 | attack | Nov 10 07:51:18 microserver sshd[48203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.23.125 user=root Nov 10 07:51:21 microserver sshd[48203]: Failed password for root from 209.235.23.125 port 60736 ssh2 Nov 10 07:54:37 microserver sshd[48414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.23.125 user=root Nov 10 07:54:39 microserver sshd[48414]: Failed password for root from 209.235.23.125 port 40620 ssh2 Nov 10 07:57:57 microserver sshd[48976]: Invalid user indigo from 209.235.23.125 port 48728 Nov 10 08:10:59 microserver sshd[50855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.23.125 user=root Nov 10 08:11:02 microserver sshd[50855]: Failed password for root from 209.235.23.125 port 52982 ssh2 Nov 10 08:14:25 microserver sshd[51041]: Invalid user alien from 209.235.23.125 port 32864 Nov 10 08:14:25 microserver sshd[51041]: pam_unix(sshd:auth): authenti |
2019-11-10 17:11:26 |
| 220.202.75.199 | attackbotsspam | Nov 8 07:47:26 CT721 postfix/smtpd[2954]: connect from unknown[220.202.75.199] Nov 8 07:47:29 CT721 postfix/smtpd[2954]: warning: unknown[220.202.75.199]: SASL LOGIN authentication failed: authentication failure Nov 8 07:47:29 CT721 postfix/smtpd[2954]: disconnect from unknown[220.202.75.199] Nov 8 07:47:41 CT721 postfix/smtpd[2954]: connect from unknown[220.202.75.199] Nov 8 07:47:42 CT721 postfix/smtpd[2954]: warning: unknown[220.202.75.199]: SASL LOGIN authentication failed: authentication failure Nov 8 07:47:43 CT721 postfix/smtpd[2954]: disconnect from unknown[220.202.75.199] Nov 8 07:47:45 CT721 postfix/smtpd[2954]: connect from unknown[220.202.75.199] Nov 8 07:47:47 CT721 postfix/smtpd[2954]: warning: unknown[220.202.75.199]: SASL LOGIN authentication failed: authentication failure Nov 8 07:47:47 CT721 postfix/smtpd[2954]: disconnect from unknown[220.202.75.199] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=220.202.75.199 |
2019-11-10 17:17:37 |