城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.221.206.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.221.206.199. IN A
;; AUTHORITY SECTION:
. 170 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011100 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 01:22:11 CST 2022
;; MSG SIZE rcvd: 108
Host 199.206.221.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 199.206.221.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 93.185.67.178 | attackbotsspam | Sep 25 14:16:04 lnxded64 sshd[30134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.185.67.178 Sep 25 14:16:06 lnxded64 sshd[30134]: Failed password for invalid user admin from 93.185.67.178 port 58886 ssh2 Sep 25 14:16:08 lnxded64 sshd[30134]: Failed password for invalid user admin from 93.185.67.178 port 58886 ssh2 Sep 25 14:16:10 lnxded64 sshd[30134]: Failed password for invalid user admin from 93.185.67.178 port 58886 ssh2 |
2019-09-26 03:17:33 |
| 50.64.152.76 | attackspambots | Sep 25 07:13:43 sachi sshd\[13199\]: Invalid user ubnt from 50.64.152.76 Sep 25 07:13:43 sachi sshd\[13199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106bc9b68acafab.vc.shawcable.net Sep 25 07:13:45 sachi sshd\[13199\]: Failed password for invalid user ubnt from 50.64.152.76 port 48870 ssh2 Sep 25 07:17:42 sachi sshd\[13524\]: Invalid user vps from 50.64.152.76 Sep 25 07:17:42 sachi sshd\[13524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=s0106bc9b68acafab.vc.shawcable.net |
2019-09-26 02:39:47 |
| 14.141.147.138 | attackspambots | Honeypot attack, port: 445, PTR: 14.141.147.138.static-Mumbai.vsnl.net.in. |
2019-09-26 02:42:27 |
| 114.35.213.9 | attackbotsspam | Sep 25 12:16:27 system,error,critical: login failure for user admin from 114.35.213.9 via telnet Sep 25 12:16:29 system,error,critical: login failure for user root from 114.35.213.9 via telnet Sep 25 12:16:30 system,error,critical: login failure for user root from 114.35.213.9 via telnet Sep 25 12:16:35 system,error,critical: login failure for user root from 114.35.213.9 via telnet Sep 25 12:16:36 system,error,critical: login failure for user root from 114.35.213.9 via telnet Sep 25 12:16:38 system,error,critical: login failure for user admin from 114.35.213.9 via telnet Sep 25 12:16:43 system,error,critical: login failure for user root from 114.35.213.9 via telnet Sep 25 12:16:44 system,error,critical: login failure for user ubnt from 114.35.213.9 via telnet Sep 25 12:16:46 system,error,critical: login failure for user admin from 114.35.213.9 via telnet Sep 25 12:16:50 system,error,critical: login failure for user admin from 114.35.213.9 via telnet |
2019-09-26 02:39:00 |
| 92.50.249.92 | attackbotsspam | Sep 25 14:53:58 plusreed sshd[32524]: Invalid user derrick from 92.50.249.92 ... |
2019-09-26 02:58:34 |
| 176.237.22.236 | attackspambots | Honeypot attack, port: 5555, PTR: PTR record not found |
2019-09-26 03:09:34 |
| 188.165.250.228 | attackspambots | Sep 25 14:04:33 mail sshd[8396]: Invalid user td from 188.165.250.228 Sep 25 14:04:33 mail sshd[8396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.250.228 Sep 25 14:04:33 mail sshd[8396]: Invalid user td from 188.165.250.228 Sep 25 14:04:35 mail sshd[8396]: Failed password for invalid user td from 188.165.250.228 port 48786 ssh2 Sep 25 14:16:19 mail sshd[26870]: Invalid user direct from 188.165.250.228 ... |
2019-09-26 03:07:26 |
| 128.199.162.108 | attack | Automatic report - Banned IP Access |
2019-09-26 02:52:40 |
| 174.138.21.225 | attack | Sep 25 04:34:12 lcprod sshd\[18193\]: Invalid user git from 174.138.21.225 Sep 25 04:34:12 lcprod sshd\[18193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.225 Sep 25 04:34:14 lcprod sshd\[18193\]: Failed password for invalid user git from 174.138.21.225 port 37540 ssh2 Sep 25 04:39:38 lcprod sshd\[18701\]: Invalid user teamspeak3 from 174.138.21.225 Sep 25 04:39:38 lcprod sshd\[18701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.225 |
2019-09-26 03:04:38 |
| 183.129.150.2 | attackbots | *Port Scan* detected from 183.129.150.2 (CN/China/-). 4 hits in the last 130 seconds |
2019-09-26 02:53:10 |
| 148.70.77.22 | attack | Sep 25 14:16:41 MK-Soft-VM6 sshd[1184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.77.22 Sep 25 14:16:43 MK-Soft-VM6 sshd[1184]: Failed password for invalid user deployer from 148.70.77.22 port 52378 ssh2 ... |
2019-09-26 02:47:15 |
| 119.108.199.159 | attack | 23/tcp [2019-09-25]1pkt |
2019-09-26 03:00:44 |
| 119.28.14.154 | attack | Sep 25 17:57:02 vps01 sshd[22013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.14.154 Sep 25 17:57:05 vps01 sshd[22013]: Failed password for invalid user user from 119.28.14.154 port 50646 ssh2 |
2019-09-26 02:40:51 |
| 115.221.29.230 | attackbotsspam | Chat Spam |
2019-09-26 02:47:31 |
| 145.239.10.217 | attackspam | Sep 25 07:19:14 wbs sshd\[29505\]: Invalid user Administrator from 145.239.10.217 Sep 25 07:19:14 wbs sshd\[29505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3088253.ip-145-239-10.eu Sep 25 07:19:16 wbs sshd\[29505\]: Failed password for invalid user Administrator from 145.239.10.217 port 56984 ssh2 Sep 25 07:23:33 wbs sshd\[29837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3088253.ip-145-239-10.eu user=root Sep 25 07:23:35 wbs sshd\[29837\]: Failed password for root from 145.239.10.217 port 41560 ssh2 |
2019-09-26 02:55:11 |