城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.228.71.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35898
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.228.71.164. IN A
;; AUTHORITY SECTION:
. 525 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 389 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:28:20 CST 2022
;; MSG SIZE rcvd: 107
164.71.228.139.in-addr.arpa domain name pointer fm-dyn-139-228-71-164.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
164.71.228.139.in-addr.arpa name = fm-dyn-139-228-71-164.fast.net.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 43.229.128.128 | attack | Nov 18 09:24:26 wbs sshd\[7997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.128.128 user=mysql Nov 18 09:24:29 wbs sshd\[7997\]: Failed password for mysql from 43.229.128.128 port 1207 ssh2 Nov 18 09:29:19 wbs sshd\[8428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.128.128 user=root Nov 18 09:29:22 wbs sshd\[8428\]: Failed password for root from 43.229.128.128 port 2124 ssh2 Nov 18 09:34:16 wbs sshd\[8901\]: Invalid user rpc from 43.229.128.128 |
2019-11-19 03:41:06 |
| 182.138.158.235 | attackbotsspam | The%20IP%20has%20triggered%20Cloudflare%20WAF.%20Report%20generated%20by%20Cloudflare-WAF-to-AbuseIPDB%20(https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB) |
2019-11-19 04:17:30 |
| 188.150.168.100 | attackspam | Nov 18 13:51:20 josie sshd[31884]: Invalid user atilla from 188.150.168.100 Nov 18 13:51:20 josie sshd[31884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.150.168.100 Nov 18 13:51:23 josie sshd[31884]: Failed password for invalid user atilla from 188.150.168.100 port 40264 ssh2 Nov 18 13:51:23 josie sshd[31885]: Received disconnect from 188.150.168.100: 11: Bye Bye Nov 18 13:58:09 josie sshd[6350]: Invalid user nfs from 188.150.168.100 Nov 18 13:58:09 josie sshd[6350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.150.168.100 Nov 18 13:58:12 josie sshd[6350]: Failed password for invalid user nfs from 188.150.168.100 port 34552 ssh2 Nov 18 13:58:12 josie sshd[6354]: Received disconnect from 188.150.168.100: 11: Bye Bye Nov 18 14:02:44 josie sshd[10290]: Invalid user gdm from 188.150.168.100 Nov 18 14:02:44 josie sshd[10290]: pam_unix(sshd:auth): authentication failure; logname........ ------------------------------- |
2019-11-19 03:57:04 |
| 106.12.48.216 | attack | Nov 18 09:59:24 php1 sshd\[7883\]: Invalid user host from 106.12.48.216 Nov 18 09:59:24 php1 sshd\[7883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.216 Nov 18 09:59:26 php1 sshd\[7883\]: Failed password for invalid user host from 106.12.48.216 port 49250 ssh2 Nov 18 10:03:35 php1 sshd\[8233\]: Invalid user uftp from 106.12.48.216 Nov 18 10:03:35 php1 sshd\[8233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.216 |
2019-11-19 04:14:42 |
| 202.129.210.59 | attack | Nov 18 18:01:15 localhost sshd\[39514\]: Invalid user guest1234678 from 202.129.210.59 port 45776 Nov 18 18:01:15 localhost sshd\[39514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.210.59 Nov 18 18:01:16 localhost sshd\[39514\]: Failed password for invalid user guest1234678 from 202.129.210.59 port 45776 ssh2 Nov 18 18:05:39 localhost sshd\[39665\]: Invalid user sendyk from 202.129.210.59 port 56998 Nov 18 18:05:39 localhost sshd\[39665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.210.59 ... |
2019-11-19 03:58:27 |
| 61.216.13.170 | attackbotsspam | Nov 18 14:58:14 marvibiene sshd[2434]: Invalid user sakurai from 61.216.13.170 port 15469 Nov 18 14:58:14 marvibiene sshd[2434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.13.170 Nov 18 14:58:14 marvibiene sshd[2434]: Invalid user sakurai from 61.216.13.170 port 15469 Nov 18 14:58:16 marvibiene sshd[2434]: Failed password for invalid user sakurai from 61.216.13.170 port 15469 ssh2 ... |
2019-11-19 03:39:25 |
| 43.254.45.10 | attackspam | Tried sshing with brute force. |
2019-11-19 04:13:45 |
| 106.13.117.241 | attack | SSHAttack |
2019-11-19 04:01:07 |
| 107.179.19.68 | attackbotsspam | Automatic report - XMLRPC Attack |
2019-11-19 03:43:01 |
| 210.92.91.223 | attackspambots | Nov 18 13:07:20 askasleikir sshd[2195]: Failed password for root from 210.92.91.223 port 51778 ssh2 Nov 18 12:53:19 askasleikir sshd[2128]: Failed password for invalid user lixi from 210.92.91.223 port 51264 ssh2 Nov 18 13:03:46 askasleikir sshd[2188]: Failed password for invalid user wooding from 210.92.91.223 port 44516 ssh2 |
2019-11-19 03:39:42 |
| 185.62.85.150 | attackspambots | Nov 18 18:12:25 *** sshd[6903]: Invalid user shropshire from 185.62.85.150 |
2019-11-19 04:05:24 |
| 116.196.93.89 | attackbotsspam | Nov 18 21:43:23 itv-usvr-01 sshd[6151]: Invalid user deploy from 116.196.93.89 Nov 18 21:43:23 itv-usvr-01 sshd[6151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.93.89 Nov 18 21:43:23 itv-usvr-01 sshd[6151]: Invalid user deploy from 116.196.93.89 Nov 18 21:43:25 itv-usvr-01 sshd[6151]: Failed password for invalid user deploy from 116.196.93.89 port 41070 ssh2 Nov 18 21:48:30 itv-usvr-01 sshd[6368]: Invalid user guest from 116.196.93.89 |
2019-11-19 03:49:48 |
| 177.191.37.59 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/177.191.37.59/ BR - 1H : (460) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : BR NAME ASN : ASN53006 IP : 177.191.37.59 CIDR : 177.191.0.0/16 PREFIX COUNT : 15 UNIQUE IP COUNT : 599808 ATTACKS DETECTED ASN53006 : 1H - 1 3H - 1 6H - 4 12H - 6 24H - 16 DateTime : 2019-11-18 17:07:42 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-19 04:12:49 |
| 199.58.86.211 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-19 03:48:48 |
| 194.5.225.220 | attack | TCP Port Scanning |
2019-11-19 03:40:17 |