城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.228.71.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63645
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.228.71.92. IN A
;; AUTHORITY SECTION:
. 585 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:28:20 CST 2022
;; MSG SIZE rcvd: 106
92.71.228.139.in-addr.arpa domain name pointer fm-dyn-139-228-71-92.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
92.71.228.139.in-addr.arpa name = fm-dyn-139-228-71-92.fast.net.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.175.55.196 | attack | Oct 20 10:32:04 server sshd\[22213\]: Invalid user yang from 122.175.55.196 Oct 20 10:32:04 server sshd\[22213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.175.55.196 Oct 20 10:32:06 server sshd\[22213\]: Failed password for invalid user yang from 122.175.55.196 port 48206 ssh2 Oct 20 10:40:15 server sshd\[24298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.175.55.196 user=root Oct 20 10:40:16 server sshd\[24298\]: Failed password for root from 122.175.55.196 port 19953 ssh2 ... |
2019-10-20 19:39:50 |
| 89.46.107.106 | attackbots | xmlrpc attack |
2019-10-20 19:26:01 |
| 89.46.109.248 | attack | xmlrpc attack |
2019-10-20 19:29:30 |
| 159.65.229.162 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2019-10-20 19:15:24 |
| 123.58.6.216 | attackbots | PHP DIESCAN Information Disclosure Vulnerability |
2019-10-20 19:36:16 |
| 122.176.93.58 | attackspambots | $f2bV_matches |
2019-10-20 19:30:25 |
| 118.24.14.203 | attackbots | Oct 20 05:41:15 DAAP sshd[29443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.14.203 user=root Oct 20 05:41:16 DAAP sshd[29443]: Failed password for root from 118.24.14.203 port 38332 ssh2 Oct 20 05:46:12 DAAP sshd[29471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.14.203 user=root Oct 20 05:46:14 DAAP sshd[29471]: Failed password for root from 118.24.14.203 port 48946 ssh2 ... |
2019-10-20 19:07:15 |
| 202.157.176.95 | attack | Oct 16 18:02:30 eola sshd[18281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.157.176.95 user=r.r Oct 16 18:02:31 eola sshd[18281]: Failed password for r.r from 202.157.176.95 port 54980 ssh2 Oct 16 18:02:32 eola sshd[18281]: Received disconnect from 202.157.176.95 port 54980:11: Bye Bye [preauth] Oct 16 18:02:32 eola sshd[18281]: Disconnected from 202.157.176.95 port 54980 [preauth] Oct 16 18:15:01 eola sshd[18639]: Invalid user jules from 202.157.176.95 port 41101 Oct 16 18:15:01 eola sshd[18639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.157.176.95 Oct 16 18:15:03 eola sshd[18639]: Failed password for invalid user jules from 202.157.176.95 port 41101 ssh2 Oct 16 18:15:03 eola sshd[18639]: Received disconnect from 202.157.176.95 port 41101:11: Bye Bye [preauth] Oct 16 18:15:03 eola sshd[18639]: Disconnected from 202.157.176.95 port 41101 [preauth] Oct 16 18:19:21 eola s........ ------------------------------- |
2019-10-20 19:40:34 |
| 111.204.78.42 | attackbotsspam | Attempts to probe for or exploit a Drupal 7.67 site on url: /shell.php. Reported by the module https://www.drupal.org/project/abuseipdb. |
2019-10-20 19:14:09 |
| 106.58.210.27 | attackspam | failed_logins |
2019-10-20 19:35:09 |
| 159.203.74.227 | attackspam | Invalid user art from 159.203.74.227 port 53074 |
2019-10-20 19:07:42 |
| 212.48.93.183 | attackspam | Sat, 19 Oct 2019 16:15:58 -0400 Received: from blue3011.server-cp.com ([212.48.93.183]:52227 helo=mail2.universalmedia365.com) From: "Andrew Palmer" |
2019-10-20 19:10:56 |
| 212.156.173.125 | attack | Automatic report - Banned IP Access |
2019-10-20 19:33:16 |
| 14.34.165.243 | attackbots | Automatic report - Port Scan Attack |
2019-10-20 19:47:57 |
| 37.193.108.101 | attack | $f2bV_matches |
2019-10-20 19:26:16 |