城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.240.167.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.240.167.80. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:01:12 CST 2025
;; MSG SIZE rcvd: 107
Host 80.167.240.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 80.167.240.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 62.234.9.150 | attackspambots | Automatic report - Banned IP Access |
2020-02-11 08:24:44 |
| 118.89.107.221 | attack | Feb 11 00:48:26 dedicated sshd[12984]: Invalid user naw from 118.89.107.221 port 55633 |
2020-02-11 08:00:44 |
| 113.161.229.187 | attackspambots | Honeypot attack, port: 81, PTR: static.vnpt.vn. |
2020-02-11 08:07:02 |
| 66.70.142.220 | attackbots | Scanned 3 times in the last 24 hours on port 22 |
2020-02-11 08:27:03 |
| 84.228.157.213 | attackspam | Feb 10 23:26:00 yesfletchmain sshd\[25720\]: Invalid user xtl from 84.228.157.213 port 59738 Feb 10 23:26:00 yesfletchmain sshd\[25720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.228.157.213 Feb 10 23:26:02 yesfletchmain sshd\[25720\]: Failed password for invalid user xtl from 84.228.157.213 port 59738 ssh2 Feb 10 23:31:35 yesfletchmain sshd\[25873\]: Invalid user bgq from 84.228.157.213 port 44061 Feb 10 23:31:35 yesfletchmain sshd\[25873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.228.157.213 ... |
2020-02-11 08:27:39 |
| 85.172.108.2 | attackspam | Unauthorised access (Feb 11) SRC=85.172.108.2 LEN=48 PREC=0x20 TTL=113 ID=31729 TCP DPT=445 WINDOW=8192 SYN |
2020-02-11 08:35:23 |
| 103.63.2.186 | attackbots | Unauthorised access (Feb 11) SRC=103.63.2.186 LEN=40 TTL=244 ID=14849 TCP DPT=1433 WINDOW=1024 SYN |
2020-02-11 08:02:03 |
| 218.92.0.173 | attackspam | Feb 10 14:15:18 php1 sshd\[27591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root Feb 10 14:15:20 php1 sshd\[27591\]: Failed password for root from 218.92.0.173 port 37696 ssh2 Feb 10 14:15:30 php1 sshd\[27591\]: Failed password for root from 218.92.0.173 port 37696 ssh2 Feb 10 14:15:32 php1 sshd\[27591\]: Failed password for root from 218.92.0.173 port 37696 ssh2 Feb 10 14:15:36 php1 sshd\[27601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root |
2020-02-11 08:21:09 |
| 118.24.173.104 | attackbots | Feb 10 22:09:14 game-panel sshd[12564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104 Feb 10 22:09:16 game-panel sshd[12564]: Failed password for invalid user iok from 118.24.173.104 port 59054 ssh2 Feb 10 22:11:57 game-panel sshd[12657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104 |
2020-02-11 08:03:50 |
| 190.39.36.68 | attackspam | Honeypot attack, port: 445, PTR: 190-39-36-68.dyn.dsl.cantv.net. |
2020-02-11 08:35:45 |
| 109.227.63.3 | attackspam | Feb 11 01:16:35 sd-53420 sshd\[9367\]: Invalid user cfo from 109.227.63.3 Feb 11 01:16:35 sd-53420 sshd\[9367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3 Feb 11 01:16:37 sd-53420 sshd\[9367\]: Failed password for invalid user cfo from 109.227.63.3 port 36380 ssh2 Feb 11 01:19:18 sd-53420 sshd\[9660\]: Invalid user vyd from 109.227.63.3 Feb 11 01:19:18 sd-53420 sshd\[9660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3 ... |
2020-02-11 08:24:16 |
| 201.192.179.24 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-11 08:29:47 |
| 187.218.0.146 | attack | Honeypot attack, port: 445, PTR: customer-187-218-0-146.uninet-ide.com.mx. |
2020-02-11 08:37:58 |
| 45.33.70.146 | attackbotsspam | Feb1100:18:04server6sshd[18493]:refusedconnectfrom45.33.70.146\(45.33.70.146\)Feb1100:18:10server6sshd[18502]:refusedconnectfrom45.33.70.146\(45.33.70.146\)Feb1100:18:15server6sshd[18509]:refusedconnectfrom45.33.70.146\(45.33.70.146\)Feb1100:18:20server6sshd[18517]:refusedconnectfrom45.33.70.146\(45.33.70.146\)Feb1100:18:25server6sshd[18529]:refusedconnectfrom45.33.70.146\(45.33.70.146\) |
2020-02-11 08:37:26 |
| 222.186.169.194 | attackspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Failed password for root from 222.186.169.194 port 37802 ssh2 Failed password for root from 222.186.169.194 port 37802 ssh2 Failed password for root from 222.186.169.194 port 37802 ssh2 Failed password for root from 222.186.169.194 port 37802 ssh2 |
2020-02-11 08:14:40 |