城市(city): unknown
省份(region): unknown
国家(country): unknown
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.255.142.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.255.142.150. IN A
;; AUTHORITY SECTION:
. 79 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:29:04 CST 2022
;; MSG SIZE rcvd: 108
150.142.255.139.in-addr.arpa domain name pointer ln-static-139-255-142-150.link.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
150.142.255.139.in-addr.arpa name = ln-static-139-255-142-150.link.net.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 109.190.153.178 | attack | Multiple SSH auth failures recorded by fail2ban |
2019-08-26 11:11:31 |
| 66.249.66.83 | attackbots | Automatic report - Banned IP Access |
2019-08-26 10:43:30 |
| 54.39.97.17 | attackbots | Aug 26 02:29:12 marvibiene sshd[38375]: Invalid user cloud from 54.39.97.17 port 52584 Aug 26 02:29:12 marvibiene sshd[38375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.97.17 Aug 26 02:29:12 marvibiene sshd[38375]: Invalid user cloud from 54.39.97.17 port 52584 Aug 26 02:29:14 marvibiene sshd[38375]: Failed password for invalid user cloud from 54.39.97.17 port 52584 ssh2 ... |
2019-08-26 10:52:38 |
| 181.23.85.202 | attackbots | Honeypot attack, port: 23, PTR: 181-23-85-202.speedy.com.ar. |
2019-08-26 10:34:42 |
| 80.91.192.165 | attack | [portscan] Port scan |
2019-08-26 10:30:48 |
| 103.66.16.18 | attackspam | Aug 25 22:15:14 TORMINT sshd\[5676\]: Invalid user backups from 103.66.16.18 Aug 25 22:15:14 TORMINT sshd\[5676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.66.16.18 Aug 25 22:15:17 TORMINT sshd\[5676\]: Failed password for invalid user backups from 103.66.16.18 port 49124 ssh2 ... |
2019-08-26 10:28:30 |
| 218.219.246.124 | attackbotsspam | $f2bV_matches_ltvn |
2019-08-26 10:31:06 |
| 80.211.238.5 | attackbotsspam | Aug 26 03:27:58 mail sshd[20708]: Invalid user batchService from 80.211.238.5 Aug 26 03:27:58 mail sshd[20708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.238.5 Aug 26 03:27:58 mail sshd[20708]: Invalid user batchService from 80.211.238.5 Aug 26 03:28:00 mail sshd[20708]: Failed password for invalid user batchService from 80.211.238.5 port 60796 ssh2 Aug 26 03:38:31 mail sshd[4626]: Invalid user servercsgo from 80.211.238.5 ... |
2019-08-26 10:39:24 |
| 114.220.176.218 | attack | Invalid user elastic from 114.220.176.218 port 47154 |
2019-08-26 10:38:42 |
| 198.50.150.83 | attackbotsspam | Aug 26 03:14:38 SilenceServices sshd[11907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.150.83 Aug 26 03:14:39 SilenceServices sshd[11907]: Failed password for invalid user jader from 198.50.150.83 port 45872 ssh2 Aug 26 03:19:10 SilenceServices sshd[13680]: Failed password for root from 198.50.150.83 port 43482 ssh2 |
2019-08-26 10:53:44 |
| 142.93.179.95 | attack | Aug 25 23:26:45 dedicated sshd[23407]: Invalid user test8 from 142.93.179.95 port 34158 |
2019-08-26 11:09:52 |
| 213.32.52.1 | attack | Automatic report - Banned IP Access |
2019-08-26 10:51:57 |
| 68.183.37.247 | attackbots | Multiple SSH auth failures recorded by fail2ban |
2019-08-26 10:55:59 |
| 45.163.117.8 | attackbotsspam | Mail sent to address hacked/leaked from Last.fm |
2019-08-26 11:03:00 |
| 212.34.61.98 | attackspambots | [portscan] Port scan |
2019-08-26 11:12:57 |