城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.38.87.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.38.87.161. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 09:22:49 CST 2025
;; MSG SIZE rcvd: 106
b'Host 161.87.38.139.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 139.38.87.161.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 46.146.148.61 | attackspam | Lines containing failures of 46.146.148.61 Jul 9 05:12:41 echo390 sshd[25651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.148.61 user=r.r Jul 9 05:12:42 echo390 sshd[25651]: Failed password for r.r from 46.146.148.61 port 55662 ssh2 Jul 9 05:12:52 echo390 sshd[25651]: message repeated 5 times: [ Failed password for r.r from 46.146.148.61 port 55662 ssh2] Jul 9 05:12:52 echo390 sshd[25651]: error: maximum authentication attempts exceeded for r.r from 46.146.148.61 port 55662 ssh2 [preauth] Jul 9 05:12:52 echo390 sshd[25651]: Disconnecting authenticating user r.r 46.146.148.61 port 55662: Too many authentication failures [preauth] Jul 9 05:12:52 echo390 sshd[25651]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.148.61 user=r.r Jul 9 05:13:01 echo390 sshd[25662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.148.61 user=r.r J........ ------------------------------ |
2019-07-09 17:17:50 |
| 45.55.20.128 | attack | $f2bV_matches |
2019-07-09 16:59:06 |
| 186.193.228.66 | attackspambots | Lines containing failures of 186.193.228.66 Jul 9 00:48:48 ariston sshd[8130]: Invalid user csgo from 186.193.228.66 port 60140 Jul 9 00:48:48 ariston sshd[8130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.193.228.66 Jul 9 00:48:50 ariston sshd[8130]: Failed password for invalid user csgo from 186.193.228.66 port 60140 ssh2 Jul 9 00:48:51 ariston sshd[8130]: Received disconnect from 186.193.228.66 port 60140:11: Bye Bye [preauth] Jul 9 00:48:51 ariston sshd[8130]: Disconnected from invalid user csgo 186.193.228.66 port 60140 [preauth] Jul 9 00:50:59 ariston sshd[8714]: Invalid user pp from 186.193.228.66 port 52306 Jul 9 00:50:59 ariston sshd[8714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.193.228.66 Jul 9 00:51:01 ariston sshd[8714]: Failed password for invalid user pp from 186.193.228.66 port 52306 ssh2 Jul 9 00:51:02 ariston sshd[8714]: Received disconnect from........ ------------------------------ |
2019-07-09 16:50:44 |
| 220.181.108.160 | attackspam | Bad bot/spoofed identity |
2019-07-09 16:46:05 |
| 27.73.86.48 | attackbots | Jul 9 05:09:04 server2101 sshd[6673]: Address 27.73.86.48 maps to localhost, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Jul 9 05:09:04 server2101 sshd[6673]: Invalid user admin from 27.73.86.48 Jul 9 05:09:04 server2101 sshd[6673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.73.86.48 Jul 9 05:09:06 server2101 sshd[6673]: Failed password for invalid user admin from 27.73.86.48 port 42521 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=27.73.86.48 |
2019-07-09 17:08:15 |
| 67.213.75.130 | attack | Jul 9 10:27:41 tux-35-217 sshd\[20853\]: Invalid user tecnica from 67.213.75.130 port 13095 Jul 9 10:27:41 tux-35-217 sshd\[20853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.213.75.130 Jul 9 10:27:42 tux-35-217 sshd\[20853\]: Failed password for invalid user tecnica from 67.213.75.130 port 13095 ssh2 Jul 9 10:30:50 tux-35-217 sshd\[20871\]: Invalid user zj from 67.213.75.130 port 9190 Jul 9 10:30:50 tux-35-217 sshd\[20871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.213.75.130 ... |
2019-07-09 17:25:41 |
| 92.118.160.49 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-09 17:27:06 |
| 109.72.99.111 | attackbots | Jul 9 05:09:56 HOST sshd[2878]: Failed password for invalid user admin from 109.72.99.111 port 57076 ssh2 Jul 9 05:09:58 HOST sshd[2878]: Failed password for invalid user admin from 109.72.99.111 port 57076 ssh2 Jul 9 05:09:58 HOST sshd[2881]: Failed password for invalid user support from 109.72.99.111 port 57080 ssh2 Jul 9 05:10:00 HOST sshd[2878]: Failed password for invalid user admin from 109.72.99.111 port 57076 ssh2 Jul 9 05:10:00 HOST sshd[2881]: Failed password for invalid user support from 109.72.99.111 port 57080 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=109.72.99.111 |
2019-07-09 16:40:47 |
| 191.53.198.106 | attack | Jul 8 22:24:25 mailman postfix/smtpd[32624]: warning: unknown[191.53.198.106]: SASL PLAIN authentication failed: authentication failure |
2019-07-09 16:43:10 |
| 40.81.200.18 | attack | 2019-07-09 06:10:33 dovecot_login authenticator failed for (bHOzM1p) [40.81.200.18]:61472: 535 Incorrect authentication data (set_id=maksims) 2019-07-09 06:10:40 dovecot_login authenticator failed for (66BTQ95mc9) [40.81.200.18]:61621: 535 Incorrect authentication data (set_id=maksims) 2019-07-09 06:10:51 dovecot_login authenticator failed for (dC9K4sLW) [40.81.200.18]:61967: 535 Incorrect authentication data (set_id=maksims) 2019-07-09 06:11:09 dovecot_login authenticator failed for (BMcltu) [40.81.200.18]:62559: 535 Incorrect authentication data 2019-07-09 06:11:20 dovecot_login authenticator failed for (YRsPHi) [40.81.200.18]:63376: 535 Incorrect authentication data 2019-07-09 06:11:31 dovecot_login authenticator failed for (nfMBS68g) [40.81.200.18]:64422: 535 Incorrect authentication data 2019-07-09 06:11:42 dovecot_login authenticator failed for (c7XKaZ) [40.81.200.18]:65134: 535 Incorrect authentication data 2019-07-09 06:11:53 dovecot_login authenticator failed fo........ ------------------------------ |
2019-07-09 16:35:58 |
| 43.247.12.82 | attackspambots | Jul 9 05:06:32 own sshd[28028]: Did not receive identification string from 43.247.12.82 Jul 9 05:06:38 own sshd[28038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.247.12.82 user=r.r Jul 9 05:06:40 own sshd[28038]: Failed password for r.r from 43.247.12.82 port 65288 ssh2 Jul 9 05:06:40 own sshd[28038]: Connection closed by 43.247.12.82 port 65288 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=43.247.12.82 |
2019-07-09 17:04:18 |
| 136.243.70.151 | attackspam | 20 attempts against mh-misbehave-ban on tree.magehost.pro |
2019-07-09 17:29:31 |
| 222.186.15.110 | attackbotsspam | Jul 9 09:39:12 minden010 sshd[7373]: Failed password for root from 222.186.15.110 port 35369 ssh2 Jul 9 09:39:21 minden010 sshd[7423]: Failed password for root from 222.186.15.110 port 62767 ssh2 ... |
2019-07-09 16:37:04 |
| 78.187.25.221 | attack | " " |
2019-07-09 17:13:10 |
| 82.119.100.182 | attackspam | Jul 9 06:43:04 mail sshd[8665]: Invalid user beverly from 82.119.100.182 Jul 9 06:43:04 mail sshd[8665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.119.100.182 Jul 9 06:43:04 mail sshd[8665]: Invalid user beverly from 82.119.100.182 Jul 9 06:43:06 mail sshd[8665]: Failed password for invalid user beverly from 82.119.100.182 port 33377 ssh2 Jul 9 06:45:00 mail sshd[8790]: Invalid user jacob from 82.119.100.182 ... |
2019-07-09 17:00:00 |