城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.40.140.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.40.140.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:08:06 CST 2025
;; MSG SIZE rcvd: 107
Host 104.140.40.139.in-addr.arpa not found: 2(SERVFAIL)
server can't find 139.40.140.104.in-addr.arpa: SERVFAIL
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
218.76.140.201 | attack | Nov 26 07:25:19 nextcloud sshd\[16539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.76.140.201 user=news Nov 26 07:25:21 nextcloud sshd\[16539\]: Failed password for news from 218.76.140.201 port 21974 ssh2 Nov 26 07:29:26 nextcloud sshd\[22698\]: Invalid user guest from 218.76.140.201 ... |
2019-11-26 15:28:31 |
1.55.94.114 | attackspambots | Unauthorised access (Nov 26) SRC=1.55.94.114 LEN=52 TTL=108 ID=18914 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-26 15:44:40 |
43.243.128.213 | attackspambots | 2019-11-26T07:36:43.617350abusebot-7.cloudsearch.cf sshd\[21039\]: Invalid user curtin from 43.243.128.213 port 54613 |
2019-11-26 15:48:40 |
37.59.223.207 | attackspam | Nov 26 06:54:04 mxgate1 postfix/postscreen[19300]: CONNECT from [37.59.223.207]:32823 to [176.31.12.44]:25 Nov 26 06:54:04 mxgate1 postfix/dnsblog[19302]: addr 37.59.223.207 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 26 06:54:04 mxgate1 postfix/dnsblog[19301]: addr 37.59.223.207 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 26 06:54:04 mxgate1 postfix/dnsblog[19301]: addr 37.59.223.207 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 26 06:54:10 mxgate1 postfix/postscreen[19300]: DNSBL rank 3 for [37.59.223.207]:32823 Nov 26 06:54:10 mxgate1 postfix/tlsproxy[19334]: CONNECT from [37.59.223.207]:32823 Nov x@x Nov 26 06:54:10 mxgate1 postfix/postscreen[19300]: DISCONNECT [37.59.223.207]:32823 Nov 26 06:54:10 mxgate1 postfix/tlsproxy[19334]: DISCONNECT [37.59.223.207]:32823 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=37.59.223.207 |
2019-11-26 15:25:25 |
112.141.202.143 | attack | TCP Port Scanning |
2019-11-26 15:49:36 |
93.170.130.1 | attackbotsspam | 2019-11-26T07:33:12.212540abusebot-3.cloudsearch.cf sshd\[22947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.170.130.1 user=bin |
2019-11-26 15:35:00 |
46.229.182.110 | attackspambots | Nov 26 07:29:13 mail sshd\[18266\]: Invalid user zabbix from 46.229.182.110 Nov 26 07:29:13 mail sshd\[18266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.229.182.110 Nov 26 07:29:14 mail sshd\[18266\]: Failed password for invalid user zabbix from 46.229.182.110 port 43792 ssh2 ... |
2019-11-26 15:36:33 |
165.255.108.129 | attackbots | TCP Port Scanning |
2019-11-26 15:41:04 |
150.249.114.20 | attackspambots | Nov 26 08:12:34 mout sshd[320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.249.114.20 user=root Nov 26 08:12:36 mout sshd[320]: Failed password for root from 150.249.114.20 port 59200 ssh2 |
2019-11-26 15:33:54 |
129.211.130.37 | attackspam | Nov 25 21:07:00 tdfoods sshd\[31493\]: Invalid user ident from 129.211.130.37 Nov 25 21:07:00 tdfoods sshd\[31493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.37 Nov 25 21:07:02 tdfoods sshd\[31493\]: Failed password for invalid user ident from 129.211.130.37 port 38541 ssh2 Nov 25 21:14:14 tdfoods sshd\[32223\]: Invalid user songchar from 129.211.130.37 Nov 25 21:14:14 tdfoods sshd\[32223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.37 |
2019-11-26 15:32:14 |
218.92.0.154 | attackspambots | Nov 26 10:32:19 hosting sshd[5526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154 user=root Nov 26 10:32:21 hosting sshd[5526]: Failed password for root from 218.92.0.154 port 37142 ssh2 ... |
2019-11-26 15:38:41 |
177.67.140.161 | attackspam | Automatic report - Port Scan Attack |
2019-11-26 15:33:02 |
51.38.113.45 | attackbotsspam | Nov 26 08:33:01 mail sshd[5498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.113.45 Nov 26 08:33:03 mail sshd[5498]: Failed password for invalid user armando from 51.38.113.45 port 53886 ssh2 Nov 26 08:39:01 mail sshd[6814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.113.45 |
2019-11-26 15:40:06 |
221.214.240.21 | attackbots | Nov 25 21:12:16 kapalua sshd\[10676\]: Invalid user nastari from 221.214.240.21 Nov 25 21:12:16 kapalua sshd\[10676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.214.240.21 Nov 25 21:12:19 kapalua sshd\[10676\]: Failed password for invalid user nastari from 221.214.240.21 port 53954 ssh2 Nov 25 21:16:34 kapalua sshd\[11021\]: Invalid user guest from 221.214.240.21 Nov 25 21:16:34 kapalua sshd\[11021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.214.240.21 |
2019-11-26 15:22:09 |
212.64.91.66 | attackspam | Nov 26 07:08:06 hcbbdb sshd\[24821\]: Invalid user kathryn123 from 212.64.91.66 Nov 26 07:08:06 hcbbdb sshd\[24821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.91.66 Nov 26 07:08:08 hcbbdb sshd\[24821\]: Failed password for invalid user kathryn123 from 212.64.91.66 port 46650 ssh2 Nov 26 07:15:24 hcbbdb sshd\[25589\]: Invalid user copper from 212.64.91.66 Nov 26 07:15:24 hcbbdb sshd\[25589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.91.66 |
2019-11-26 15:27:28 |