城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.41.166.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.41.166.238. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:38:32 CST 2025
;; MSG SIZE rcvd: 107
Host 238.166.41.139.in-addr.arpa not found: 2(SERVFAIL)
server can't find 139.41.166.238.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.92.0.249 | attack | Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-21 17:06:17 |
| 134.209.245.44 | attackspambots | Automatic report BANNED IP |
2020-06-21 17:11:33 |
| 93.126.57.213 | attackbots | DATE:2020-06-21 05:53:37, IP:93.126.57.213, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-06-21 16:36:40 |
| 1.214.156.164 | attackbots | 2020-06-21T07:55:00.022523 sshd[12458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.156.164 user=root 2020-06-21T07:55:02.329573 sshd[12458]: Failed password for root from 1.214.156.164 port 32971 ssh2 2020-06-21T07:59:44.418078 sshd[12537]: Invalid user user from 1.214.156.164 port 33134 ... |
2020-06-21 16:54:33 |
| 51.83.216.240 | attackspam | [Sun Jun 21 04:53:13.164444 2020] [access_compat:error] [pid 25498] [client 51.83.216.240:38895] AH01797: client denied by server configuration: /var/www/html/luke/wp-admin/css/colors/light/index.php, referer: http://www.facebook.net/ ... |
2020-06-21 16:58:06 |
| 104.238.120.62 | attackbotsspam | Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools |
2020-06-21 17:01:24 |
| 1.119.131.102 | attackbots | Brute force attempt |
2020-06-21 17:14:04 |
| 51.38.126.92 | attackbots | Jun 21 05:46:31 ws26vmsma01 sshd[87444]: Failed password for root from 51.38.126.92 port 47072 ssh2 Jun 21 06:00:34 ws26vmsma01 sshd[106367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.126.92 ... |
2020-06-21 16:45:33 |
| 60.199.131.62 | attack | Jun 21 10:05:43 electroncash sshd[8539]: Invalid user virus from 60.199.131.62 port 33468 Jun 21 10:05:45 electroncash sshd[8539]: Failed password for invalid user virus from 60.199.131.62 port 33468 ssh2 Jun 21 10:08:26 electroncash sshd[9216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.199.131.62 user=root Jun 21 10:08:28 electroncash sshd[9216]: Failed password for root from 60.199.131.62 port 45816 ssh2 Jun 21 10:11:11 electroncash sshd[9921]: Invalid user dany from 60.199.131.62 port 58166 ... |
2020-06-21 17:12:59 |
| 54.37.159.12 | attack | Jun 21 09:25:46 pve1 sshd[23800]: Failed password for root from 54.37.159.12 port 46174 ssh2 ... |
2020-06-21 17:01:47 |
| 49.205.178.198 | attackspam | Unauthorised access (Jun 21) SRC=49.205.178.198 LEN=52 TTL=114 ID=16675 DF TCP DPT=445 WINDOW=8192 SYN |
2020-06-21 16:42:07 |
| 181.48.28.13 | attack | Jun 21 08:40:36 ns392434 sshd[19567]: Invalid user postgres from 181.48.28.13 port 34712 Jun 21 08:40:36 ns392434 sshd[19567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13 Jun 21 08:40:36 ns392434 sshd[19567]: Invalid user postgres from 181.48.28.13 port 34712 Jun 21 08:40:39 ns392434 sshd[19567]: Failed password for invalid user postgres from 181.48.28.13 port 34712 ssh2 Jun 21 08:42:27 ns392434 sshd[19585]: Invalid user khd from 181.48.28.13 port 58014 Jun 21 08:42:27 ns392434 sshd[19585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.28.13 Jun 21 08:42:27 ns392434 sshd[19585]: Invalid user khd from 181.48.28.13 port 58014 Jun 21 08:42:29 ns392434 sshd[19585]: Failed password for invalid user khd from 181.48.28.13 port 58014 ssh2 Jun 21 08:43:46 ns392434 sshd[19629]: Invalid user user from 181.48.28.13 port 48108 |
2020-06-21 17:07:16 |
| 139.59.65.173 | attack | sshd |
2020-06-21 16:56:54 |
| 223.204.86.45 | attackspam | Unauthorized connection attempt detected from IP address 223.204.86.45 to port 23 |
2020-06-21 16:40:39 |
| 188.170.93.248 | attack | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-06-21 17:16:19 |