城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.42.183.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50889
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.42.183.13. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 201 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:00:07 CST 2025
;; MSG SIZE rcvd: 106
Host 13.183.42.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 13.183.42.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 152.136.220.127 | attackspam | Oct 5 03:29:34 serwer sshd\[25271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.220.127 user=root Oct 5 03:29:36 serwer sshd\[25271\]: Failed password for root from 152.136.220.127 port 45710 ssh2 Oct 5 03:35:00 serwer sshd\[26078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.220.127 user=root ... |
2020-10-05 23:39:07 |
| 118.116.15.52 | attackspam | IP 118.116.15.52 attacked honeypot on port: 1433 at 10/5/2020 12:18:22 AM |
2020-10-05 23:53:01 |
| 200.121.135.49 | attackbotsspam | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-10-05 23:30:29 |
| 104.248.63.105 | attack | TCP port : 55522 |
2020-10-05 23:35:55 |
| 60.167.177.107 | attackspambots | Oct 5 13:03:04 nextcloud sshd\[25074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.177.107 user=root Oct 5 13:03:05 nextcloud sshd\[25074\]: Failed password for root from 60.167.177.107 port 53224 ssh2 Oct 5 13:17:27 nextcloud sshd\[10405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.177.107 user=root |
2020-10-05 23:36:22 |
| 167.99.13.90 | attackbots | 167.99.13.90 - - [04/Oct/2020:21:38:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2141 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.99.13.90 - - [04/Oct/2020:21:38:58 +0100] "POST /wp-login.php HTTP/1.1" 200 2173 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.99.13.90 - - [04/Oct/2020:21:39:03 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-05 23:31:34 |
| 202.91.77.233 | attackbotsspam | 1601843960 - 10/04/2020 22:39:20 Host: 202.91.77.233/202.91.77.233 Port: 445 TCP Blocked |
2020-10-05 23:11:39 |
| 123.130.112.6 | attack | "$f2bV_matches" |
2020-10-05 23:28:15 |
| 134.175.230.209 | attackspam | Brute%20Force%20SSH |
2020-10-05 23:14:56 |
| 104.248.160.58 | attackbots | Fail2Ban Ban Triggered (2) |
2020-10-05 23:50:37 |
| 149.202.79.125 | attackbots | Fail2Ban Ban Triggered |
2020-10-05 23:25:54 |
| 148.70.38.19 | attackbots | 2020-10-05T08:20:47.2706031495-001 sshd[49034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.38.19 user=root 2020-10-05T08:20:49.2050931495-001 sshd[49034]: Failed password for root from 148.70.38.19 port 34836 ssh2 2020-10-05T08:26:50.7566291495-001 sshd[49334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.38.19 user=root 2020-10-05T08:26:52.1888971495-001 sshd[49334]: Failed password for root from 148.70.38.19 port 41272 ssh2 2020-10-05T08:32:51.4078421495-001 sshd[49627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.38.19 user=root 2020-10-05T08:32:53.7337321495-001 sshd[49627]: Failed password for root from 148.70.38.19 port 47700 ssh2 ... |
2020-10-05 23:48:12 |
| 119.45.27.25 | attack | sshd: Failed password for .... from 119.45.27.25 port 51932 ssh2 (11 attempts) |
2020-10-05 23:50:51 |
| 185.200.118.42 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 1194 resulting in total of 5 scans from 185.200.118.0/24 block. |
2020-10-05 23:19:09 |
| 106.12.183.209 | attack | Oct 5 17:29:37 pornomens sshd\[20055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.209 user=root Oct 5 17:29:39 pornomens sshd\[20055\]: Failed password for root from 106.12.183.209 port 45424 ssh2 Oct 5 17:35:32 pornomens sshd\[20116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.209 user=root ... |
2020-10-05 23:47:01 |