城市(city): unknown
省份(region): unknown
国家(country): Ireland
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.45.134.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.45.134.58. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 11:19:13 CST 2025
;; MSG SIZE rcvd: 106
Host 58.134.45.139.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 58.134.45.139.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.13.71.1 | attackspambots | Invalid user tos from 106.13.71.1 port 42232 |
2020-06-27 12:47:48 |
| 94.143.241.21 | attack | Icarus honeypot on github |
2020-06-27 13:11:12 |
| 114.201.132.139 | attackspambots | Port probing on unauthorized port 88 |
2020-06-27 12:45:23 |
| 117.211.60.124 | attackspambots | DATE:2020-06-27 05:56:07, IP:117.211.60.124, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-06-27 12:42:05 |
| 222.112.220.12 | attackspambots | Jun 27 06:34:09 buvik sshd[10933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.220.12 user=root Jun 27 06:34:11 buvik sshd[10933]: Failed password for root from 222.112.220.12 port 32088 ssh2 Jun 27 06:37:46 buvik sshd[11492]: Invalid user userftp from 222.112.220.12 ... |
2020-06-27 12:55:39 |
| 37.49.226.4 | attackspam | firewall-block, port(s): 81/tcp |
2020-06-27 12:39:19 |
| 51.38.129.120 | attackbots | 5x Failed Password |
2020-06-27 13:20:12 |
| 101.89.145.133 | attackbotsspam | 2020-06-27T06:13:17.001563vps773228.ovh.net sshd[1598]: Invalid user steam from 101.89.145.133 port 48746 2020-06-27T06:13:17.018861vps773228.ovh.net sshd[1598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.145.133 2020-06-27T06:13:17.001563vps773228.ovh.net sshd[1598]: Invalid user steam from 101.89.145.133 port 48746 2020-06-27T06:13:18.916993vps773228.ovh.net sshd[1598]: Failed password for invalid user steam from 101.89.145.133 port 48746 ssh2 2020-06-27T06:16:36.181880vps773228.ovh.net sshd[1642]: Invalid user git from 101.89.145.133 port 40526 ... |
2020-06-27 12:58:29 |
| 52.172.33.67 | attackbots | Jun 26 06:23:55 scw-focused-cartwright sshd[9278]: Failed password for root from 52.172.33.67 port 64641 ssh2 |
2020-06-27 12:44:07 |
| 54.37.159.45 | attack | 2020-06-27T04:40:53.404442shield sshd\[6284\]: Invalid user nexus from 54.37.159.45 port 35646 2020-06-27T04:40:53.408771shield sshd\[6284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-54-37-159.eu 2020-06-27T04:40:55.654300shield sshd\[6284\]: Failed password for invalid user nexus from 54.37.159.45 port 35646 ssh2 2020-06-27T04:44:08.680669shield sshd\[6776\]: Invalid user sanchit from 54.37.159.45 port 33844 2020-06-27T04:44:08.684331shield sshd\[6776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.ip-54-37-159.eu |
2020-06-27 12:51:37 |
| 118.27.21.194 | attackbots | Jun 27 00:46:18 firewall sshd[29763]: Failed password for invalid user csg from 118.27.21.194 port 57928 ssh2 Jun 27 00:56:05 firewall sshd[30171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.21.194 user=root Jun 27 00:56:07 firewall sshd[30171]: Failed password for root from 118.27.21.194 port 35224 ssh2 ... |
2020-06-27 12:51:16 |
| 45.143.221.54 | attackspam | $f2bV_matches |
2020-06-27 12:52:07 |
| 85.209.0.101 | attack | Total attacks: 2 |
2020-06-27 12:38:30 |
| 14.143.74.186 | attackspam | 20/6/26@23:55:50: FAIL: Alarm-Network address from=14.143.74.186 ... |
2020-06-27 13:08:24 |
| 128.199.137.168 | attackbots | 2020-06-27T04:50:51.373077shield sshd\[8573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.168 user=root 2020-06-27T04:50:53.039782shield sshd\[8573\]: Failed password for root from 128.199.137.168 port 63556 ssh2 2020-06-27T04:55:38.502993shield sshd\[9668\]: Invalid user harish from 128.199.137.168 port 10612 2020-06-27T04:55:38.506577shield sshd\[9668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.168 2020-06-27T04:55:39.571443shield sshd\[9668\]: Failed password for invalid user harish from 128.199.137.168 port 10612 ssh2 |
2020-06-27 12:56:40 |