城市(city): unknown
省份(region): unknown
国家(country): Puerto Rico
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.60.189.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39650
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.60.189.242. IN A
;; AUTHORITY SECTION:
. 177 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 21:32:54 CST 2022
;; MSG SIZE rcvd: 107
Host 242.189.60.139.in-addr.arpa not found: 2(SERVFAIL)
server can't find 139.60.189.242.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 178.32.54.182 | attackbotsspam | Brute force attack against VPN service |
2019-11-30 23:40:48 |
| 218.92.0.155 | attackspam | Nov 30 12:44:47 firewall sshd[25952]: Failed password for root from 218.92.0.155 port 9870 ssh2 Nov 30 12:44:50 firewall sshd[25952]: Failed password for root from 218.92.0.155 port 9870 ssh2 Nov 30 12:44:54 firewall sshd[25952]: Failed password for root from 218.92.0.155 port 9870 ssh2 ... |
2019-11-30 23:49:03 |
| 203.95.212.41 | attack | Nov 30 16:38:49 MK-Soft-VM4 sshd[15704]: Failed password for root from 203.95.212.41 port 50181 ssh2 ... |
2019-12-01 00:18:55 |
| 190.211.243.82 | attackspam | Nov 30 16:38:37 mail postfix/smtpd[10853]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 16:38:38 mail postfix/smtpd[11247]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 16:38:38 mail postfix/smtpd[10875]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 16:38:38 mail postfix/smtpd[11798]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 16:38:38 mail postfix/smtpd[10646]: warning: unknown[190.211.243.82]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-30 23:54:30 |
| 78.128.113.124 | attackspambots | Nov 26 21:03:11 xzibhostname postfix/smtpd[27245]: warning: hostname ip-113-124.4vendeta.com does not resolve to address 78.128.113.124: Name or service not known Nov 26 21:03:11 xzibhostname postfix/smtpd[27245]: connect from unknown[78.128.113.124] Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: warning: unknown[78.128.113.124]: SASL LOGIN authentication failed: authentication failure Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: lost connection after AUTH from unknown[78.128.113.124] Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: disconnect from unknown[78.128.113.124] Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: warning: hostname ip-113-124.4vendeta.com does not resolve to address 78.128.113.124: Name or service not known Nov 26 21:03:12 xzibhostname postfix/smtpd[27245]: connect from unknown[78.128.113.124] Nov 26 21:03:14 xzibhostname postfix/smtpd[27245]: warning: unknown[78.128.113.124]: SASL LOGIN authentication failed: authentication failure ........ ------------------------------- |
2019-11-30 23:57:57 |
| 163.172.206.78 | attack | 2019-11-30T16:37:26.275805 sshd[3117]: Invalid user feijie from 163.172.206.78 port 35438 2019-11-30T16:37:26.290867 sshd[3117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.206.78 2019-11-30T16:37:26.275805 sshd[3117]: Invalid user feijie from 163.172.206.78 port 35438 2019-11-30T16:37:28.310184 sshd[3117]: Failed password for invalid user feijie from 163.172.206.78 port 35438 ssh2 2019-11-30T16:41:09.048169 sshd[3162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.206.78 user=root 2019-11-30T16:41:11.016975 sshd[3162]: Failed password for root from 163.172.206.78 port 42394 ssh2 ... |
2019-12-01 00:19:09 |
| 122.51.167.43 | attackspambots | Nov 30 15:36:59 v22018076622670303 sshd\[16761\]: Invalid user contador from 122.51.167.43 port 56020 Nov 30 15:36:59 v22018076622670303 sshd\[16761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.167.43 Nov 30 15:37:01 v22018076622670303 sshd\[16761\]: Failed password for invalid user contador from 122.51.167.43 port 56020 ssh2 ... |
2019-12-01 00:03:44 |
| 200.57.73.170 | attackbotsspam | Nov 30 09:36:56 web1 postfix/smtpd[16997]: warning: unknown[200.57.73.170]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-01 00:07:41 |
| 218.92.0.179 | attackbots | Nov 30 16:38:37 eventyay sshd[7372]: Failed password for root from 218.92.0.179 port 47389 ssh2 Nov 30 16:38:41 eventyay sshd[7372]: Failed password for root from 218.92.0.179 port 47389 ssh2 Nov 30 16:38:43 eventyay sshd[7372]: Failed password for root from 218.92.0.179 port 47389 ssh2 Nov 30 16:38:46 eventyay sshd[7372]: Failed password for root from 218.92.0.179 port 47389 ssh2 ... |
2019-11-30 23:41:20 |
| 195.154.150.210 | attackbotsspam | 2019-11-30T14:37:16Z - RDP login failed multiple times. (195.154.150.210) |
2019-11-30 23:47:57 |
| 63.79.60.180 | attackbotsspam | Nov 30 17:50:09 tuotantolaitos sshd[27474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.79.60.180 Nov 30 17:50:11 tuotantolaitos sshd[27474]: Failed password for invalid user qk from 63.79.60.180 port 60036 ssh2 ... |
2019-11-30 23:50:26 |
| 113.173.116.132 | attackbots | Nov 27 07:47:32 pl3server sshd[12182]: Address 113.173.116.132 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Nov 27 07:47:32 pl3server sshd[12182]: Invalid user admin from 113.173.116.132 Nov 27 07:47:32 pl3server sshd[12182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.173.116.132 Nov 27 07:47:33 pl3server sshd[12182]: Failed password for invalid user admin from 113.173.116.132 port 44617 ssh2 Nov 27 07:47:34 pl3server sshd[12182]: Connection closed by 113.173.116.132 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=113.173.116.132 |
2019-12-01 00:15:25 |
| 64.102.242.154 | attackbots | 3389BruteforceFW21 |
2019-11-30 23:36:56 |
| 185.184.221.27 | attack | Nov 30 08:55:26 sshd[17729]: Connection from 185.184.221.27 port 39965 on server Nov 30 08:55:27 sshd[17729]: Received disconnect from 185.184.221.27: 11: Bye Bye [preauth] |
2019-12-01 00:11:33 |
| 54.39.138.249 | attackbots | Nov 30 16:19:00 lnxded64 sshd[25465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.138.249 |
2019-11-30 23:35:26 |