城市(city): Guangzhou
省份(region): Guangdong
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.9.211.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.9.211.17. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 15:05:15 CST 2025
;; MSG SIZE rcvd: 105
17.211.9.139.in-addr.arpa domain name pointer ecs-139-9-211-17.compute.hwclouds-dns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
17.211.9.139.in-addr.arpa name = ecs-139-9-211-17.compute.hwclouds-dns.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 93.93.43.63 | attack | (sshd) Failed SSH login from 93.93.43.63 (FR/France/fs-93-93-43-63.fullsave.info): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 27 15:11:34 amsweb01 sshd[11835]: Invalid user lishanbin from 93.93.43.63 port 20258 Feb 27 15:11:36 amsweb01 sshd[11835]: Failed password for invalid user lishanbin from 93.93.43.63 port 20258 ssh2 Feb 27 15:19:57 amsweb01 sshd[12581]: Invalid user testuser from 93.93.43.63 port 35425 Feb 27 15:19:59 amsweb01 sshd[12581]: Failed password for invalid user testuser from 93.93.43.63 port 35425 ssh2 Feb 27 15:28:18 amsweb01 sshd[13308]: Invalid user test2 from 93.93.43.63 port 50051 |
2020-02-28 04:20:48 |
| 67.229.243.85 | attack | Port 11211 (memcache) access denied |
2020-02-28 03:47:42 |
| 176.31.250.171 | attackspam | Feb 28 03:18:47 webhost01 sshd[14486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.171 Feb 28 03:18:49 webhost01 sshd[14486]: Failed password for invalid user sleeper from 176.31.250.171 port 46321 ssh2 ... |
2020-02-28 04:20:21 |
| 198.108.67.36 | attack | Port scan: Attack repeated for 24 hours |
2020-02-28 04:19:23 |
| 112.140.185.64 | attack | Feb 27 12:33:26 NPSTNNYC01T sshd[28963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.140.185.64 Feb 27 12:33:27 NPSTNNYC01T sshd[28963]: Failed password for invalid user oracle from 112.140.185.64 port 60862 ssh2 Feb 27 12:37:15 NPSTNNYC01T sshd[29183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.140.185.64 ... |
2020-02-28 04:04:14 |
| 194.6.231.122 | attackbots | Feb 27 19:24:14 *** sshd[13439]: Invalid user qq from 194.6.231.122 |
2020-02-28 03:54:18 |
| 63.82.49.47 | attackbots | Feb 27 15:20:40 |
2020-02-28 04:26:32 |
| 14.243.101.227 | attackbotsspam | Port 1433 Scan |
2020-02-28 04:13:47 |
| 95.61.92.185 | attackspambots | Feb 27 15:21:21 pmg postfix/postscreen\[32524\]: NOQUEUE: reject: RCPT from \[95.61.92.185\]:37424: 550 5.7.1 Service unavailable\; client \[95.61.92.185\] blocked using zen.spamhaus.org\; from=\ |
2020-02-28 04:09:41 |
| 63.82.48.71 | attackbotsspam | Feb 27 15:20:57 |
2020-02-28 04:27:08 |
| 123.207.40.81 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-02-28 03:58:53 |
| 192.241.236.167 | attackbots | Lines containing failures of 192.241.236.167 2020-02-27 15:05:58 SMTP protocol synchronization error (input sent whostnamehout wahostnameing for greeting): rejected connection from H=[192.241.236.167] input="EHLO zg0213a-266 " ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=192.241.236.167 |
2020-02-28 04:01:55 |
| 217.235.41.34 | attack | Feb 27 15:15:46 m3061 sshd[10390]: Invalid user storm from 217.235.41.34 Feb 27 15:15:50 m3061 sshd[10390]: Failed password for invalid user storm from 217.235.41.34 port 41954 ssh2 Feb 27 15:15:50 m3061 sshd[10390]: Received disconnect from 217.235.41.34: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=217.235.41.34 |
2020-02-28 04:28:05 |
| 142.93.26.245 | attackbotsspam | Feb 27 15:36:59 haigwepa sshd[30988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245 Feb 27 15:37:01 haigwepa sshd[30988]: Failed password for invalid user ubuntu from 142.93.26.245 port 48228 ssh2 ... |
2020-02-28 03:48:20 |
| 94.203.254.248 | attackspam | $f2bV_matches |
2020-02-28 04:17:12 |