城市(city): unknown
省份(region): unknown
国家(country): The Netherlands
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.92.61.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.92.61.43. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 09:58:27 CST 2025
;; MSG SIZE rcvd: 105
43.61.92.139.in-addr.arpa domain name pointer slip139-92-61-43.ber.ch.prserv.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
43.61.92.139.in-addr.arpa name = slip139-92-61-43.ber.ch.prserv.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 182.16.103.136 | attack | Dec 10 06:17:03 vps647732 sshd[27719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.103.136 Dec 10 06:17:05 vps647732 sshd[27719]: Failed password for invalid user koeckeis from 182.16.103.136 port 36762 ssh2 ... |
2019-12-10 13:23:49 |
| 222.186.175.148 | attackspam | Dec 10 00:15:33 lanister sshd[11072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148 user=root Dec 10 00:15:35 lanister sshd[11072]: Failed password for root from 222.186.175.148 port 20570 ssh2 ... |
2019-12-10 13:20:25 |
| 112.85.42.175 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.175 user=root Failed password for root from 112.85.42.175 port 47500 ssh2 Failed password for root from 112.85.42.175 port 47500 ssh2 Failed password for root from 112.85.42.175 port 47500 ssh2 Failed password for root from 112.85.42.175 port 47500 ssh2 |
2019-12-10 13:45:32 |
| 121.8.190.26 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-12-10 13:32:48 |
| 139.59.84.111 | attackbots | Dec 10 05:59:21 vps647732 sshd[26893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.111 Dec 10 05:59:23 vps647732 sshd[26893]: Failed password for invalid user admin from 139.59.84.111 port 59266 ssh2 ... |
2019-12-10 13:18:00 |
| 160.20.253.23 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-12-10 13:40:19 |
| 71.6.146.186 | attack | 1575953949 - 12/10/2019 05:59:09 Host: 71.6.146.186/71.6.146.186 Port: 109 TCP Blocked |
2019-12-10 13:33:06 |
| 116.228.88.115 | attackspam | Dec 9 19:10:13 wbs sshd\[11264\]: Invalid user passy from 116.228.88.115 Dec 9 19:10:13 wbs sshd\[11264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.88.115 Dec 9 19:10:15 wbs sshd\[11264\]: Failed password for invalid user passy from 116.228.88.115 port 52131 ssh2 Dec 9 19:15:58 wbs sshd\[11817\]: Invalid user oracle from 116.228.88.115 Dec 9 19:15:58 wbs sshd\[11817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.228.88.115 |
2019-12-10 13:29:26 |
| 163.172.251.80 | attackspambots | Dec 10 06:04:06 v22018076622670303 sshd\[8306\]: Invalid user rbj from 163.172.251.80 port 39630 Dec 10 06:04:06 v22018076622670303 sshd\[8306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.251.80 Dec 10 06:04:08 v22018076622670303 sshd\[8306\]: Failed password for invalid user rbj from 163.172.251.80 port 39630 ssh2 ... |
2019-12-10 13:22:36 |
| 106.37.72.234 | attack | Dec 10 06:18:55 legacy sshd[17859]: Failed password for root from 106.37.72.234 port 41212 ssh2 Dec 10 06:25:12 legacy sshd[18209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.72.234 Dec 10 06:25:14 legacy sshd[18209]: Failed password for invalid user grovers from 106.37.72.234 port 35684 ssh2 ... |
2019-12-10 13:35:30 |
| 218.92.0.164 | attackspambots | Dec 10 08:18:38 server sshd\[14163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.164 user=root Dec 10 08:18:40 server sshd\[14163\]: Failed password for root from 218.92.0.164 port 63569 ssh2 Dec 10 08:18:44 server sshd\[14163\]: Failed password for root from 218.92.0.164 port 63569 ssh2 Dec 10 08:18:47 server sshd\[14163\]: Failed password for root from 218.92.0.164 port 63569 ssh2 Dec 10 08:18:50 server sshd\[14163\]: Failed password for root from 218.92.0.164 port 63569 ssh2 ... |
2019-12-10 13:23:37 |
| 121.182.166.82 | attackspam | Dec 9 18:53:13 sachi sshd\[6399\]: Invalid user kinohi from 121.182.166.82 Dec 9 18:53:13 sachi sshd\[6399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.166.82 Dec 9 18:53:15 sachi sshd\[6399\]: Failed password for invalid user kinohi from 121.182.166.82 port 38578 ssh2 Dec 9 18:59:29 sachi sshd\[6960\]: Invalid user system from 121.182.166.82 Dec 9 18:59:29 sachi sshd\[6960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.166.82 |
2019-12-10 13:11:16 |
| 122.165.207.221 | attackbotsspam | 2019-12-10T04:59:11.507753abusebot-7.cloudsearch.cf sshd\[5732\]: Invalid user mysql from 122.165.207.221 port 65133 |
2019-12-10 13:30:32 |
| 51.91.122.140 | attackbotsspam | 2019-12-10T04:54:14.041662shield sshd\[22262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.ip-51-91-122.eu user=mail 2019-12-10T04:54:16.543830shield sshd\[22262\]: Failed password for mail from 51.91.122.140 port 43010 ssh2 2019-12-10T04:59:26.284204shield sshd\[23497\]: Invalid user summitt from 51.91.122.140 port 49924 2019-12-10T04:59:26.288725shield sshd\[23497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.ip-51-91-122.eu 2019-12-10T04:59:28.624780shield sshd\[23497\]: Failed password for invalid user summitt from 51.91.122.140 port 49924 ssh2 |
2019-12-10 13:12:58 |
| 200.205.202.35 | attackbotsspam | Dec 10 05:59:22 localhost sshd\[9924\]: Invalid user jansi from 200.205.202.35 port 41412 Dec 10 05:59:22 localhost sshd\[9924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.205.202.35 Dec 10 05:59:24 localhost sshd\[9924\]: Failed password for invalid user jansi from 200.205.202.35 port 41412 ssh2 |
2019-12-10 13:15:06 |