城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.93.109.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.93.109.155. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030301 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 04 03:58:36 CST 2025
;; MSG SIZE rcvd: 107
b'Host 155.109.93.139.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 139.93.109.155.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 222.186.175.183 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Failed password for root from 222.186.175.183 port 1226 ssh2 Failed password for root from 222.186.175.183 port 1226 ssh2 Failed password for root from 222.186.175.183 port 1226 ssh2 Failed password for root from 222.186.175.183 port 1226 ssh2 |
2020-03-09 14:42:43 |
| 49.88.112.66 | attackspam | Mar 9 06:59:56 ArkNodeAT sshd\[26820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.66 user=root Mar 9 06:59:58 ArkNodeAT sshd\[26820\]: Failed password for root from 49.88.112.66 port 42275 ssh2 Mar 9 07:00:00 ArkNodeAT sshd\[26820\]: Failed password for root from 49.88.112.66 port 42275 ssh2 |
2020-03-09 14:39:53 |
| 176.98.42.15 | attackspambots | SpamScore above: 10.0 |
2020-03-09 14:20:01 |
| 73.167.84.250 | attackspambots | 2020-03-09T05:20:01.977264shield sshd\[2961\]: Invalid user ts from 73.167.84.250 port 59450 2020-03-09T05:20:01.981696shield sshd\[2961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-167-84-250.hsd1.ct.comcast.net 2020-03-09T05:20:04.565870shield sshd\[2961\]: Failed password for invalid user ts from 73.167.84.250 port 59450 ssh2 2020-03-09T05:22:18.609552shield sshd\[3393\]: Invalid user monitor from 73.167.84.250 port 39252 2020-03-09T05:22:18.616028shield sshd\[3393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-167-84-250.hsd1.ct.comcast.net |
2020-03-09 14:19:07 |
| 177.43.160.149 | attackspambots | Netgear DGN Device Remote Command Execution Vulnerability |
2020-03-09 14:23:58 |
| 148.70.151.134 | attack | Mar 9 06:52:32 ns41 sshd[18898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.151.134 |
2020-03-09 14:20:58 |
| 218.92.0.191 | attack | Mar 9 07:06:05 dcd-gentoo sshd[13986]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups Mar 9 07:07:30 dcd-gentoo sshd[14043]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups Mar 9 07:07:30 dcd-gentoo sshd[14043]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups Mar 9 07:07:33 dcd-gentoo sshd[14043]: error: PAM: Authentication failure for illegal user root from 218.92.0.191 Mar 9 07:07:30 dcd-gentoo sshd[14043]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups Mar 9 07:07:33 dcd-gentoo sshd[14043]: error: PAM: Authentication failure for illegal user root from 218.92.0.191 Mar 9 07:07:33 dcd-gentoo sshd[14043]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 14061 ssh2 ... |
2020-03-09 14:13:32 |
| 218.92.0.210 | attack | Mar 9 06:48:51 plex sshd[7695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.210 user=root Mar 9 06:48:53 plex sshd[7695]: Failed password for root from 218.92.0.210 port 19307 ssh2 |
2020-03-09 14:00:02 |
| 103.140.126.198 | attackspambots | Mar 9 05:11:50 xxxxxxx0 sshd[9323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.140.126.198 user=r.r Mar 9 05:11:53 xxxxxxx0 sshd[9323]: Failed password for r.r from 103.140.126.198 port 33144 ssh2 Mar 9 05:15:33 xxxxxxx0 sshd[11198]: Invalid user saslauth from 103.140.126.198 port 56926 Mar 9 05:15:33 xxxxxxx0 sshd[11198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.140.126.198 Mar 9 05:15:34 xxxxxxx0 sshd[11198]: Failed password for invalid user saslauth from 103.140.126.198 port 56926 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=103.140.126.198 |
2020-03-09 14:37:00 |
| 106.13.216.231 | attackbotsspam | Mar 8 18:25:09 tdfoods sshd\[32227\]: Invalid user visitor from 106.13.216.231 Mar 8 18:25:09 tdfoods sshd\[32227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.216.231 Mar 8 18:25:11 tdfoods sshd\[32227\]: Failed password for invalid user visitor from 106.13.216.231 port 35136 ssh2 Mar 8 18:29:48 tdfoods sshd\[32533\]: Invalid user gitlab-psql from 106.13.216.231 Mar 8 18:29:48 tdfoods sshd\[32533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.216.231 |
2020-03-09 14:05:24 |
| 113.179.146.239 | attack | Email rejected due to spam filtering |
2020-03-09 14:31:41 |
| 178.93.0.228 | attack | Email rejected due to spam filtering |
2020-03-09 14:45:59 |
| 222.252.16.140 | attackbots | Mar 9 06:53:12 pornomens sshd\[3721\]: Invalid user d from 222.252.16.140 port 35106 Mar 9 06:53:12 pornomens sshd\[3721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.16.140 Mar 9 06:53:15 pornomens sshd\[3721\]: Failed password for invalid user d from 222.252.16.140 port 35106 ssh2 ... |
2020-03-09 14:33:47 |
| 83.25.29.45 | attackspambots | Mar 9 04:51:49 vps670341 sshd[5351]: Invalid user pi from 83.25.29.45 port 44778 |
2020-03-09 14:21:30 |
| 194.58.88.47 | attack | Attempted connection to port 7071. |
2020-03-09 14:34:13 |