城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.94.62.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.94.62.103. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 21:27:59 CST 2025
;; MSG SIZE rcvd: 106
b'Host 103.62.94.139.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 139.94.62.103.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 41.72.219.102 | attack | Invalid user sa from 41.72.219.102 port 54506 |
2019-08-21 21:04:50 |
| 46.161.39.219 | attack | Aug 21 05:22:44 home sshd[24124]: Invalid user eun from 46.161.39.219 port 51490 Aug 21 05:22:44 home sshd[24124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.161.39.219 Aug 21 05:22:44 home sshd[24124]: Invalid user eun from 46.161.39.219 port 51490 Aug 21 05:22:46 home sshd[24124]: Failed password for invalid user eun from 46.161.39.219 port 51490 ssh2 Aug 21 05:31:04 home sshd[24139]: Invalid user sftpuser from 46.161.39.219 port 33068 Aug 21 05:31:04 home sshd[24139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.161.39.219 Aug 21 05:31:04 home sshd[24139]: Invalid user sftpuser from 46.161.39.219 port 33068 Aug 21 05:31:06 home sshd[24139]: Failed password for invalid user sftpuser from 46.161.39.219 port 33068 ssh2 Aug 21 05:35:05 home sshd[24165]: Invalid user sicher from 46.161.39.219 port 59680 Aug 21 05:35:05 home sshd[24165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= r |
2019-08-21 21:30:22 |
| 78.94.62.162 | attackspam | port scan and connect, tcp 3306 (mysql) |
2019-08-21 21:44:01 |
| 58.87.124.196 | attack | Aug 21 09:28:46 plusreed sshd[19359]: Invalid user tomcat from 58.87.124.196 ... |
2019-08-21 21:44:25 |
| 49.234.5.134 | attackbots | Aug 21 14:55:59 legacy sshd[22115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.5.134 Aug 21 14:56:00 legacy sshd[22115]: Failed password for invalid user guy from 49.234.5.134 port 34188 ssh2 Aug 21 14:59:11 legacy sshd[22238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.5.134 ... |
2019-08-21 21:05:40 |
| 59.60.152.218 | attack | Aug 21 06:33:19 askasleikir sshd[22117]: Failed password for root from 59.60.152.218 port 52148 ssh2 Aug 21 06:33:12 askasleikir sshd[22117]: Failed password for root from 59.60.152.218 port 52148 ssh2 Aug 21 06:33:15 askasleikir sshd[22117]: Failed password for root from 59.60.152.218 port 52148 ssh2 |
2019-08-21 20:55:16 |
| 79.40.28.231 | attackbotsspam | [20/Aug/2019:16:36:27 -0400] "GET / HTTP/1.1" Chrome 51.0 UA |
2019-08-21 21:09:17 |
| 195.9.32.22 | attackbotsspam | Aug 21 03:03:24 hcbb sshd\[16962\]: Invalid user shipping from 195.9.32.22 Aug 21 03:03:24 hcbb sshd\[16962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22 Aug 21 03:03:25 hcbb sshd\[16962\]: Failed password for invalid user shipping from 195.9.32.22 port 33006 ssh2 Aug 21 03:09:06 hcbb sshd\[17525\]: Invalid user nazmul from 195.9.32.22 Aug 21 03:09:06 hcbb sshd\[17525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.9.32.22 |
2019-08-21 21:42:35 |
| 222.128.114.163 | attackspambots | Aug 21 15:16:09 rpi sshd[29214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.128.114.163 Aug 21 15:16:10 rpi sshd[29214]: Failed password for invalid user disk from 222.128.114.163 port 43730 ssh2 |
2019-08-21 21:45:17 |
| 222.188.109.227 | attackbotsspam | Aug 21 13:37:51 debian sshd\[11118\]: Invalid user caj from 222.188.109.227 port 37342 Aug 21 13:37:51 debian sshd\[11118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.188.109.227 ... |
2019-08-21 20:39:55 |
| 190.92.126.90 | attackbots | Aug 21 13:49:50 web1 sshd\[3015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.92.126.90 user=dovecot Aug 21 13:49:51 web1 sshd\[3015\]: Failed password for dovecot from 190.92.126.90 port 48186 ssh2 Aug 21 13:54:39 web1 sshd\[3254\]: Invalid user hacked from 190.92.126.90 Aug 21 13:54:39 web1 sshd\[3254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.92.126.90 Aug 21 13:54:41 web1 sshd\[3254\]: Failed password for invalid user hacked from 190.92.126.90 port 43250 ssh2 |
2019-08-21 20:51:10 |
| 46.237.207.106 | attack | Aug 21 02:54:20 web1 sshd\[6435\]: Invalid user rb from 46.237.207.106 Aug 21 02:54:20 web1 sshd\[6435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.237.207.106 Aug 21 02:54:22 web1 sshd\[6435\]: Failed password for invalid user rb from 46.237.207.106 port 56674 ssh2 Aug 21 02:58:50 web1 sshd\[6843\]: Invalid user sinusbot from 46.237.207.106 Aug 21 02:58:50 web1 sshd\[6843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.237.207.106 |
2019-08-21 21:13:15 |
| 195.137.200.2 | attackbots | [portscan] Port scan |
2019-08-21 21:03:38 |
| 68.183.23.254 | attackspam | Aug 21 12:47:11 hb sshd\[21602\]: Invalid user kong from 68.183.23.254 Aug 21 12:47:11 hb sshd\[21602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.23.254 Aug 21 12:47:12 hb sshd\[21602\]: Failed password for invalid user kong from 68.183.23.254 port 46950 ssh2 Aug 21 12:51:30 hb sshd\[21947\]: Invalid user dalia from 68.183.23.254 Aug 21 12:51:30 hb sshd\[21947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.23.254 |
2019-08-21 21:00:33 |
| 69.12.92.22 | attackbotsspam | Unauthorized access to web resources |
2019-08-21 21:28:47 |