城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.99.169.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.99.169.201. IN A
;; AUTHORITY SECTION:
. 471 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 10:03:16 CST 2022
;; MSG SIZE rcvd: 107
201.169.99.139.in-addr.arpa domain name pointer vps-b53dc671.vps.ovh.ca.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
201.169.99.139.in-addr.arpa name = vps-b53dc671.vps.ovh.ca.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.240.97.76 | attackspam | 400 BAD REQUEST |
2019-07-02 07:53:05 |
| 185.137.111.188 | attack | Jul 2 02:03:06 mail postfix/smtpd\[2325\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 2 02:03:44 mail postfix/smtpd\[7324\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 2 02:04:23 mail postfix/smtpd\[8150\]: warning: unknown\[185.137.111.188\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-07-02 08:09:14 |
| 117.50.46.176 | attackbotsspam | Jul 2 01:26:55 tux-35-217 sshd\[24893\]: Invalid user sai from 117.50.46.176 port 50678 Jul 2 01:26:55 tux-35-217 sshd\[24893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.46.176 Jul 2 01:26:58 tux-35-217 sshd\[24893\]: Failed password for invalid user sai from 117.50.46.176 port 50678 ssh2 Jul 2 01:34:46 tux-35-217 sshd\[24939\]: Invalid user user from 117.50.46.176 port 53076 Jul 2 01:34:46 tux-35-217 sshd\[24939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.46.176 ... |
2019-07-02 08:07:35 |
| 159.65.245.203 | attackspambots | Jul 2 00:00:07 unicornsoft sshd\[6316\]: Invalid user kiefer from 159.65.245.203 Jul 2 00:00:07 unicornsoft sshd\[6316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.245.203 Jul 2 00:00:09 unicornsoft sshd\[6316\]: Failed password for invalid user kiefer from 159.65.245.203 port 52710 ssh2 |
2019-07-02 08:08:54 |
| 198.71.57.82 | attackbots | Jul 2 02:09:49 SilenceServices sshd[21745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.71.57.82 Jul 2 02:09:52 SilenceServices sshd[21745]: Failed password for invalid user build from 198.71.57.82 port 47503 ssh2 Jul 2 02:12:48 SilenceServices sshd[24630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.71.57.82 |
2019-07-02 08:13:24 |
| 104.248.65.180 | attack | Jul 1 18:43:19 aat-srv002 sshd[17128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.65.180 Jul 1 18:43:21 aat-srv002 sshd[17128]: Failed password for invalid user riley from 104.248.65.180 port 49702 ssh2 Jul 1 18:45:37 aat-srv002 sshd[17164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.65.180 Jul 1 18:45:39 aat-srv002 sshd[17164]: Failed password for invalid user ja from 104.248.65.180 port 46874 ssh2 ... |
2019-07-02 07:51:23 |
| 37.187.127.13 | attackbotsspam | Jul 2 01:09:31 v22018076622670303 sshd\[16105\]: Invalid user sy from 37.187.127.13 port 43458 Jul 2 01:09:31 v22018076622670303 sshd\[16105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.127.13 Jul 2 01:09:33 v22018076622670303 sshd\[16105\]: Failed password for invalid user sy from 37.187.127.13 port 43458 ssh2 ... |
2019-07-02 08:05:26 |
| 59.144.114.82 | attackbotsspam | firewall-block, port(s): 25/tcp |
2019-07-02 07:51:56 |
| 77.247.110.165 | attack | firewall-block, port(s): 5060/udp |
2019-07-02 07:46:59 |
| 95.94.243.234 | attackspambots | Trying to deliver email spam, but blocked by RBL |
2019-07-02 07:52:49 |
| 34.201.172.84 | attack | Automatic report - Web App Attack |
2019-07-02 08:06:31 |
| 104.236.102.16 | attackspam | 2019-07-01T23:24:09.904292abusebot-6.cloudsearch.cf sshd\[20370\]: Invalid user leo from 104.236.102.16 port 33038 |
2019-07-02 07:42:57 |
| 121.15.145.225 | attack | firewall-block, port(s): 9001/tcp |
2019-07-02 07:41:50 |
| 185.101.160.67 | attackbots | NAME : ES-IPONET-20150526 CIDR : 185.101.160.0/22 DDoS attack Spain - block certain countries :) IP: 185.101.160.67 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-07-02 08:07:10 |
| 180.250.183.154 | attackspambots | Jul 1 23:09:45 work-partkepr sshd\[19085\]: Invalid user swilton from 180.250.183.154 port 39522 Jul 1 23:09:45 work-partkepr sshd\[19085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.183.154 ... |
2019-07-02 08:04:19 |