城市(city): unknown
省份(region): unknown
国家(country): Indonesia
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.0.108.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.0.108.196. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 04:54:59 CST 2025
;; MSG SIZE rcvd: 106
196.108.0.140.in-addr.arpa domain name pointer fm-dyn-140-0-108-196.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
196.108.0.140.in-addr.arpa name = fm-dyn-140-0-108-196.fast.net.id.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 203.45.45.241 | attack | Automatic report - Banned IP Access |
2019-09-07 01:28:11 |
| 45.224.126.168 | attack | Sep 6 09:31:31 aat-srv002 sshd[16682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.126.168 Sep 6 09:31:34 aat-srv002 sshd[16682]: Failed password for invalid user user from 45.224.126.168 port 41706 ssh2 Sep 6 09:42:41 aat-srv002 sshd[17003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.126.168 Sep 6 09:42:43 aat-srv002 sshd[17003]: Failed password for invalid user git from 45.224.126.168 port 35641 ssh2 ... |
2019-09-07 02:07:11 |
| 62.193.6.15 | attackspam | Sep 6 19:31:40 eventyay sshd[9155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.193.6.15 Sep 6 19:31:42 eventyay sshd[9155]: Failed password for invalid user mysql2 from 62.193.6.15 port 37910 ssh2 Sep 6 19:36:17 eventyay sshd[9223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.193.6.15 ... |
2019-09-07 01:54:34 |
| 114.67.93.39 | attackbots | Sep 6 07:00:53 hanapaa sshd\[19392\]: Invalid user test2 from 114.67.93.39 Sep 6 07:00:53 hanapaa sshd\[19392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.93.39 Sep 6 07:00:54 hanapaa sshd\[19392\]: Failed password for invalid user test2 from 114.67.93.39 port 55840 ssh2 Sep 6 07:06:36 hanapaa sshd\[19835\]: Invalid user admin from 114.67.93.39 Sep 6 07:06:36 hanapaa sshd\[19835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.93.39 |
2019-09-07 01:59:57 |
| 62.234.172.19 | attackbotsspam | Sep 6 19:48:35 vps691689 sshd[21769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.172.19 Sep 6 19:48:37 vps691689 sshd[21769]: Failed password for invalid user asdf from 62.234.172.19 port 50958 ssh2 Sep 6 19:54:30 vps691689 sshd[21848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.172.19 ... |
2019-09-07 02:10:12 |
| 144.139.165.13 | attackspambots | Automatic report - Port Scan Attack |
2019-09-07 02:01:17 |
| 125.64.94.211 | attackbotsspam | " " |
2019-09-07 01:48:17 |
| 190.128.241.2 | attackspambots | Sep 6 13:37:12 xtremcommunity sshd\[23082\]: Invalid user tf2server from 190.128.241.2 port 60523 Sep 6 13:37:12 xtremcommunity sshd\[23082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.241.2 Sep 6 13:37:13 xtremcommunity sshd\[23082\]: Failed password for invalid user tf2server from 190.128.241.2 port 60523 ssh2 Sep 6 13:46:22 xtremcommunity sshd\[23423\]: Invalid user ubuntu from 190.128.241.2 port 54626 Sep 6 13:46:22 xtremcommunity sshd\[23423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.128.241.2 ... |
2019-09-07 01:52:16 |
| 176.218.217.208 | attack | Telnet Server BruteForce Attack |
2019-09-07 01:15:32 |
| 50.116.31.233 | attackspam | probing email addresses (harvesting?) |
2019-09-07 01:51:02 |
| 177.1.214.207 | attackbotsspam | 2019-09-06T16:49:12.513912abusebot-4.cloudsearch.cf sshd\[23442\]: Invalid user 123456 from 177.1.214.207 port 7849 |
2019-09-07 01:31:40 |
| 95.165.163.229 | attack | Brute force attempt |
2019-09-07 01:17:53 |
| 222.186.30.111 | attackspambots | 2019-09-06T18:06:09.208318abusebot-7.cloudsearch.cf sshd\[15081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.111 user=root |
2019-09-07 02:15:50 |
| 93.119.155.153 | attack | Sep 6 20:04:42 site2 sshd\[41839\]: Invalid user vbox from 93.119.155.153Sep 6 20:04:44 site2 sshd\[41839\]: Failed password for invalid user vbox from 93.119.155.153 port 34900 ssh2Sep 6 20:09:29 site2 sshd\[42438\]: Invalid user admin from 93.119.155.153Sep 6 20:09:30 site2 sshd\[42438\]: Failed password for invalid user admin from 93.119.155.153 port 51850 ssh2Sep 6 20:14:22 site2 sshd\[43080\]: Invalid user ts3bot from 93.119.155.153Sep 6 20:14:24 site2 sshd\[43080\]: Failed password for invalid user ts3bot from 93.119.155.153 port 40558 ssh2 ... |
2019-09-07 01:28:49 |
| 142.93.1.100 | attackbots | Sep 6 20:06:43 server sshd\[25564\]: Invalid user teamspeak from 142.93.1.100 port 58100 Sep 6 20:06:43 server sshd\[25564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100 Sep 6 20:06:45 server sshd\[25564\]: Failed password for invalid user teamspeak from 142.93.1.100 port 58100 ssh2 Sep 6 20:11:13 server sshd\[15392\]: Invalid user admin from 142.93.1.100 port 45018 Sep 6 20:11:13 server sshd\[15392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100 |
2019-09-07 01:33:51 |