城市(city): unknown
省份(region): New Taipei
国家(country): Taiwan, China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.113.64.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.113.64.143. IN A
;; AUTHORITY SECTION:
. 460 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023050501 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 06 08:48:43 CST 2023
;; MSG SIZE rcvd: 107
143.64.113.140.in-addr.arpa domain name pointer 140-113-64-143.Dorm6.NCTU.edu.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
143.64.113.140.in-addr.arpa name = 140-113-64-143.Dorm6.NCTU.edu.tw.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.50.25.52 | attackbots | 185.50.25.52 - - \[19/Nov/2019:06:29:10 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 185.50.25.52 - - \[19/Nov/2019:06:29:11 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2019-11-19 15:12:13 |
| 91.121.211.59 | attackbots | Nov 19 07:44:52 SilenceServices sshd[6396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59 Nov 19 07:44:54 SilenceServices sshd[6396]: Failed password for invalid user fragoso from 91.121.211.59 port 54498 ssh2 Nov 19 07:48:25 SilenceServices sshd[7396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.211.59 |
2019-11-19 15:02:32 |
| 42.61.179.75 | attack | /wp-login.php |
2019-11-19 14:51:40 |
| 222.186.42.4 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4 user=root Failed password for root from 222.186.42.4 port 16804 ssh2 Failed password for root from 222.186.42.4 port 16804 ssh2 Failed password for root from 222.186.42.4 port 16804 ssh2 Failed password for root from 222.186.42.4 port 16804 ssh2 |
2019-11-19 15:17:35 |
| 37.107.76.167 | attackbotsspam | until 2019-11-18T20:29:04+00:00, observations: 3, bad account names: 1 |
2019-11-19 15:00:15 |
| 71.177.88.17 | attack | IMAP brute force ... |
2019-11-19 14:48:36 |
| 180.68.177.15 | attackspam | Nov 19 07:51:11 ArkNodeAT sshd\[2877\]: Invalid user bergseth from 180.68.177.15 Nov 19 07:51:11 ArkNodeAT sshd\[2877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.15 Nov 19 07:51:13 ArkNodeAT sshd\[2877\]: Failed password for invalid user bergseth from 180.68.177.15 port 42022 ssh2 |
2019-11-19 14:57:33 |
| 67.207.88.180 | attack | $f2bV_matches |
2019-11-19 14:43:43 |
| 202.137.154.15 | attackbotsspam | IMAP brute force ... |
2019-11-19 15:02:54 |
| 112.112.102.79 | attack | Nov 19 07:25:05 root sshd[15976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.112.102.79 Nov 19 07:25:07 root sshd[15976]: Failed password for invalid user mohara from 112.112.102.79 port 61900 ssh2 Nov 19 07:29:30 root sshd[16026]: Failed password for root from 112.112.102.79 port 61901 ssh2 ... |
2019-11-19 15:01:12 |
| 178.62.117.106 | attack | Nov 19 10:52:41 vibhu-HP-Z238-Microtower-Workstation sshd\[7916\]: Invalid user whj@hao123 from 178.62.117.106 Nov 19 10:52:41 vibhu-HP-Z238-Microtower-Workstation sshd\[7916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.117.106 Nov 19 10:52:43 vibhu-HP-Z238-Microtower-Workstation sshd\[7916\]: Failed password for invalid user whj@hao123 from 178.62.117.106 port 45419 ssh2 Nov 19 10:56:27 vibhu-HP-Z238-Microtower-Workstation sshd\[8131\]: Invalid user brenton from 178.62.117.106 Nov 19 10:56:27 vibhu-HP-Z238-Microtower-Workstation sshd\[8131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.117.106 ... |
2019-11-19 14:28:31 |
| 112.208.183.25 | attackbots | Fail2Ban Ban Triggered |
2019-11-19 14:49:09 |
| 42.57.132.27 | attack | Unauthorised access (Nov 19) SRC=42.57.132.27 LEN=40 TTL=49 ID=6877 TCP DPT=8080 WINDOW=41877 SYN |
2019-11-19 14:49:26 |
| 115.79.207.146 | attackbots | 115.79.207.146 has been banned for [WebApp Attack] ... |
2019-11-19 15:19:23 |
| 103.249.100.48 | attackbots | 2019-11-19T06:29:47.964074abusebot-2.cloudsearch.cf sshd\[24955\]: Invalid user oshearra from 103.249.100.48 port 60640 |
2019-11-19 14:47:58 |