城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.139.21.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.139.21.46. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:30:30 CST 2025
;; MSG SIZE rcvd: 106
Host 46.21.139.140.in-addr.arpa not found: 2(SERVFAIL)
server can't find 140.139.21.46.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 104.248.36.131 | attackbots | Jan 26 08:21:43 debian-2gb-nbg1-2 kernel: \[2282575.923061\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.248.36.131 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=44680 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-01-26 15:22:28 |
| 138.185.193.93 | attackbots | Brute forcing email accounts |
2020-01-26 15:32:05 |
| 222.186.180.17 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Failed password for root from 222.186.180.17 port 10490 ssh2 Failed password for root from 222.186.180.17 port 10490 ssh2 Failed password for root from 222.186.180.17 port 10490 ssh2 Failed password for root from 222.186.180.17 port 10490 ssh2 |
2020-01-26 15:23:02 |
| 118.27.10.223 | attack | Jan 26 08:05:13 localhost sshd\[7148\]: Invalid user server from 118.27.10.223 port 47358 Jan 26 08:05:13 localhost sshd\[7148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.10.223 Jan 26 08:05:14 localhost sshd\[7148\]: Failed password for invalid user server from 118.27.10.223 port 47358 ssh2 |
2020-01-26 15:28:40 |
| 139.99.221.61 | attack | Unauthorized connection attempt detected from IP address 139.99.221.61 to port 2220 [J] |
2020-01-26 15:13:09 |
| 80.211.59.160 | attack | Unauthorized connection attempt detected from IP address 80.211.59.160 to port 2220 [J] |
2020-01-26 15:27:59 |
| 66.240.192.138 | attackbots | Port scan: Attack repeated for 24 hours |
2020-01-26 15:31:47 |
| 222.186.175.151 | attack | 2020-01-26T08:17:13.798948vps751288.ovh.net sshd\[15007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151 user=root 2020-01-26T08:17:16.156424vps751288.ovh.net sshd\[15007\]: Failed password for root from 222.186.175.151 port 34388 ssh2 2020-01-26T08:17:20.599408vps751288.ovh.net sshd\[15007\]: Failed password for root from 222.186.175.151 port 34388 ssh2 2020-01-26T08:17:24.682304vps751288.ovh.net sshd\[15007\]: Failed password for root from 222.186.175.151 port 34388 ssh2 2020-01-26T08:17:28.627948vps751288.ovh.net sshd\[15007\]: Failed password for root from 222.186.175.151 port 34388 ssh2 |
2020-01-26 15:40:33 |
| 177.152.71.197 | attackbotsspam | Automatic report - Port Scan Attack |
2020-01-26 15:16:32 |
| 93.190.142.157 | attackbots | WebFormToEmail Comment SPAM |
2020-01-26 15:37:40 |
| 183.88.242.178 | attackbotsspam | firewall-block, port(s): 26/tcp |
2020-01-26 15:50:32 |
| 112.35.26.43 | attackbotsspam | Jan 26 05:50:47 ArkNodeAT sshd\[19765\]: Invalid user ubuntu from 112.35.26.43 Jan 26 05:50:47 ArkNodeAT sshd\[19765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.26.43 Jan 26 05:50:48 ArkNodeAT sshd\[19765\]: Failed password for invalid user ubuntu from 112.35.26.43 port 47858 ssh2 |
2020-01-26 15:30:15 |
| 128.70.167.231 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 26-01-2020 04:50:15. |
2020-01-26 15:54:18 |
| 40.77.167.16 | attackbots | Automatic report - Banned IP Access |
2020-01-26 15:27:09 |
| 112.85.42.180 | attackbots | Jan 26 09:56:32 server sshd\[10058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180 user=root Jan 26 09:56:34 server sshd\[10058\]: Failed password for root from 112.85.42.180 port 17272 ssh2 Jan 26 09:56:38 server sshd\[10058\]: Failed password for root from 112.85.42.180 port 17272 ssh2 Jan 26 09:56:42 server sshd\[10058\]: Failed password for root from 112.85.42.180 port 17272 ssh2 Jan 26 09:56:45 server sshd\[10058\]: Failed password for root from 112.85.42.180 port 17272 ssh2 ... |
2020-01-26 15:27:34 |