城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.139.42.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.139.42.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:05:17 CST 2025
;; MSG SIZE rcvd: 107
b'Host 242.42.139.140.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 140.139.42.242.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 14.116.195.173 | attackbotsspam | Jun 13 14:27:02 ourumov-web sshd\[24551\]: Invalid user varick from 14.116.195.173 port 55768 Jun 13 14:27:02 ourumov-web sshd\[24551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.195.173 Jun 13 14:27:04 ourumov-web sshd\[24551\]: Failed password for invalid user varick from 14.116.195.173 port 55768 ssh2 ... |
2020-06-13 22:10:18 |
| 117.50.126.15 | attackspambots | 2020-06-13T15:33:04.557579+02:00 |
2020-06-13 22:14:26 |
| 104.45.88.60 | attackbotsspam | prod8 ... |
2020-06-13 22:04:20 |
| 222.186.169.192 | attackbotsspam | 2020-06-13T09:34:57.004378xentho-1 sshd[245851]: Failed password for root from 222.186.169.192 port 30524 ssh2 2020-06-13T09:34:51.774589xentho-1 sshd[245851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root 2020-06-13T09:34:53.259407xentho-1 sshd[245851]: Failed password for root from 222.186.169.192 port 30524 ssh2 2020-06-13T09:34:57.004378xentho-1 sshd[245851]: Failed password for root from 222.186.169.192 port 30524 ssh2 2020-06-13T09:35:02.004008xentho-1 sshd[245851]: Failed password for root from 222.186.169.192 port 30524 ssh2 2020-06-13T09:34:51.774589xentho-1 sshd[245851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root 2020-06-13T09:34:53.259407xentho-1 sshd[245851]: Failed password for root from 222.186.169.192 port 30524 ssh2 2020-06-13T09:34:57.004378xentho-1 sshd[245851]: Failed password for root from 222.186.169.192 port 30524 ssh2 2020-0 ... |
2020-06-13 21:39:53 |
| 54.37.205.241 | attack | Jun 13 14:23:41 sso sshd[17656]: Failed password for root from 54.37.205.241 port 47276 ssh2 ... |
2020-06-13 22:03:39 |
| 157.245.104.96 | attackbotsspam | Unauthorized SSH login attempts |
2020-06-13 21:42:29 |
| 171.103.161.234 | attack | Jun 13 14:26:58 raspberrypi sshd\[23231\]: Did not receive identification string from 171.103.161.234 ... |
2020-06-13 22:17:49 |
| 212.145.192.205 | attackspam | Jun 13 15:18:34 vps647732 sshd[17287]: Failed password for root from 212.145.192.205 port 58480 ssh2 ... |
2020-06-13 22:08:28 |
| 49.235.143.244 | attackbotsspam | Jun 13 14:39:32 home sshd[13049]: Failed password for root from 49.235.143.244 port 39190 ssh2 Jun 13 14:43:22 home sshd[13357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.143.244 Jun 13 14:43:24 home sshd[13357]: Failed password for invalid user jy from 49.235.143.244 port 58798 ssh2 ... |
2020-06-13 22:12:24 |
| 117.121.215.101 | attack | Jun 13 15:29:37 pve1 sshd[21707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.215.101 Jun 13 15:29:40 pve1 sshd[21707]: Failed password for invalid user gaby from 117.121.215.101 port 34820 ssh2 ... |
2020-06-13 22:22:23 |
| 111.229.242.71 | attack | DATE:2020-06-13 15:08:56, IP:111.229.242.71, PORT:ssh SSH brute force auth (docker-dc) |
2020-06-13 21:45:50 |
| 159.65.86.239 | attackbotsspam | 2020-06-13T09:12:46.9354141495-001 sshd[19153]: Failed password for invalid user cho from 159.65.86.239 port 50088 ssh2 2020-06-13T09:16:10.6722561495-001 sshd[19308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.86.239 user=root 2020-06-13T09:16:12.9302021495-001 sshd[19308]: Failed password for root from 159.65.86.239 port 50770 ssh2 2020-06-13T09:19:29.8866211495-001 sshd[19461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.86.239 user=root 2020-06-13T09:19:32.1296701495-001 sshd[19461]: Failed password for root from 159.65.86.239 port 51454 ssh2 2020-06-13T09:22:44.8454761495-001 sshd[19568]: Invalid user maxreg from 159.65.86.239 port 52148 ... |
2020-06-13 21:44:00 |
| 178.128.144.14 | attackspambots | Jun 13 15:40:44 server sshd[22815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.14 Jun 13 15:40:46 server sshd[22815]: Failed password for invalid user jumpuser from 178.128.144.14 port 41644 ssh2 Jun 13 15:44:15 server sshd[23059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.14 ... |
2020-06-13 21:47:55 |
| 41.77.146.98 | attack | 2020-06-13T12:18:19.175829abusebot-8.cloudsearch.cf sshd[26257]: Invalid user fws from 41.77.146.98 port 52868 2020-06-13T12:18:19.190663abusebot-8.cloudsearch.cf sshd[26257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98 2020-06-13T12:18:19.175829abusebot-8.cloudsearch.cf sshd[26257]: Invalid user fws from 41.77.146.98 port 52868 2020-06-13T12:18:21.609346abusebot-8.cloudsearch.cf sshd[26257]: Failed password for invalid user fws from 41.77.146.98 port 52868 ssh2 2020-06-13T12:27:23.542968abusebot-8.cloudsearch.cf sshd[26727]: Invalid user gmod from 41.77.146.98 port 55198 2020-06-13T12:27:23.551232abusebot-8.cloudsearch.cf sshd[26727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98 2020-06-13T12:27:23.542968abusebot-8.cloudsearch.cf sshd[26727]: Invalid user gmod from 41.77.146.98 port 55198 2020-06-13T12:27:25.649272abusebot-8.cloudsearch.cf sshd[26727]: Failed password for i ... |
2020-06-13 21:53:44 |
| 222.186.175.169 | attackbots | 2020-06-13T14:07:14.729418abusebot-3.cloudsearch.cf sshd[24232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root 2020-06-13T14:07:16.952180abusebot-3.cloudsearch.cf sshd[24232]: Failed password for root from 222.186.175.169 port 55324 ssh2 2020-06-13T14:07:20.281881abusebot-3.cloudsearch.cf sshd[24232]: Failed password for root from 222.186.175.169 port 55324 ssh2 2020-06-13T14:07:14.729418abusebot-3.cloudsearch.cf sshd[24232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169 user=root 2020-06-13T14:07:16.952180abusebot-3.cloudsearch.cf sshd[24232]: Failed password for root from 222.186.175.169 port 55324 ssh2 2020-06-13T14:07:20.281881abusebot-3.cloudsearch.cf sshd[24232]: Failed password for root from 222.186.175.169 port 55324 ssh2 2020-06-13T14:07:14.729418abusebot-3.cloudsearch.cf sshd[24232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... |
2020-06-13 22:14:59 |