城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.217.0.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62091
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.217.0.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:55:44 CST 2025
;; MSG SIZE rcvd: 106
Host 139.0.217.140.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 139.0.217.140.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 45.133.99.12 | attackspam | Mar 18 06:03:55 relay postfix/smtpd\[13729\]: warning: unknown\[45.133.99.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 18 06:04:12 relay postfix/smtpd\[13286\]: warning: unknown\[45.133.99.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 18 06:05:42 relay postfix/smtpd\[13729\]: warning: unknown\[45.133.99.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 18 06:06:01 relay postfix/smtpd\[13729\]: warning: unknown\[45.133.99.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 18 06:10:08 relay postfix/smtpd\[13769\]: warning: unknown\[45.133.99.12\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-03-18 13:13:22 |
| 222.186.30.218 | attackbots | Mar 18 06:03:04 dcd-gentoo sshd[25132]: User root from 222.186.30.218 not allowed because none of user's groups are listed in AllowGroups Mar 18 06:03:07 dcd-gentoo sshd[25132]: error: PAM: Authentication failure for illegal user root from 222.186.30.218 Mar 18 06:03:04 dcd-gentoo sshd[25132]: User root from 222.186.30.218 not allowed because none of user's groups are listed in AllowGroups Mar 18 06:03:07 dcd-gentoo sshd[25132]: error: PAM: Authentication failure for illegal user root from 222.186.30.218 Mar 18 06:03:04 dcd-gentoo sshd[25132]: User root from 222.186.30.218 not allowed because none of user's groups are listed in AllowGroups Mar 18 06:03:07 dcd-gentoo sshd[25132]: error: PAM: Authentication failure for illegal user root from 222.186.30.218 Mar 18 06:03:07 dcd-gentoo sshd[25132]: Failed keyboard-interactive/pam for invalid user root from 222.186.30.218 port 50223 ssh2 ... |
2020-03-18 13:04:54 |
| 106.13.99.221 | attackspam | bruteforce detected |
2020-03-18 13:46:06 |
| 203.189.142.33 | attackbots | Mar 18 04:51:19 mail.srvfarm.net postfix/smtpd[1293548]: NOQUEUE: reject: RCPT from unknown[203.189.142.33]: 554 5.7.1 Service unavailable; Client host [203.189.142.33] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?203.189.142.33; from= |
2020-03-18 13:25:48 |
| 189.8.68.80 | attackbotsspam | bruteforce detected |
2020-03-18 13:09:07 |
| 184.22.224.167 | attackbots | 20/3/17@23:54:21: FAIL: Alarm-Network address from=184.22.224.167 ... |
2020-03-18 13:06:47 |
| 193.148.71.35 | attackspambots | SSH brute force attempt |
2020-03-18 13:58:50 |
| 222.186.30.187 | attackbots | Unauthorized connection attempt detected from IP address 222.186.30.187 to port 22 |
2020-03-18 14:00:45 |
| 107.170.249.6 | attack | Mar 18 06:00:32 ArkNodeAT sshd\[22141\]: Invalid user cnc from 107.170.249.6 Mar 18 06:00:32 ArkNodeAT sshd\[22141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.249.6 Mar 18 06:00:33 ArkNodeAT sshd\[22141\]: Failed password for invalid user cnc from 107.170.249.6 port 43118 ssh2 |
2020-03-18 13:10:41 |
| 220.88.1.208 | attackbotsspam | Mar 18 04:39:52 lock-38 sshd[73754]: Invalid user hubihao from 220.88.1.208 port 38669 Mar 18 04:39:52 lock-38 sshd[73754]: Failed password for invalid user hubihao from 220.88.1.208 port 38669 ssh2 Mar 18 04:44:27 lock-38 sshd[73794]: Failed password for root from 220.88.1.208 port 46741 ssh2 Mar 18 04:48:51 lock-38 sshd[73815]: Failed password for root from 220.88.1.208 port 41472 ssh2 Mar 18 04:53:14 lock-38 sshd[73847]: Failed password for root from 220.88.1.208 port 36207 ssh2 ... |
2020-03-18 14:08:41 |
| 222.186.180.6 | attackspambots | Mar 18 06:00:22 v22018086721571380 sshd[11638]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 58066 ssh2 [preauth] |
2020-03-18 13:04:15 |
| 177.7.27.114 | attackspambots | 20/3/17@23:54:18: FAIL: Alarm-Network address from=177.7.27.114 20/3/17@23:54:19: FAIL: Alarm-Network address from=177.7.27.114 ... |
2020-03-18 13:09:55 |
| 51.89.149.213 | attack | Mar 18 06:11:52 vps691689 sshd[17550]: Failed password for root from 51.89.149.213 port 40274 ssh2 Mar 18 06:15:59 vps691689 sshd[17659]: Failed password for root from 51.89.149.213 port 60372 ssh2 ... |
2020-03-18 13:45:16 |
| 68.183.19.63 | attackspam | ssh intrusion attempt |
2020-03-18 13:23:48 |
| 222.186.173.154 | attack | Mar 18 04:04:04 v22018086721571380 sshd[19594]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 10796 ssh2 [preauth] Mar 18 06:20:59 v22018086721571380 sshd[15994]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 22604 ssh2 [preauth] |
2020-03-18 13:22:02 |