城市(city): Somerville
省份(region): Massachusetts
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.247.66.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.247.66.142. IN A
;; AUTHORITY SECTION:
. 466 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024060300 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 04 00:24:42 CST 2024
;; MSG SIZE rcvd: 107
142.66.247.140.in-addr.arpa domain name pointer dhcp-140-247-66-142.fas.harvard.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.66.247.140.in-addr.arpa name = dhcp-140-247-66-142.fas.harvard.edu.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 163.172.207.104 | attack | \[2019-08-28 05:47:48\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-28T05:47:48.777-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="600011972592277524",SessionID="0x7f7b30be0af8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/50444",ACLName="no_extension_match" \[2019-08-28 05:52:44\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-28T05:52:44.356-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="700011972592277524",SessionID="0x7f7b30be0af8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/56512",ACLName="no_extension_match" \[2019-08-28 05:57:38\] SECURITY\[1837\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-08-28T05:57:38.946-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="800011972592277524",SessionID="0x7f7b30be0af8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/64692", |
2019-08-28 18:32:58 |
| 106.13.136.238 | attackspam | 2019-08-28T11:14:35.099163 sshd[9149]: Invalid user ep from 106.13.136.238 port 44366 2019-08-28T11:14:35.113576 sshd[9149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.136.238 2019-08-28T11:14:35.099163 sshd[9149]: Invalid user ep from 106.13.136.238 port 44366 2019-08-28T11:14:37.052235 sshd[9149]: Failed password for invalid user ep from 106.13.136.238 port 44366 ssh2 2019-08-28T11:17:57.138515 sshd[9229]: Invalid user oracle from 106.13.136.238 port 41618 ... |
2019-08-28 17:55:31 |
| 42.178.139.129 | attackbots | Unauthorised access (Aug 28) SRC=42.178.139.129 LEN=40 TTL=49 ID=34496 TCP DPT=8080 WINDOW=11879 SYN Unauthorised access (Aug 28) SRC=42.178.139.129 LEN=40 TTL=49 ID=40767 TCP DPT=8080 WINDOW=35736 SYN |
2019-08-28 18:24:01 |
| 223.221.240.218 | attackbotsspam | Aug 28 08:24:41 vps691689 sshd[21634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.221.240.218 Aug 28 08:24:43 vps691689 sshd[21634]: Failed password for invalid user tomek from 223.221.240.218 port 52460 ssh2 Aug 28 08:29:34 vps691689 sshd[21775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.221.240.218 ... |
2019-08-28 19:35:20 |
| 149.56.15.98 | attackspambots | Aug 27 18:51:34 wbs sshd\[30097\]: Invalid user sef from 149.56.15.98 Aug 27 18:51:34 wbs sshd\[30097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-149-56-15.net Aug 27 18:51:36 wbs sshd\[30097\]: Failed password for invalid user sef from 149.56.15.98 port 60444 ssh2 Aug 27 18:55:47 wbs sshd\[30521\]: Invalid user db from 149.56.15.98 Aug 27 18:55:47 wbs sshd\[30521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-149-56-15.net |
2019-08-28 18:08:46 |
| 201.20.73.195 | attack | 2019-08-28T10:21:12.704557abusebot-2.cloudsearch.cf sshd\[26479\]: Invalid user david from 201.20.73.195 port 41558 |
2019-08-28 18:36:06 |
| 218.92.0.163 | attackspambots | Aug 27 19:50:14 lcprod sshd\[30268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.163 user=root Aug 27 19:50:16 lcprod sshd\[30268\]: Failed password for root from 218.92.0.163 port 7572 ssh2 Aug 27 19:50:26 lcprod sshd\[30268\]: Failed password for root from 218.92.0.163 port 7572 ssh2 Aug 27 19:50:28 lcprod sshd\[30268\]: Failed password for root from 218.92.0.163 port 7572 ssh2 Aug 27 19:50:31 lcprod sshd\[30294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.163 user=root |
2019-08-28 17:54:31 |
| 43.226.40.124 | attackspambots | Aug 28 11:16:52 lnxded63 sshd[28999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.40.124 |
2019-08-28 18:00:49 |
| 218.4.196.178 | attackspambots | Aug 28 13:14:49 meumeu sshd[17828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.196.178 Aug 28 13:14:51 meumeu sshd[17828]: Failed password for invalid user team from 218.4.196.178 port 44594 ssh2 Aug 28 13:20:03 meumeu sshd[18492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.196.178 ... |
2019-08-28 19:22:45 |
| 82.208.177.139 | attack | Invalid user uta from 82.208.177.139 port 48672 |
2019-08-28 17:43:51 |
| 62.234.91.113 | attackspambots | Automatic report - Banned IP Access |
2019-08-28 17:29:28 |
| 103.94.120.66 | attackspambots | 103.94.120.66 - - [28/Aug/2019:05:20:55 +0100] "POST /xmlrpc.php HTTP/1.1" 200 370 "-" "Mozilla/5.0 (Linux; U; Android 8.1.0; zh-cn; BLA-AL00 Build/HUAWEIBLA-AL00) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/57.0.2987.132 MQQBrowser/8.9 Mobile Safari/537.36" |
2019-08-28 19:33:39 |
| 122.129.251.120 | attack | Invalid user admin from 122.129.251.120 port 13439 |
2019-08-28 19:35:52 |
| 27.223.118.148 | attackspam | Aug 27 23:53:23 lcprod sshd\[21043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.223.118.148 user=root Aug 27 23:53:25 lcprod sshd\[21043\]: Failed password for root from 27.223.118.148 port 56116 ssh2 Aug 27 23:53:33 lcprod sshd\[21043\]: Failed password for root from 27.223.118.148 port 56116 ssh2 Aug 27 23:53:34 lcprod sshd\[21043\]: Failed password for root from 27.223.118.148 port 56116 ssh2 Aug 27 23:53:37 lcprod sshd\[21043\]: Failed password for root from 27.223.118.148 port 56116 ssh2 |
2019-08-28 18:18:27 |
| 179.191.96.166 | attack | Aug 28 12:32:16 MK-Soft-Root1 sshd\[27491\]: Invalid user ti from 179.191.96.166 port 56338 Aug 28 12:32:16 MK-Soft-Root1 sshd\[27491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.96.166 Aug 28 12:32:18 MK-Soft-Root1 sshd\[27491\]: Failed password for invalid user ti from 179.191.96.166 port 56338 ssh2 ... |
2019-08-28 19:23:14 |