城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.241.103.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.241.103.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:07:27 CST 2025
;; MSG SIZE rcvd: 108
Host 139.103.241.141.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.103.241.141.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 177.100.50.182 | attackbots | Sep 8 23:05:26 vps200512 sshd\[2360\]: Invalid user 1qaz2wsx from 177.100.50.182 Sep 8 23:05:26 vps200512 sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.100.50.182 Sep 8 23:05:29 vps200512 sshd\[2360\]: Failed password for invalid user 1qaz2wsx from 177.100.50.182 port 45026 ssh2 Sep 8 23:12:51 vps200512 sshd\[2584\]: Invalid user vyatta from 177.100.50.182 Sep 8 23:12:51 vps200512 sshd\[2584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.100.50.182 |
2019-09-09 11:25:03 |
| 159.203.199.7 | attackbots | 8088/tcp 1527/tcp 587/tcp... [2019-09-06/08]5pkt,5pt.(tcp) |
2019-09-09 11:28:31 |
| 198.108.66.99 | attackspambots | 8888/tcp 22/tcp 82/tcp... [2019-07-14/09-08]14pkt,6pt.(tcp),2pt.(udp) |
2019-09-09 11:04:46 |
| 177.44.170.198 | attackbotsspam | $f2bV_matches |
2019-09-09 11:14:36 |
| 103.219.154.13 | attack | Sep 9 02:12:45 localhost postfix/smtpd\[15559\]: warning: unknown\[103.219.154.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 02:12:51 localhost postfix/smtpd\[15559\]: warning: unknown\[103.219.154.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 02:13:13 localhost postfix/smtpd\[15562\]: warning: unknown\[103.219.154.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 02:13:54 localhost postfix/smtpd\[15559\]: warning: unknown\[103.219.154.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 02:14:00 localhost postfix/smtpd\[15562\]: warning: unknown\[103.219.154.13\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-09-09 11:35:38 |
| 203.106.166.45 | attackspam | Sep 9 01:35:58 SilenceServices sshd[28069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.106.166.45 Sep 9 01:36:00 SilenceServices sshd[28069]: Failed password for invalid user jenkins from 203.106.166.45 port 46168 ssh2 Sep 9 01:40:59 SilenceServices sshd[31872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.106.166.45 |
2019-09-09 11:07:41 |
| 103.31.82.122 | attackbots | Sep 9 05:02:10 markkoudstaal sshd[6881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.82.122 Sep 9 05:02:13 markkoudstaal sshd[6881]: Failed password for invalid user svnuser from 103.31.82.122 port 52356 ssh2 Sep 9 05:09:29 markkoudstaal sshd[7532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.82.122 |
2019-09-09 11:11:07 |
| 189.161.62.169 | attack | port scan/probe/communication attempt |
2019-09-09 10:55:13 |
| 192.42.116.15 | attackspam | 2019-08-15T15:28:52.636101wiz-ks3 sshd[9906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=this-is-a-tor-exit-node-hviv115.hviv.nl user=root 2019-08-15T15:28:54.629931wiz-ks3 sshd[9906]: Failed password for root from 192.42.116.15 port 40998 ssh2 2019-08-15T15:28:57.697243wiz-ks3 sshd[9906]: Failed password for root from 192.42.116.15 port 40998 ssh2 2019-08-15T15:28:52.636101wiz-ks3 sshd[9906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=this-is-a-tor-exit-node-hviv115.hviv.nl user=root 2019-08-15T15:28:54.629931wiz-ks3 sshd[9906]: Failed password for root from 192.42.116.15 port 40998 ssh2 2019-08-15T15:28:57.697243wiz-ks3 sshd[9906]: Failed password for root from 192.42.116.15 port 40998 ssh2 2019-08-15T15:28:52.636101wiz-ks3 sshd[9906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=this-is-a-tor-exit-node-hviv115.hviv.nl user=root 2019-08-15T15:28:54.629931wiz-ks3 sshd[9906]: |
2019-09-09 11:01:12 |
| 114.32.153.15 | attack | [Aegis] @ 2019-09-08 23:19:24 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-09-09 11:12:34 |
| 193.70.0.42 | attackbots | Sep 8 23:21:40 TORMINT sshd\[5700\]: Invalid user git from 193.70.0.42 Sep 8 23:21:40 TORMINT sshd\[5700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.0.42 Sep 8 23:21:41 TORMINT sshd\[5700\]: Failed password for invalid user git from 193.70.0.42 port 42526 ssh2 ... |
2019-09-09 11:32:15 |
| 151.80.203.46 | attackbots | Sep 8 23:46:36 cp sshd[17013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.203.46 |
2019-09-09 11:29:29 |
| 114.32.218.77 | attackspambots | Sep 8 20:16:32 TORMINT sshd\[21611\]: Invalid user 1234 from 114.32.218.77 Sep 8 20:16:32 TORMINT sshd\[21611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.218.77 Sep 8 20:16:34 TORMINT sshd\[21611\]: Failed password for invalid user 1234 from 114.32.218.77 port 34310 ssh2 ... |
2019-09-09 11:30:03 |
| 186.139.225.186 | attack | 23/tcp 60001/tcp [2019-08-03/09-08]2pkt |
2019-09-09 10:50:34 |
| 182.74.131.90 | attackspambots | Sep 9 09:49:37 itv-usvr-01 sshd[10447]: Invalid user squadserver from 182.74.131.90 Sep 9 09:49:37 itv-usvr-01 sshd[10447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.131.90 Sep 9 09:49:37 itv-usvr-01 sshd[10447]: Invalid user squadserver from 182.74.131.90 Sep 9 09:49:39 itv-usvr-01 sshd[10447]: Failed password for invalid user squadserver from 182.74.131.90 port 54520 ssh2 Sep 9 09:59:23 itv-usvr-01 sshd[10802]: Invalid user admin from 182.74.131.90 |
2019-09-09 11:09:23 |