城市(city): unknown
省份(region): unknown
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.110.50.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;147.110.50.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 23:31:23 CST 2025
;; MSG SIZE rcvd: 107
Host 139.50.110.147.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.50.110.147.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 54.37.226.123 | attackspam | Jun 6 23:51:19 NPSTNNYC01T sshd[4747]: Failed password for root from 54.37.226.123 port 51878 ssh2 Jun 6 23:54:59 NPSTNNYC01T sshd[5032]: Failed password for root from 54.37.226.123 port 54922 ssh2 ... |
2020-06-07 12:38:00 |
| 106.13.99.51 | attackbotsspam | $f2bV_matches |
2020-06-07 12:39:14 |
| 159.89.170.154 | attackspambots | Jun 7 06:28:52 h2779839 sshd[20687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.154 user=root Jun 7 06:28:53 h2779839 sshd[20687]: Failed password for root from 159.89.170.154 port 43216 ssh2 Jun 7 06:31:02 h2779839 sshd[20710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.154 user=root Jun 7 06:31:04 h2779839 sshd[20710]: Failed password for root from 159.89.170.154 port 46590 ssh2 Jun 7 06:33:09 h2779839 sshd[20726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.154 user=root Jun 7 06:33:11 h2779839 sshd[20726]: Failed password for root from 159.89.170.154 port 49962 ssh2 Jun 7 06:35:20 h2779839 sshd[20747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.170.154 user=root Jun 7 06:35:23 h2779839 sshd[20747]: Failed password for root from 159.89.170.154 port 53334 s ... |
2020-06-07 12:43:27 |
| 222.186.173.183 | attack | 2020-06-07T00:05:24.196220xentho-1 sshd[1174327]: Failed password for root from 222.186.173.183 port 6424 ssh2 2020-06-07T00:05:18.032898xentho-1 sshd[1174327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183 user=root 2020-06-07T00:05:20.204206xentho-1 sshd[1174327]: Failed password for root from 222.186.173.183 port 6424 ssh2 2020-06-07T00:05:24.196220xentho-1 sshd[1174327]: Failed password for root from 222.186.173.183 port 6424 ssh2 2020-06-07T00:05:28.972922xentho-1 sshd[1174327]: Failed password for root from 222.186.173.183 port 6424 ssh2 2020-06-07T00:05:18.032898xentho-1 sshd[1174327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183 user=root 2020-06-07T00:05:20.204206xentho-1 sshd[1174327]: Failed password for root from 222.186.173.183 port 6424 ssh2 2020-06-07T00:05:24.196220xentho-1 sshd[1174327]: Failed password for root from 222.186.173.183 port 6424 ssh2 2020 ... |
2020-06-07 13:02:34 |
| 180.76.238.24 | attack | Jun 7 06:27:25 buvik sshd[26778]: Failed password for root from 180.76.238.24 port 49606 ssh2 Jun 7 06:29:36 buvik sshd[27176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.238.24 user=root Jun 7 06:29:38 buvik sshd[27176]: Failed password for root from 180.76.238.24 port 50658 ssh2 ... |
2020-06-07 12:37:33 |
| 45.119.215.68 | attackbots | Jun 6 08:55:34 Tower sshd[42590]: refused connect from 111.229.176.206 (111.229.176.206) Jun 6 23:58:09 Tower sshd[42590]: Connection from 45.119.215.68 port 47866 on 192.168.10.220 port 22 rdomain "" Jun 6 23:58:11 Tower sshd[42590]: Failed password for root from 45.119.215.68 port 47866 ssh2 Jun 6 23:58:11 Tower sshd[42590]: Received disconnect from 45.119.215.68 port 47866:11: Bye Bye [preauth] Jun 6 23:58:11 Tower sshd[42590]: Disconnected from authenticating user root 45.119.215.68 port 47866 [preauth] |
2020-06-07 12:46:29 |
| 46.97.186.242 | attack | Automatic report - Port Scan Attack |
2020-06-07 12:29:15 |
| 59.172.61.66 | attackspam | Jun 7 06:23:19 vps687878 sshd\[22897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.172.61.66 user=root Jun 7 06:23:21 vps687878 sshd\[22897\]: Failed password for root from 59.172.61.66 port 58593 ssh2 Jun 7 06:26:38 vps687878 sshd\[23944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.172.61.66 user=root Jun 7 06:26:40 vps687878 sshd\[23944\]: Failed password for root from 59.172.61.66 port 7009 ssh2 Jun 7 06:29:56 vps687878 sshd\[24221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.172.61.66 user=root ... |
2020-06-07 12:41:42 |
| 203.57.227.58 | attackbots | Jun 7 06:28:51 abendstille sshd\[20696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.57.227.58 user=root Jun 7 06:28:53 abendstille sshd\[20696\]: Failed password for root from 203.57.227.58 port 35246 ssh2 Jun 7 06:33:38 abendstille sshd\[25824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.57.227.58 user=root Jun 7 06:33:40 abendstille sshd\[25824\]: Failed password for root from 203.57.227.58 port 53840 ssh2 Jun 7 06:38:50 abendstille sshd\[30703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.57.227.58 user=root ... |
2020-06-07 12:52:44 |
| 119.188.240.41 | attackspam | Jun 7 06:29:26 ns381471 sshd[7242]: Failed password for root from 119.188.240.41 port 43429 ssh2 |
2020-06-07 12:54:58 |
| 106.12.55.170 | attack | Jun 7 06:31:24 vps639187 sshd\[21055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.55.170 user=root Jun 7 06:31:26 vps639187 sshd\[21055\]: Failed password for root from 106.12.55.170 port 53658 ssh2 Jun 7 06:35:26 vps639187 sshd\[21109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.55.170 user=root ... |
2020-06-07 12:39:33 |
| 45.134.179.102 | attack | SmallBizIT.US 5 packets to tcp(3551,9410,9498,9893,32555) |
2020-06-07 12:32:00 |
| 123.136.128.13 | attack | Jun 7 06:23:57 piServer sshd[32698]: Failed password for root from 123.136.128.13 port 39092 ssh2 Jun 7 06:28:50 piServer sshd[891]: Failed password for root from 123.136.128.13 port 41067 ssh2 ... |
2020-06-07 12:39:53 |
| 167.56.27.3 | attack | Automatic report - Port Scan Attack |
2020-06-07 13:07:49 |
| 160.153.234.236 | attackspambots | 2020-06-07T04:21:00.835627shield sshd\[6709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-160-153-234-236.ip.secureserver.net user=root 2020-06-07T04:21:02.666929shield sshd\[6709\]: Failed password for root from 160.153.234.236 port 44500 ssh2 2020-06-07T04:24:18.082222shield sshd\[7990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-160-153-234-236.ip.secureserver.net user=root 2020-06-07T04:24:20.093712shield sshd\[7990\]: Failed password for root from 160.153.234.236 port 48152 ssh2 2020-06-07T04:27:30.299444shield sshd\[9531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-160-153-234-236.ip.secureserver.net user=root |
2020-06-07 12:33:57 |