城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.47.139.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.47.139.145. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:38:32 CST 2022
;; MSG SIZE rcvd: 107
145.139.47.149.in-addr.arpa domain name pointer ip-149-47-139-145.iplocal.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.139.47.149.in-addr.arpa name = ip-149-47-139-145.iplocal.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 189.84.211.2 | attackbots | Aug 13 21:33:04 mout sshd[2590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.84.211.2 user=root Aug 13 21:33:06 mout sshd[2590]: Failed password for root from 189.84.211.2 port 36564 ssh2 |
2019-08-14 04:07:43 |
| 95.163.214.206 | attackspambots | Aug 13 11:41:27 home sshd[14386]: Invalid user oracle from 95.163.214.206 port 33300 Aug 13 11:41:27 home sshd[14386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.163.214.206 Aug 13 11:41:27 home sshd[14386]: Invalid user oracle from 95.163.214.206 port 33300 Aug 13 11:41:29 home sshd[14386]: Failed password for invalid user oracle from 95.163.214.206 port 33300 ssh2 Aug 13 12:07:16 home sshd[14435]: Invalid user mysql from 95.163.214.206 port 50990 Aug 13 12:07:16 home sshd[14435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.163.214.206 Aug 13 12:07:16 home sshd[14435]: Invalid user mysql from 95.163.214.206 port 50990 Aug 13 12:07:18 home sshd[14435]: Failed password for invalid user mysql from 95.163.214.206 port 50990 ssh2 Aug 13 12:11:40 home sshd[14466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.163.214.206 user=daemon Aug 13 12:11:43 home sshd[14466]: Failed pa |
2019-08-14 04:44:49 |
| 176.108.106.49 | attack | port scan and connect, tcp 80 (http) |
2019-08-14 04:29:30 |
| 46.236.142.101 | attackbotsspam | Aug 13 20:54:42 XXX sshd[9134]: Invalid user mhlee from 46.236.142.101 port 54062 |
2019-08-14 04:15:44 |
| 51.68.229.59 | attack | Aug 13 21:45:26 microserver sshd[8193]: Invalid user denys from 51.68.229.59 port 42084 Aug 13 21:45:26 microserver sshd[8193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.229.59 Aug 13 21:45:28 microserver sshd[8193]: Failed password for invalid user denys from 51.68.229.59 port 42084 ssh2 Aug 13 21:50:44 microserver sshd[8907]: Invalid user support from 51.68.229.59 port 41998 Aug 13 21:50:45 microserver sshd[8907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.229.59 Aug 13 22:03:54 microserver sshd[10466]: Invalid user compsx from 51.68.229.59 port 51602 Aug 13 22:03:54 microserver sshd[10466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.229.59 Aug 13 22:03:56 microserver sshd[10466]: Failed password for invalid user compsx from 51.68.229.59 port 51602 ssh2 Aug 13 22:08:31 microserver sshd[11129]: Invalid user ain from 51.68.229.59 port 45388 Aug 13 22:08:31 m |
2019-08-14 04:11:40 |
| 92.118.37.86 | attack | firewall-block, port(s): 3552/tcp |
2019-08-14 04:15:24 |
| 89.217.42.114 | attackspambots | Aug 13 20:52:01 XXX sshd[8874]: Invalid user Nicole from 89.217.42.114 port 52564 |
2019-08-14 04:26:44 |
| 185.222.211.114 | attack | Aug 13 22:12:38 lumpi kernel: INPUT:DROP:SPAMHAUS_DROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.222.211.114 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=51356 PROTO=TCP SPT=8080 DPT=33399 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-08-14 04:18:07 |
| 125.17.212.55 | attackbots | Aug 13 18:58:56 *** sshd[27871]: Failed password for invalid user test from 125.17.212.55 port 56846 ssh2 |
2019-08-14 04:14:20 |
| 119.205.220.98 | attack | Aug 13 20:38:46 root sshd[5628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.220.98 Aug 13 20:38:48 root sshd[5628]: Failed password for invalid user craig from 119.205.220.98 port 55200 ssh2 Aug 13 20:47:45 root sshd[5732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.220.98 ... |
2019-08-14 04:06:06 |
| 106.13.48.157 | attackspambots | $f2bV_matches |
2019-08-14 04:19:45 |
| 71.78.247.238 | attackspam | Brute force RDP, port 3389 |
2019-08-14 04:34:48 |
| 42.4.4.121 | attackbots | Aug 13 20:19:19 root sshd[5390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.4.4.121 Aug 13 20:19:21 root sshd[5390]: Failed password for invalid user dev from 42.4.4.121 port 59819 ssh2 Aug 13 20:25:58 root sshd[5425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.4.4.121 ... |
2019-08-14 04:30:32 |
| 40.68.153.124 | attack | 2019-08-13T19:49:39.999375abusebot.cloudsearch.cf sshd\[7241\]: Invalid user ryan from 40.68.153.124 port 53642 |
2019-08-14 04:08:17 |
| 212.79.176.73 | attackbots | Chat Spam |
2019-08-14 04:41:08 |