城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.69.140.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12468
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;159.69.140.142. IN A
;; AUTHORITY SECTION:
. 458 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 13:41:28 CST 2022
;; MSG SIZE rcvd: 107
142.140.69.159.in-addr.arpa domain name pointer jr2.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.140.69.159.in-addr.arpa name = jr2.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 61.216.145.48 | attack | Aug 2 03:51:48 MK-Soft-VM5 sshd\[9453\]: Invalid user ethereal from 61.216.145.48 port 47184 Aug 2 03:51:48 MK-Soft-VM5 sshd\[9453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.145.48 Aug 2 03:51:49 MK-Soft-VM5 sshd\[9453\]: Failed password for invalid user ethereal from 61.216.145.48 port 47184 ssh2 ... |
2019-08-02 12:54:47 |
| 77.247.110.221 | attackspam | SIPVicious Scanner Detection, PTR: PTR record not found |
2019-08-02 13:08:38 |
| 187.37.1.171 | attackspam | Jul 31 14:26:43 h2034429 sshd[21747]: Invalid user tmp123 from 187.37.1.171 Jul 31 14:26:43 h2034429 sshd[21747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.37.1.171 Jul 31 14:26:45 h2034429 sshd[21747]: Failed password for invalid user tmp123 from 187.37.1.171 port 21953 ssh2 Jul 31 14:26:45 h2034429 sshd[21747]: Received disconnect from 187.37.1.171 port 21953:11: Bye Bye [preauth] Jul 31 14:26:45 h2034429 sshd[21747]: Disconnected from 187.37.1.171 port 21953 [preauth] Jul 31 14:32:39 h2034429 sshd[21807]: Invalid user mhostnamech from 187.37.1.171 Jul 31 14:32:39 h2034429 sshd[21807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.37.1.171 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=187.37.1.171 |
2019-08-02 13:12:25 |
| 180.153.46.170 | attackspambots | Aug 2 02:47:14 ip-172-31-1-72 sshd\[29008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.153.46.170 user=root Aug 2 02:47:15 ip-172-31-1-72 sshd\[29008\]: Failed password for root from 180.153.46.170 port 43147 ssh2 Aug 2 02:56:54 ip-172-31-1-72 sshd\[29101\]: Invalid user diskbook from 180.153.46.170 Aug 2 02:56:54 ip-172-31-1-72 sshd\[29101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.153.46.170 Aug 2 02:56:56 ip-172-31-1-72 sshd\[29101\]: Failed password for invalid user diskbook from 180.153.46.170 port 41822 ssh2 |
2019-08-02 13:41:01 |
| 106.12.27.140 | attack | SSH bruteforce (Triggered fail2ban) |
2019-08-02 13:10:58 |
| 103.8.149.78 | attackbots | Aug 2 06:32:55 nextcloud sshd\[25747\]: Invalid user mongodb from 103.8.149.78 Aug 2 06:32:55 nextcloud sshd\[25747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.8.149.78 Aug 2 06:32:57 nextcloud sshd\[25747\]: Failed password for invalid user mongodb from 103.8.149.78 port 37697 ssh2 ... |
2019-08-02 13:47:05 |
| 187.1.28.108 | attackspam | failed_logins |
2019-08-02 13:19:50 |
| 217.61.6.112 | attackbotsspam | Jul 31 17:57:46 mx-in-01 sshd[23634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.6.112 user=r.r Jul 31 17:57:48 mx-in-01 sshd[23634]: Failed password for r.r from 217.61.6.112 port 50922 ssh2 Jul 31 17:57:48 mx-in-01 sshd[23634]: Received disconnect from 217.61.6.112 port 50922:11: Bye Bye [preauth] Jul 31 17:57:48 mx-in-01 sshd[23634]: Disconnected from 217.61.6.112 port 50922 [preauth] Jul 31 18:09:48 mx-in-01 sshd[24148]: Invalid user sma from 217.61.6.112 port 55908 Jul 31 18:09:48 mx-in-01 sshd[24148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.6.112 Jul 31 18:09:50 mx-in-01 sshd[24148]: Failed password for invalid user sma from 217.61.6.112 port 55908 ssh2 Jul 31 18:09:50 mx-in-01 sshd[24148]: Received disconnect from 217.61.6.112 port 55908:11: Bye Bye [preauth] Jul 31 18:09:50 mx-in-01 sshd[24148]: Disconnected from 217.61.6.112 port 55908 [preauth] Jul 31 18........ ------------------------------- |
2019-08-02 13:22:11 |
| 51.91.56.133 | attack | Automatic report - Banned IP Access |
2019-08-02 13:29:07 |
| 131.161.14.136 | attack | " " |
2019-08-02 13:03:41 |
| 80.211.251.79 | attackspam | CloudCIX Reconnaissance Scan Detected, PTR: host79-251-211-80.static.arubacloud.pl. |
2019-08-02 12:53:57 |
| 89.216.120.30 | attack | email spam |
2019-08-02 13:42:30 |
| 153.36.232.139 | attackbotsspam | Aug 2 11:46:26 webhost01 sshd[24426]: Failed password for root from 153.36.232.139 port 54721 ssh2 ... |
2019-08-02 12:50:47 |
| 94.194.166.5 | attackbotsspam | Aug 2 05:21:06 SilenceServices sshd[27311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.194.166.5 Aug 2 05:21:07 SilenceServices sshd[27311]: Failed password for invalid user plesk from 94.194.166.5 port 3879 ssh2 Aug 2 05:25:35 SilenceServices sshd[30397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.194.166.5 |
2019-08-02 13:28:44 |
| 170.231.94.138 | attackspam | Try access to SMTP/POP/IMAP server. |
2019-08-02 13:23:03 |