城市(city): unknown
省份(region): unknown
国家(country): Turkey
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.140.168.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.140.168.124. IN A
;; AUTHORITY SECTION:
. 170 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 21:55:11 CST 2022
;; MSG SIZE rcvd: 108
124.168.140.193.in-addr.arpa domain name pointer www.ktu.edu.tr.
124.168.140.193.in-addr.arpa domain name pointer www2.ktu.edu.tr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
124.168.140.193.in-addr.arpa name = www2.ktu.edu.tr.
124.168.140.193.in-addr.arpa name = www.ktu.edu.tr.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 219.235.94.34 | attack | Unauthorized connection attempt detected from IP address 219.235.94.34 to port 1433 [J] |
2020-02-05 14:29:20 |
| 118.24.56.143 | attack | Feb 5 05:53:31 cp sshd[23251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.56.143 |
2020-02-05 14:37:04 |
| 103.207.129.40 | attackspambots | (sshd) Failed SSH login from 103.207.129.40 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 5 06:39:23 elude sshd[29179]: Invalid user kross from 103.207.129.40 port 45272 Feb 5 06:39:26 elude sshd[29179]: Failed password for invalid user kross from 103.207.129.40 port 45272 ssh2 Feb 5 06:56:03 elude sshd[30298]: Invalid user wayne from 103.207.129.40 port 37914 Feb 5 06:56:05 elude sshd[30298]: Failed password for invalid user wayne from 103.207.129.40 port 37914 ssh2 Feb 5 07:06:58 elude sshd[30952]: Invalid user cn from 103.207.129.40 port 44644 |
2020-02-05 14:52:10 |
| 122.51.23.135 | attackbotsspam | Unauthorized connection attempt detected from IP address 122.51.23.135 to port 2220 [J] |
2020-02-05 14:41:25 |
| 103.77.158.118 | attackspambots | Hacking |
2020-02-05 14:29:54 |
| 111.229.31.134 | attackbotsspam | Feb 5 01:06:25 plusreed sshd[19675]: Invalid user flow from 111.229.31.134 ... |
2020-02-05 14:18:59 |
| 47.240.85.77 | attack | Autoban 47.240.85.77 AUTH/CONNECT |
2020-02-05 14:57:49 |
| 87.222.97.100 | attackspam | Feb 5 06:55:04 MK-Soft-VM5 sshd[8282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.222.97.100 Feb 5 06:55:06 MK-Soft-VM5 sshd[8282]: Failed password for invalid user rstudio from 87.222.97.100 port 35299 ssh2 ... |
2020-02-05 14:51:41 |
| 83.20.174.214 | attackspambots | Unauthorized connection attempt detected from IP address 83.20.174.214 to port 2220 [J] |
2020-02-05 14:22:13 |
| 117.1.149.179 | attack | 117.1.149.179 - - [05/Feb/2020:05:53:09 +0100] "GET /awstats.pl?lang=en&output=main HTTP/1.0" 404 280 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36" |
2020-02-05 14:49:05 |
| 119.115.130.234 | attackspam | Feb 5 06:17:58 game-panel sshd[32434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.115.130.234 Feb 5 06:18:00 game-panel sshd[32434]: Failed password for invalid user albina from 119.115.130.234 port 33082 ssh2 Feb 5 06:24:06 game-panel sshd[32750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.115.130.234 |
2020-02-05 14:49:57 |
| 111.229.57.47 | attack | Feb 5 05:35:11 ns382633 sshd\[2933\]: Invalid user julien from 111.229.57.47 port 40294 Feb 5 05:35:11 ns382633 sshd\[2933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.57.47 Feb 5 05:35:13 ns382633 sshd\[2933\]: Failed password for invalid user julien from 111.229.57.47 port 40294 ssh2 Feb 5 05:53:06 ns382633 sshd\[5920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.57.47 user=root Feb 5 05:53:07 ns382633 sshd\[5920\]: Failed password for root from 111.229.57.47 port 50680 ssh2 |
2020-02-05 14:49:29 |
| 103.22.250.194 | attack | MYH,DEF GET /wp-login.php |
2020-02-05 14:50:11 |
| 190.147.34.27 | attackspambots | Unauthorized connection attempt detected from IP address 190.147.34.27 to port 2220 [J] |
2020-02-05 14:54:40 |
| 180.76.134.77 | attackspambots | Feb 5 07:56:21 lukav-desktop sshd\[19492\]: Invalid user vl from 180.76.134.77 Feb 5 07:56:21 lukav-desktop sshd\[19492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.77 Feb 5 07:56:24 lukav-desktop sshd\[19492\]: Failed password for invalid user vl from 180.76.134.77 port 56934 ssh2 Feb 5 07:59:32 lukav-desktop sshd\[20932\]: Invalid user wp-user from 180.76.134.77 Feb 5 07:59:32 lukav-desktop sshd\[20932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.134.77 |
2020-02-05 14:46:16 |