城市(city): unknown
省份(region): unknown
国家(country): Italy
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.206.72.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.206.72.19. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:26:36 CST 2025
;; MSG SIZE rcvd: 106
19.72.206.193.in-addr.arpa domain name pointer staff.unipv.it.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
19.72.206.193.in-addr.arpa name = staff.unipv.it.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.199.164.21 | attack | Invalid user blake from 139.199.164.21 port 47940 |
2020-05-27 16:21:51 |
| 111.229.252.188 | attackspam | Invalid user mzk from 111.229.252.188 port 51792 |
2020-05-27 16:16:24 |
| 58.137.157.77 | attack | May 27 10:31:30 server sshd[3562]: Failed password for invalid user netscape from 58.137.157.77 port 43186 ssh2 May 27 10:39:42 server sshd[10440]: Failed password for invalid user network from 58.137.157.77 port 38900 ssh2 May 27 10:47:50 server sshd[17426]: Failed password for invalid user newyork from 58.137.157.77 port 34614 ssh2 |
2020-05-27 16:53:45 |
| 106.54.123.84 | attackspambots | Invalid user bzg from 106.54.123.84 port 52642 |
2020-05-27 16:16:38 |
| 207.154.234.102 | attackspam | (sshd) Failed SSH login from 207.154.234.102 (DE/Germany/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 27 10:41:14 ubnt-55d23 sshd[401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.234.102 user=root May 27 10:41:15 ubnt-55d23 sshd[401]: Failed password for root from 207.154.234.102 port 51914 ssh2 |
2020-05-27 16:45:59 |
| 106.13.231.171 | attackspam | $f2bV_matches |
2020-05-27 16:29:21 |
| 1.163.233.215 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-27 16:50:21 |
| 106.12.88.232 | attackspambots | May 27 09:25:53 Ubuntu-1404-trusty-64-minimal sshd\[30238\]: Invalid user nurishah from 106.12.88.232 May 27 09:25:53 Ubuntu-1404-trusty-64-minimal sshd\[30238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.232 May 27 09:25:55 Ubuntu-1404-trusty-64-minimal sshd\[30238\]: Failed password for invalid user nurishah from 106.12.88.232 port 41888 ssh2 May 27 09:34:02 Ubuntu-1404-trusty-64-minimal sshd\[8367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.232 user=root May 27 09:34:03 Ubuntu-1404-trusty-64-minimal sshd\[8367\]: Failed password for root from 106.12.88.232 port 33466 ssh2 |
2020-05-27 16:17:00 |
| 180.76.176.126 | attackbotsspam | May 27 06:44:29 lukav-desktop sshd\[6003\]: Invalid user zb from 180.76.176.126 May 27 06:44:29 lukav-desktop sshd\[6003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126 May 27 06:44:31 lukav-desktop sshd\[6003\]: Failed password for invalid user zb from 180.76.176.126 port 41155 ssh2 May 27 06:51:35 lukav-desktop sshd\[6068\]: Invalid user anglais from 180.76.176.126 May 27 06:51:35 lukav-desktop sshd\[6068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.126 |
2020-05-27 16:56:23 |
| 14.104.165.236 | attackbots | Unauthorized connection attempt detected from IP address 14.104.165.236 to port 1433 |
2020-05-27 16:44:16 |
| 114.34.228.63 | attackspambots | port scan and connect, tcp 23 (telnet) |
2020-05-27 16:31:43 |
| 140.143.238.46 | attack | 2020-05-27T03:12:52.549995morrigan.ad5gb.com sshd[19014]: Failed password for root from 140.143.238.46 port 55782 ssh2 2020-05-27T03:12:53.546963morrigan.ad5gb.com sshd[19014]: Disconnected from authenticating user root 140.143.238.46 port 55782 [preauth] 2020-05-27T03:18:58.601587morrigan.ad5gb.com sshd[20676]: Invalid user radu from 140.143.238.46 port 53148 |
2020-05-27 16:41:11 |
| 195.122.226.164 | attackbotsspam | May 27 10:16:27 OPSO sshd\[18874\]: Invalid user 111 from 195.122.226.164 port 46942 May 27 10:16:27 OPSO sshd\[18874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.122.226.164 May 27 10:16:29 OPSO sshd\[18874\]: Failed password for invalid user 111 from 195.122.226.164 port 46942 ssh2 May 27 10:20:35 OPSO sshd\[20395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.122.226.164 user=root May 27 10:20:37 OPSO sshd\[20395\]: Failed password for root from 195.122.226.164 port 15602 ssh2 |
2020-05-27 16:21:26 |
| 139.99.135.178 | attackspambots | Port scan |
2020-05-27 16:30:53 |
| 95.85.12.122 | attackspambots | Unauthorized connection attempt detected from IP address 95.85.12.122 to port 7752 [T] |
2020-05-27 16:52:59 |