城市(city): unknown
省份(region): unknown
国家(country): Denmark
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.130.168.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5357
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.130.168.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 14:30:23 CST 2025
;; MSG SIZE rcvd: 106
139.168.130.2.in-addr.arpa domain name pointer 002130168139.mbb.telenor.dk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.168.130.2.in-addr.arpa name = 002130168139.mbb.telenor.dk.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 139.59.36.23 | attackbotsspam | Jun 12 01:59:28 dhoomketu sshd[666324]: Invalid user adjedj from 139.59.36.23 port 46622 Jun 12 01:59:28 dhoomketu sshd[666324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.36.23 Jun 12 01:59:28 dhoomketu sshd[666324]: Invalid user adjedj from 139.59.36.23 port 46622 Jun 12 01:59:30 dhoomketu sshd[666324]: Failed password for invalid user adjedj from 139.59.36.23 port 46622 ssh2 Jun 12 02:03:00 dhoomketu sshd[666373]: Invalid user admin from 139.59.36.23 port 47180 ... |
2020-06-12 04:39:46 |
| 178.62.214.85 | attackspambots | $f2bV_matches |
2020-06-12 04:51:17 |
| 198.100.146.67 | attack | odoo8 ... |
2020-06-12 04:53:18 |
| 192.99.244.225 | attack | 2020-06-11T21:00:53+0200 Failed SSH Authentication/Brute Force Attack.(Server 2) |
2020-06-12 04:33:28 |
| 5.43.39.2 | attackbotsspam | Honeypot attack, port: 445, PTR: 2.39.43.5.rev.vodafone.pt. |
2020-06-12 04:37:49 |
| 222.186.42.136 | attackbotsspam | 2020-06-11T23:56:54.354067lavrinenko.info sshd[22974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136 user=root 2020-06-11T23:56:55.887357lavrinenko.info sshd[22974]: Failed password for root from 222.186.42.136 port 58858 ssh2 2020-06-11T23:56:54.354067lavrinenko.info sshd[22974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136 user=root 2020-06-11T23:56:55.887357lavrinenko.info sshd[22974]: Failed password for root from 222.186.42.136 port 58858 ssh2 2020-06-11T23:56:58.449320lavrinenko.info sshd[22974]: Failed password for root from 222.186.42.136 port 58858 ssh2 ... |
2020-06-12 04:57:47 |
| 85.107.51.95 | attack | 20/6/11@16:39:48: FAIL: Alarm-Intrusion address from=85.107.51.95 ... |
2020-06-12 05:04:28 |
| 171.224.178.173 | attackbots | Honeypot attack, port: 445, PTR: dynamic-adsl.viettel.vn. |
2020-06-12 04:29:45 |
| 34.69.154.217 | attackbots | Jun 10 13:26:09 nbi-636 sshd[434]: Invalid user adolpho from 34.69.154.217 port 59354 Jun 10 13:26:09 nbi-636 sshd[434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.154.217 Jun 10 13:26:11 nbi-636 sshd[434]: Failed password for invalid user adolpho from 34.69.154.217 port 59354 ssh2 Jun 10 13:26:12 nbi-636 sshd[434]: Received disconnect from 34.69.154.217 port 59354:11: Bye Bye [preauth] Jun 10 13:26:12 nbi-636 sshd[434]: Disconnected from invalid user adolpho 34.69.154.217 port 59354 [preauth] Jun 10 13:34:54 nbi-636 sshd[2551]: Invalid user aa from 34.69.154.217 port 59872 Jun 10 13:34:54 nbi-636 sshd[2551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.69.154.217 Jun 10 13:34:57 nbi-636 sshd[2551]: Failed password for invalid user aa from 34.69.154.217 port 59872 ssh2 Jun 10 13:34:57 nbi-636 sshd[2551]: Received disconnect from 34.69.154.217 port 59872:11: Bye Bye [preaut........ ------------------------------- |
2020-06-12 05:02:40 |
| 148.70.178.70 | attackspambots | (sshd) Failed SSH login from 148.70.178.70 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 11 20:31:01 s1 sshd[22363]: Invalid user support from 148.70.178.70 port 37954 Jun 11 20:31:03 s1 sshd[22363]: Failed password for invalid user support from 148.70.178.70 port 37954 ssh2 Jun 11 20:40:19 s1 sshd[22565]: Invalid user miguel2 from 148.70.178.70 port 44698 Jun 11 20:40:21 s1 sshd[22565]: Failed password for invalid user miguel2 from 148.70.178.70 port 44698 ssh2 Jun 11 20:44:21 s1 sshd[22646]: Invalid user ts2 from 148.70.178.70 port 55772 |
2020-06-12 04:44:14 |
| 61.143.152.3 | attack | 1433/tcp [2020-06-11]1pkt |
2020-06-12 05:00:09 |
| 49.233.105.94 | attackspambots | firewall-block, port(s): 6379/tcp |
2020-06-12 04:46:50 |
| 78.186.209.190 | attack | Port probing on unauthorized port 23 |
2020-06-12 04:38:50 |
| 122.116.253.56 | attackspam | 81/tcp [2020-06-04/11]2pkt |
2020-06-12 05:00:29 |
| 222.186.175.182 | attackspambots | Failed password for invalid user from 222.186.175.182 port 8702 ssh2 |
2020-06-12 05:05:27 |