城市(city): Albuquerque
省份(region): New Mexico
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 209.189.131.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;209.189.131.139. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024121800 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 18 20:28:58 CST 2024
;; MSG SIZE rcvd: 108
139.131.189.209.in-addr.arpa domain name pointer host.aps.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.131.189.209.in-addr.arpa name = host.aps.edu.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.92.113.84 | attack | Aug 27 23:08:52 melroy-server sshd[3081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.92.113.84 Aug 27 23:08:55 melroy-server sshd[3081]: Failed password for invalid user ian from 80.92.113.84 port 37310 ssh2 ... |
2020-08-28 05:28:19 |
| 90.183.74.194 | attackspambots | Aug 27 16:08:59 mailman postfix/smtpd[9072]: warning: unknown[90.183.74.194]: SASL PLAIN authentication failed: authentication failure |
2020-08-28 05:24:55 |
| 192.141.94.117 | attackbots | Port Scan ... |
2020-08-28 05:25:45 |
| 191.222.196.231 | attack | Unauthorised access (Aug 28) SRC=191.222.196.231 LEN=60 TTL=105 ID=13844 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-28 05:37:34 |
| 85.209.0.103 | attack | Aug 27 23:09:33 dcd-gentoo sshd[6632]: User root from 85.209.0.103 not allowed because none of user's groups are listed in AllowGroups Aug 27 23:09:33 dcd-gentoo sshd[6634]: User root from 85.209.0.103 not allowed because none of user's groups are listed in AllowGroups Aug 27 23:09:33 dcd-gentoo sshd[6636]: User root from 85.209.0.103 not allowed because none of user's groups are listed in AllowGroups ... |
2020-08-28 05:25:23 |
| 45.154.35.251 | attackbots | Aug 27 23:08:44 ns41 sshd[30732]: Failed password for sshd from 45.154.35.251 port 55056 ssh2 Aug 27 23:08:46 ns41 sshd[30732]: Failed password for sshd from 45.154.35.251 port 55056 ssh2 Aug 27 23:08:48 ns41 sshd[30732]: Failed password for sshd from 45.154.35.251 port 55056 ssh2 Aug 27 23:08:50 ns41 sshd[30732]: Failed password for sshd from 45.154.35.251 port 55056 ssh2 |
2020-08-28 05:35:07 |
| 218.92.0.250 | attackbotsspam | Aug 28 02:24:35 gw1 sshd[31286]: Failed password for root from 218.92.0.250 port 25127 ssh2 Aug 28 02:24:45 gw1 sshd[31286]: Failed password for root from 218.92.0.250 port 25127 ssh2 ... |
2020-08-28 05:33:53 |
| 200.73.131.100 | attack | 2020-08-28T00:24:41.229018mail.standpoint.com.ua sshd[12507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.131.100 2020-08-28T00:24:41.225809mail.standpoint.com.ua sshd[12507]: Invalid user marcel from 200.73.131.100 port 47578 2020-08-28T00:24:43.517325mail.standpoint.com.ua sshd[12507]: Failed password for invalid user marcel from 200.73.131.100 port 47578 ssh2 2020-08-28T00:29:05.055332mail.standpoint.com.ua sshd[13084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.131.100 user=root 2020-08-28T00:29:06.917149mail.standpoint.com.ua sshd[13084]: Failed password for root from 200.73.131.100 port 55814 ssh2 ... |
2020-08-28 05:31:44 |
| 110.43.50.229 | attack | SSH Invalid Login |
2020-08-28 05:47:08 |
| 123.7.110.121 | attack | Brute force hacking attempts |
2020-08-28 05:27:53 |
| 119.254.7.114 | attack | SSH Invalid Login |
2020-08-28 05:49:26 |
| 77.47.130.58 | attack | fail2ban |
2020-08-28 05:33:10 |
| 180.171.79.128 | attackspam | Invalid user git from 180.171.79.128 port 64799 |
2020-08-28 05:32:49 |
| 188.166.246.6 | attackspambots | Aug 27 17:03:20 george sshd[4386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.246.6 Aug 27 17:03:21 george sshd[4386]: Failed password for invalid user t from 188.166.246.6 port 60217 ssh2 Aug 27 17:08:40 george sshd[4421]: Invalid user serverpilot from 188.166.246.6 port 36929 Aug 27 17:08:40 george sshd[4421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.246.6 Aug 27 17:08:43 george sshd[4421]: Failed password for invalid user serverpilot from 188.166.246.6 port 36929 ssh2 ... |
2020-08-28 05:42:37 |
| 104.198.16.231 | attackbots | Aug 27 22:56:08 ns382633 sshd\[15667\]: Invalid user naveen from 104.198.16.231 port 58820 Aug 27 22:56:08 ns382633 sshd\[15667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.198.16.231 Aug 27 22:56:09 ns382633 sshd\[15667\]: Failed password for invalid user naveen from 104.198.16.231 port 58820 ssh2 Aug 27 23:09:10 ns382633 sshd\[17670\]: Invalid user marcio from 104.198.16.231 port 34608 Aug 27 23:09:10 ns382633 sshd\[17670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.198.16.231 |
2020-08-28 05:14:48 |