城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 215.214.239.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;215.214.239.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:30:26 CST 2025
;; MSG SIZE rcvd: 106
b'Host 1.239.214.215.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 215.214.239.1.in-addr.arpa: SERVFAIL
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 58.57.15.29 | attackbots | Jun 30 12:18:37 srv-ubuntu-dev3 sshd[90654]: Invalid user ftptest from 58.57.15.29 Jun 30 12:18:37 srv-ubuntu-dev3 sshd[90654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.15.29 Jun 30 12:18:37 srv-ubuntu-dev3 sshd[90654]: Invalid user ftptest from 58.57.15.29 Jun 30 12:18:38 srv-ubuntu-dev3 sshd[90654]: Failed password for invalid user ftptest from 58.57.15.29 port 58018 ssh2 Jun 30 12:21:15 srv-ubuntu-dev3 sshd[91096]: Invalid user tarcisio from 58.57.15.29 Jun 30 12:21:15 srv-ubuntu-dev3 sshd[91096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.15.29 Jun 30 12:21:15 srv-ubuntu-dev3 sshd[91096]: Invalid user tarcisio from 58.57.15.29 Jun 30 12:21:17 srv-ubuntu-dev3 sshd[91096]: Failed password for invalid user tarcisio from 58.57.15.29 port 7257 ssh2 Jun 30 12:23:43 srv-ubuntu-dev3 sshd[91468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57 ... |
2020-06-30 20:22:00 |
| 222.72.137.109 | attackbotsspam | $f2bV_matches |
2020-06-30 20:19:14 |
| 190.5.228.74 | attackspam | Jun 30 14:21:25 vserver sshd\[20592\]: Invalid user billy from 190.5.228.74Jun 30 14:21:27 vserver sshd\[20592\]: Failed password for invalid user billy from 190.5.228.74 port 54295 ssh2Jun 30 14:25:12 vserver sshd\[20631\]: Invalid user linjk from 190.5.228.74Jun 30 14:25:14 vserver sshd\[20631\]: Failed password for invalid user linjk from 190.5.228.74 port 40673 ssh2 ... |
2020-06-30 20:34:39 |
| 138.197.213.233 | attack | $f2bV_matches |
2020-06-30 20:37:23 |
| 49.146.45.102 | attackbotsspam | 1593519906 - 06/30/2020 14:25:06 Host: 49.146.45.102/49.146.45.102 Port: 445 TCP Blocked |
2020-06-30 20:48:30 |
| 106.12.174.227 | attackspam | $f2bV_matches |
2020-06-30 20:08:56 |
| 111.230.210.78 | attackbots | SSH invalid-user multiple login try |
2020-06-30 20:52:10 |
| 139.59.69.76 | attackspam | Jun 30 14:16:52 minden010 sshd[15296]: Failed password for root from 139.59.69.76 port 34174 ssh2 Jun 30 14:21:03 minden010 sshd[16719]: Failed password for root from 139.59.69.76 port 60618 ssh2 ... |
2020-06-30 20:46:17 |
| 68.183.227.196 | attackspambots | Jun 30 13:22:05 gestao sshd[30536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.196 Jun 30 13:22:07 gestao sshd[30536]: Failed password for invalid user hoang from 68.183.227.196 port 40708 ssh2 Jun 30 13:25:17 gestao sshd[30605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.227.196 ... |
2020-06-30 20:31:37 |
| 200.73.240.238 | attackbots | Jun 30 19:11:14 itv-usvr-02 sshd[8780]: Invalid user djones from 200.73.240.238 port 57834 Jun 30 19:11:14 itv-usvr-02 sshd[8780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.240.238 Jun 30 19:11:14 itv-usvr-02 sshd[8780]: Invalid user djones from 200.73.240.238 port 57834 Jun 30 19:11:16 itv-usvr-02 sshd[8780]: Failed password for invalid user djones from 200.73.240.238 port 57834 ssh2 Jun 30 19:15:41 itv-usvr-02 sshd[8940]: Invalid user bcx from 200.73.240.238 port 57072 |
2020-06-30 20:26:06 |
| 180.241.46.214 | attackbots | Jun 30 03:47:45 scw-focused-cartwright sshd[13501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.241.46.214 Jun 30 03:47:46 scw-focused-cartwright sshd[13501]: Failed password for invalid user supervisor from 180.241.46.214 port 12321 ssh2 |
2020-06-30 20:21:15 |
| 113.160.132.24 | attackspambots | Jun 30 04:47:53 ms-srv sshd[62405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.160.132.24 Jun 30 04:47:56 ms-srv sshd[62405]: Failed password for invalid user tech from 113.160.132.24 port 53342 ssh2 |
2020-06-30 20:11:12 |
| 103.98.176.188 | attack | 2020-06-30T12:53:35.631859n23.at sshd[1879196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.176.188 2020-06-30T12:53:35.623777n23.at sshd[1879196]: Invalid user lyx from 103.98.176.188 port 41676 2020-06-30T12:53:37.761628n23.at sshd[1879196]: Failed password for invalid user lyx from 103.98.176.188 port 41676 ssh2 ... |
2020-06-30 20:22:29 |
| 192.241.229.231 | attackspambots | *Port Scan* detected from 192.241.229.231 (US/United States/California/San Francisco/zg-0626-180.stretchoid.com). 4 hits in the last 180 seconds |
2020-06-30 20:34:04 |
| 142.93.104.32 | attack | Jun 30 08:32:39 hell sshd[1978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.104.32 Jun 30 08:32:41 hell sshd[1978]: Failed password for invalid user usertest from 142.93.104.32 port 34712 ssh2 ... |
2020-06-30 20:16:04 |