城市(city): Philadelphia
省份(region): Pennsylvania
国家(country): United States
运营商(isp): Verizon
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.1.52.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.1.52.139. IN A
;; AUTHORITY SECTION:
. 582 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020033102 1800 900 604800 86400
;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 07:11:26 CST 2020
;; MSG SIZE rcvd: 116
Host 139.52.1.216.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.52.1.216.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
34.237.4.125 | attackspam | Invalid user umountsys from 34.237.4.125 port 46290 |
2019-09-28 16:04:17 |
159.203.201.23 | attackbots | port scan/probe/communication attempt |
2019-09-28 16:04:00 |
142.4.204.122 | attackbots | Sep 28 07:07:23 www2 sshd\[27551\]: Invalid user oracle from 142.4.204.122Sep 28 07:07:25 www2 sshd\[27551\]: Failed password for invalid user oracle from 142.4.204.122 port 38761 ssh2Sep 28 07:11:21 www2 sshd\[28044\]: Invalid user zw from 142.4.204.122 ... |
2019-09-28 15:56:52 |
46.148.192.41 | attackbotsspam | Sep 28 09:21:59 areeb-Workstation sshd[17182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.148.192.41 Sep 28 09:22:01 areeb-Workstation sshd[17182]: Failed password for invalid user ftp from 46.148.192.41 port 46012 ssh2 ... |
2019-09-28 15:49:23 |
59.3.71.222 | attackbotsspam | Invalid user at from 59.3.71.222 port 56234 |
2019-09-28 15:38:44 |
185.216.140.43 | attackbots | Blocked for port scanning. Time: Sat Sep 28. 04:34:35 2019 +0200 IP: 185.216.140.43 (NL/Netherlands/-) Sample of block hits: Sep 28 04:30:19 vserv kernel: [803141.813341] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=185.216.140.43 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=25115 PROTO=TCP SPT=52306 DPT=8095 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 28 04:30:44 vserv kernel: [803166.673570] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=185.216.140.43 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=12160 PROTO=TCP SPT=52306 DPT=9994 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 28 04:31:20 vserv kernel: [803202.887431] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=185.216.140.43 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=14527 PROTO=TCP SPT=52306 DPT=7000 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 28 04:31:38 vserv kernel: [803221.316894] Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC= SRC=185.216.140.43 DST=[removed] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=36769 PROTO=TCP SPT=52306 DPT=8022 .... |
2019-09-28 15:42:01 |
218.28.28.190 | attackbotsspam | Sep 28 07:59:00 www sshd\[63282\]: Invalid user oracle from 218.28.28.190Sep 28 07:59:03 www sshd\[63282\]: Failed password for invalid user oracle from 218.28.28.190 port 55002 ssh2Sep 28 08:02:50 www sshd\[63409\]: Invalid user wi from 218.28.28.190 ... |
2019-09-28 16:05:29 |
183.131.82.99 | attack | Sep 28 10:10:52 jane sshd[5974]: Failed password for root from 183.131.82.99 port 38424 ssh2 Sep 28 10:10:54 jane sshd[5974]: Failed password for root from 183.131.82.99 port 38424 ssh2 ... |
2019-09-28 16:11:58 |
164.77.188.109 | attackspambots | Sep 27 22:10:01 lcdev sshd\[3534\]: Invalid user user from 164.77.188.109 Sep 27 22:10:01 lcdev sshd\[3534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.188.109 Sep 27 22:10:02 lcdev sshd\[3534\]: Failed password for invalid user user from 164.77.188.109 port 34672 ssh2 Sep 27 22:15:05 lcdev sshd\[3959\]: Invalid user conciergerie from 164.77.188.109 Sep 27 22:15:05 lcdev sshd\[3959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.188.109 |
2019-09-28 16:21:03 |
37.139.4.138 | attackbots | Sep 28 09:13:05 lnxded63 sshd[20508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.4.138 |
2019-09-28 15:43:01 |
106.12.6.74 | attackbotsspam | Sep 28 09:12:12 pornomens sshd\[9882\]: Invalid user desmond from 106.12.6.74 port 41070 Sep 28 09:12:12 pornomens sshd\[9882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.6.74 Sep 28 09:12:14 pornomens sshd\[9882\]: Failed password for invalid user desmond from 106.12.6.74 port 41070 ssh2 ... |
2019-09-28 15:46:36 |
117.93.105.75 | attack | (Sep 28) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=61165 TCP DPT=8080 WINDOW=56748 SYN (Sep 27) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=49114 TCP DPT=8080 WINDOW=40897 SYN (Sep 27) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=18715 TCP DPT=8080 WINDOW=40897 SYN (Sep 27) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=13774 TCP DPT=8080 WINDOW=9274 SYN (Sep 27) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=51243 TCP DPT=8080 WINDOW=502 SYN (Sep 26) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=1517 TCP DPT=8080 WINDOW=20807 SYN (Sep 26) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=64159 TCP DPT=8080 WINDOW=20807 SYN (Sep 26) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=45528 TCP DPT=8080 WINDOW=56748 SYN (Sep 26) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=59689 TCP DPT=8080 WINDOW=20807 SYN (Sep 25) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=52375 TCP DPT=8080 WINDOW=40897 SYN (Sep 24) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=45596 TCP DPT=8080 WINDOW=28066 SYN (Sep 24) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=22981 TCP DPT=8080 WINDOW=28066 S... |
2019-09-28 16:19:31 |
41.87.72.102 | attackbots | Fail2Ban Ban Triggered |
2019-09-28 16:15:37 |
94.154.18.59 | attack | email spam |
2019-09-28 16:03:25 |
106.12.215.125 | attackspambots | Sep 28 09:15:14 tux-35-217 sshd\[6151\]: Invalid user clouderauser from 106.12.215.125 port 44446 Sep 28 09:15:14 tux-35-217 sshd\[6151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.125 Sep 28 09:15:16 tux-35-217 sshd\[6151\]: Failed password for invalid user clouderauser from 106.12.215.125 port 44446 ssh2 Sep 28 09:20:28 tux-35-217 sshd\[6185\]: Invalid user squid from 106.12.215.125 port 50654 Sep 28 09:20:28 tux-35-217 sshd\[6185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.125 ... |
2019-09-28 16:01:09 |