城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.139.47.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.139.47.185. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011100 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 20:37:16 CST 2025
;; MSG SIZE rcvd: 107
185.47.139.216.in-addr.arpa domain name pointer mandego.ne.garlic.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
185.47.139.216.in-addr.arpa name = mandego.ne.garlic.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 91.200.100.19 | attackspambots | Apr 13 05:48:09 ns382633 sshd\[28241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.200.100.19 user=root Apr 13 05:48:10 ns382633 sshd\[28241\]: Failed password for root from 91.200.100.19 port 60336 ssh2 Apr 13 05:56:48 ns382633 sshd\[30043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.200.100.19 user=root Apr 13 05:56:50 ns382633 sshd\[30043\]: Failed password for root from 91.200.100.19 port 60746 ssh2 Apr 13 06:02:09 ns382633 sshd\[31252\]: Invalid user V1000@teligen\#20150315 from 91.200.100.19 port 41614 Apr 13 06:02:09 ns382633 sshd\[31252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.200.100.19 |
2020-04-13 13:27:22 |
| 185.94.111.1 | attackbotsspam | Port Scan |
2020-04-13 13:08:27 |
| 46.105.227.206 | attackbots | $f2bV_matches |
2020-04-13 13:38:11 |
| 107.191.42.45 | attackbots | Automatic report - XMLRPC Attack |
2020-04-13 13:19:45 |
| 151.48.61.152 | normal | 151.48.61.152 |
2020-04-13 13:46:39 |
| 78.128.113.74 | attackbots | Apr 13 07:28:35 vmanager6029 postfix/smtpd\[3427\]: warning: unknown\[78.128.113.74\]: SASL PLAIN authentication failed: Apr 13 07:28:54 vmanager6029 postfix/smtpd\[3427\]: warning: unknown\[78.128.113.74\]: SASL PLAIN authentication failed: |
2020-04-13 13:30:03 |
| 193.56.28.163 | attackbots | Apr 13 04:43:42 mail postfix/smtpd[39184]: warning: unknown[193.56.28.163]: SASL LOGIN authentication failed: generic failure Apr 13 04:47:11 mail postfix/smtpd[39259]: warning: unknown[193.56.28.163]: SASL LOGIN authentication failed: generic failure Apr 13 04:50:42 mail postfix/smtpd[39330]: warning: unknown[193.56.28.163]: SASL LOGIN authentication failed: generic failure ... |
2020-04-13 13:10:01 |
| 61.31.161.123 | attackbots | 1586750302 - 04/13/2020 05:58:22 Host: 61.31.161.123/61.31.161.123 Port: 445 TCP Blocked |
2020-04-13 13:23:28 |
| 111.172.6.228 | attackspam | Apr 13 01:13:41 firewall sshd[10833]: Failed password for invalid user admin2 from 111.172.6.228 port 54038 ssh2 Apr 13 01:20:21 firewall sshd[11062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.172.6.228 user=root Apr 13 01:20:23 firewall sshd[11062]: Failed password for root from 111.172.6.228 port 56794 ssh2 ... |
2020-04-13 13:08:47 |
| 49.235.158.195 | attackbotsspam | Apr 13 06:53:43 h2779839 sshd[18062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.158.195 user=root Apr 13 06:53:45 h2779839 sshd[18062]: Failed password for root from 49.235.158.195 port 40744 ssh2 Apr 13 06:56:50 h2779839 sshd[18228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.158.195 user=root Apr 13 06:56:52 h2779839 sshd[18228]: Failed password for root from 49.235.158.195 port 45844 ssh2 Apr 13 06:59:56 h2779839 sshd[18294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.158.195 user=root Apr 13 06:59:58 h2779839 sshd[18294]: Failed password for root from 49.235.158.195 port 50946 ssh2 Apr 13 07:03:05 h2779839 sshd[18430]: Invalid user sanjavier from 49.235.158.195 port 56054 Apr 13 07:03:05 h2779839 sshd[18430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.158.195 Apr 13 07:03:0 ... |
2020-04-13 13:44:53 |
| 49.234.196.215 | attackspam | $f2bV_matches |
2020-04-13 13:31:39 |
| 111.93.4.174 | attackspambots | k+ssh-bruteforce |
2020-04-13 13:14:05 |
| 222.186.42.7 | attack | Apr 13 02:12:44 firewall sshd[13045]: Failed password for root from 222.186.42.7 port 41501 ssh2 Apr 13 02:12:46 firewall sshd[13045]: Failed password for root from 222.186.42.7 port 41501 ssh2 Apr 13 02:12:49 firewall sshd[13045]: Failed password for root from 222.186.42.7 port 41501 ssh2 ... |
2020-04-13 13:16:42 |
| 222.72.47.198 | attackspambots | Apr 13 08:07:05 www sshd\[163338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.72.47.198 user=root Apr 13 08:07:07 www sshd\[163338\]: Failed password for root from 222.72.47.198 port 23137 ssh2 Apr 13 08:11:23 www sshd\[163436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.72.47.198 user=root ... |
2020-04-13 13:24:15 |
| 196.220.67.2 | attack | Apr 13 07:36:01 host01 sshd[18787]: Failed password for root from 196.220.67.2 port 34852 ssh2 Apr 13 07:41:15 host01 sshd[19849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.220.67.2 Apr 13 07:41:17 host01 sshd[19849]: Failed password for invalid user sprocket from 196.220.67.2 port 59991 ssh2 ... |
2020-04-13 13:43:27 |