城市(city): unknown
省份(region): unknown
国家(country): Japan
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.41.82.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.41.82.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 16:37:04 CST 2025
;; MSG SIZE rcvd: 106
139.82.41.219.in-addr.arpa domain name pointer softbank219041082139.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.82.41.219.in-addr.arpa name = softbank219041082139.bbtec.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 171.113.38.67 | attackbots |
|
2020-06-28 15:17:26 |
| 176.126.175.6 | attackbotsspam | 8000/tcp [2020-06-28]1pkt |
2020-06-28 15:34:19 |
| 91.126.98.41 | attackbots | Jun 28 12:32:14 dhoomketu sshd[1102717]: Failed password for root from 91.126.98.41 port 43148 ssh2 Jun 28 12:36:17 dhoomketu sshd[1102790]: Invalid user sandeep from 91.126.98.41 port 42126 Jun 28 12:36:17 dhoomketu sshd[1102790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.126.98.41 Jun 28 12:36:17 dhoomketu sshd[1102790]: Invalid user sandeep from 91.126.98.41 port 42126 Jun 28 12:36:19 dhoomketu sshd[1102790]: Failed password for invalid user sandeep from 91.126.98.41 port 42126 ssh2 ... |
2020-06-28 15:13:10 |
| 124.207.221.66 | attackspambots | Jun 28 09:23:26 Ubuntu-1404-trusty-64-minimal sshd\[11567\]: Invalid user manage from 124.207.221.66 Jun 28 09:23:26 Ubuntu-1404-trusty-64-minimal sshd\[11567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.221.66 Jun 28 09:23:28 Ubuntu-1404-trusty-64-minimal sshd\[11567\]: Failed password for invalid user manage from 124.207.221.66 port 53140 ssh2 Jun 28 09:28:15 Ubuntu-1404-trusty-64-minimal sshd\[14058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.221.66 user=root Jun 28 09:28:17 Ubuntu-1404-trusty-64-minimal sshd\[14058\]: Failed password for root from 124.207.221.66 port 46058 ssh2 |
2020-06-28 15:53:35 |
| 23.94.28.5 | attack | (From barbaratysonhw@yahoo.com) Hi, We'd like to introduce to you our explainer video service which we feel can benefit your site minorchiropractic.com. Check out some of our existing videos here: https://www.youtube.com/watch?v=oYoUQjxvhA0 https://www.youtube.com/watch?v=MOnhn77TgDE https://www.youtube.com/watch?v=NKY4a3hvmUc All of our videos are in a similar animated format as the above examples and we have voice over artists with US/UK/Australian accents. They can show a solution to a problem or simply promote one of your products or services. They are concise, can be uploaded to video such as Youtube, and can be embedded into your website or featured on landing pages. Our prices are as follows depending on video length: 0-1 minutes = $259 1-2 minutes = $369 2-3 minutes = $479 3-4 minutes = $589 *All prices above are in USD and include a custom video, full script and a voice-over. If this is something you would like to discuss further, don't hesitate to get in touch. If you ar |
2020-06-28 15:52:16 |
| 46.38.150.132 | attackspambots | 2020-06-27 21:48:22 dovecot_login authenticator failed for \(User\) \[46.38.150.132\]: 535 Incorrect authentication data \(set_id=babylon@no-server.de\) 2020-06-27 21:48:41 dovecot_login authenticator failed for \(User\) \[46.38.150.132\]: 535 Incorrect authentication data \(set_id=gpfd@no-server.de\) 2020-06-27 21:48:42 dovecot_login authenticator failed for \(User\) \[46.38.150.132\]: 535 Incorrect authentication data \(set_id=gpfd@no-server.de\) 2020-06-27 21:48:48 dovecot_login authenticator failed for \(User\) \[46.38.150.132\]: 535 Incorrect authentication data \(set_id=gpfd@no-server.de\) 2020-06-27 21:49:04 dovecot_login authenticator failed for \(User\) \[46.38.150.132\]: 535 Incorrect authentication data \(set_id=gpfd@no-server.de\) ... |
2020-06-28 15:14:35 |
| 185.143.73.103 | attackbots | 2020-06-27 23:12:07 dovecot_login authenticator failed for \(User\) \[185.143.73.103\]: 535 Incorrect authentication data \(set_id=collegeville@no-server.de\) 2020-06-27 23:12:12 dovecot_login authenticator failed for \(User\) \[185.143.73.103\]: 535 Incorrect authentication data \(set_id=collegeville@no-server.de\) 2020-06-27 23:12:18 dovecot_login authenticator failed for \(User\) \[185.143.73.103\]: 535 Incorrect authentication data \(set_id=collegeville@no-server.de\) 2020-06-27 23:12:35 dovecot_login authenticator failed for \(User\) \[185.143.73.103\]: 535 Incorrect authentication data \(set_id=bmwf@no-server.de\) 2020-06-27 23:12:54 dovecot_login authenticator failed for \(User\) \[185.143.73.103\]: 535 Incorrect authentication data \(set_id=bmwf@no-server.de\) 2020-06-27 23:13:01 dovecot_login authenticator failed for \(User\) \[185.143.73.103\]: 535 Incorrect authentication data \(set_id=bmwf@no-server.de\) 2020-06-27 23:13:08 dovecot_login authenticator failed for \(User\) \[ ... |
2020-06-28 15:49:01 |
| 218.92.0.250 | attackbots | Jun 28 04:35:07 vps46666688 sshd[19996]: Failed password for root from 218.92.0.250 port 62205 ssh2 Jun 28 04:35:20 vps46666688 sshd[19996]: error: maximum authentication attempts exceeded for root from 218.92.0.250 port 62205 ssh2 [preauth] ... |
2020-06-28 15:43:01 |
| 123.58.5.243 | attackbots | 2020-06-28T01:39:13.477361morrigan.ad5gb.com sshd[1691237]: Invalid user ubuntu from 123.58.5.243 port 55503 2020-06-28T01:39:15.303997morrigan.ad5gb.com sshd[1691237]: Failed password for invalid user ubuntu from 123.58.5.243 port 55503 ssh2 |
2020-06-28 15:30:43 |
| 2.119.3.137 | attackbots | Jun 28 07:05:13 rush sshd[5161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.119.3.137 Jun 28 07:05:15 rush sshd[5161]: Failed password for invalid user deploy from 2.119.3.137 port 55530 ssh2 Jun 28 07:06:55 rush sshd[5256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.119.3.137 ... |
2020-06-28 15:15:00 |
| 111.72.197.244 | attack | Jun 28 06:50:59 srv01 postfix/smtpd\[21912\]: warning: unknown\[111.72.197.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 28 06:51:12 srv01 postfix/smtpd\[21912\]: warning: unknown\[111.72.197.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 28 06:51:28 srv01 postfix/smtpd\[21912\]: warning: unknown\[111.72.197.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 28 06:51:48 srv01 postfix/smtpd\[21912\]: warning: unknown\[111.72.197.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 28 06:51:59 srv01 postfix/smtpd\[21912\]: warning: unknown\[111.72.197.244\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-06-28 15:46:55 |
| 40.71.33.88 | attack | (sshd) Failed SSH login from 40.71.33.88 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 28 08:07:38 amsweb01 sshd[6116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.33.88 user=root Jun 28 08:07:39 amsweb01 sshd[6116]: Failed password for root from 40.71.33.88 port 10418 ssh2 Jun 28 08:48:36 amsweb01 sshd[14014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.33.88 user=root Jun 28 08:48:36 amsweb01 sshd[14016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.33.88 user=root Jun 28 08:48:38 amsweb01 sshd[14014]: Failed password for root from 40.71.33.88 port 64186 ssh2 |
2020-06-28 15:37:48 |
| 139.59.161.78 | attackspambots | 2020-06-28T06:09:25.460692abusebot-6.cloudsearch.cf sshd[4139]: Invalid user dev from 139.59.161.78 port 16681 2020-06-28T06:09:25.466281abusebot-6.cloudsearch.cf sshd[4139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78 2020-06-28T06:09:25.460692abusebot-6.cloudsearch.cf sshd[4139]: Invalid user dev from 139.59.161.78 port 16681 2020-06-28T06:09:27.498240abusebot-6.cloudsearch.cf sshd[4139]: Failed password for invalid user dev from 139.59.161.78 port 16681 ssh2 2020-06-28T06:10:32.046460abusebot-6.cloudsearch.cf sshd[4143]: Invalid user nasa from 139.59.161.78 port 32881 2020-06-28T06:10:32.052502abusebot-6.cloudsearch.cf sshd[4143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78 2020-06-28T06:10:32.046460abusebot-6.cloudsearch.cf sshd[4143]: Invalid user nasa from 139.59.161.78 port 32881 2020-06-28T06:10:34.616324abusebot-6.cloudsearch.cf sshd[4143]: Failed password for in ... |
2020-06-28 15:32:05 |
| 51.140.64.37 | attack | $f2bV_matches | Triggered by Fail2Ban at Vostok web server |
2020-06-28 15:31:37 |
| 180.241.225.242 | attackbots | 1593316383 - 06/28/2020 05:53:03 Host: 180.241.225.242/180.241.225.242 Port: 445 TCP Blocked |
2020-06-28 15:29:51 |