城市(city): unknown
省份(region): unknown
国家(country): Germany
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.78.139.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9256
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.78.139.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:26:02 CST 2025
;; MSG SIZE rcvd: 105
134.139.78.3.in-addr.arpa domain name pointer ec2-3-78-139-134.eu-central-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.139.78.3.in-addr.arpa name = ec2-3-78-139-134.eu-central-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 80.82.77.33 | attackspambots | TARGET: /.well-known/security.txt |
2019-11-28 02:46:04 |
| 122.160.167.110 | attack | Automatic report - Port Scan Attack |
2019-11-28 02:15:45 |
| 5.182.39.53 | attackbotsspam | Connection by 5.182.39.53 on port: 3408 got caught by honeypot at 11/27/2019 5:07:09 PM |
2019-11-28 02:49:58 |
| 122.144.131.93 | attackbotsspam | Nov 27 16:29:14 vps666546 sshd\[7413\]: Invalid user tansek from 122.144.131.93 port 25481 Nov 27 16:29:14 vps666546 sshd\[7413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.131.93 Nov 27 16:29:16 vps666546 sshd\[7413\]: Failed password for invalid user tansek from 122.144.131.93 port 25481 ssh2 Nov 27 16:34:32 vps666546 sshd\[7584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.131.93 user=root Nov 27 16:34:34 vps666546 sshd\[7584\]: Failed password for root from 122.144.131.93 port 30392 ssh2 ... |
2019-11-28 02:22:07 |
| 51.89.28.247 | attackbots | Nov 26 04:02:39 carla sshd[5860]: Invalid user teste from 51.89.28.247 Nov 26 04:02:40 carla sshd[5860]: Failed password for invalid user teste from 51.89.28.247 port 37162 ssh2 Nov 26 04:02:40 carla sshd[5861]: Received disconnect from 51.89.28.247: 11: Bye Bye Nov 26 04:46:20 carla sshd[6216]: Failed password for r.r from 51.89.28.247 port 52028 ssh2 Nov 26 04:46:20 carla sshd[6217]: Received disconnect from 51.89.28.247: 11: Bye Bye Nov 26 04:52:52 carla sshd[6268]: Invalid user hamlet from 51.89.28.247 Nov 26 04:52:54 carla sshd[6268]: Failed password for invalid user hamlet from 51.89.28.247 port 59442 ssh2 Nov 26 04:52:54 carla sshd[6269]: Received disconnect from 51.89.28.247: 11: Bye Bye Nov 26 04:59:26 carla sshd[6346]: Invalid user dinet from 51.89.28.247 Nov 26 04:59:28 carla sshd[6346]: Failed password for invalid user dinet from 51.89.28.247 port 38624 ssh2 Nov 26 04:59:28 carla sshd[6347]: Received disconnect from 51.89.28.247: 11: Bye Bye Nov 26 05:07:12 ........ ------------------------------- |
2019-11-28 02:29:21 |
| 222.186.175.182 | attackspam | Nov 27 19:45:44 ns381471 sshd[27911]: Failed password for root from 222.186.175.182 port 58102 ssh2 Nov 27 19:45:57 ns381471 sshd[27911]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 58102 ssh2 [preauth] |
2019-11-28 02:53:46 |
| 222.186.169.192 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root Failed password for root from 222.186.169.192 port 6306 ssh2 Failed password for root from 222.186.169.192 port 6306 ssh2 Failed password for root from 222.186.169.192 port 6306 ssh2 Failed password for root from 222.186.169.192 port 6306 ssh2 |
2019-11-28 02:43:02 |
| 185.176.27.254 | attackbotsspam | 11/27/2019-13:32:08.307740 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-28 02:34:09 |
| 140.143.249.246 | attack | Nov 27 08:02:28 tdfoods sshd\[21234\]: Invalid user shamansky from 140.143.249.246 Nov 27 08:02:28 tdfoods sshd\[21234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.246 Nov 27 08:02:29 tdfoods sshd\[21234\]: Failed password for invalid user shamansky from 140.143.249.246 port 35756 ssh2 Nov 27 08:05:54 tdfoods sshd\[21508\]: Invalid user fiskvatn from 140.143.249.246 Nov 27 08:05:54 tdfoods sshd\[21508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.246 |
2019-11-28 02:23:45 |
| 222.186.175.147 | attackspambots | Nov 27 18:07:17 localhost sshd\[50534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147 user=root Nov 27 18:07:19 localhost sshd\[50534\]: Failed password for root from 222.186.175.147 port 23366 ssh2 Nov 27 18:07:23 localhost sshd\[50534\]: Failed password for root from 222.186.175.147 port 23366 ssh2 Nov 27 18:07:26 localhost sshd\[50534\]: Failed password for root from 222.186.175.147 port 23366 ssh2 Nov 27 18:07:29 localhost sshd\[50534\]: Failed password for root from 222.186.175.147 port 23366 ssh2 ... |
2019-11-28 02:17:06 |
| 195.33.236.190 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-28 02:39:58 |
| 148.70.106.148 | attackbots | Nov 25 06:49:45 nexus sshd[12897]: Invalid user valma from 148.70.106.148 port 51328 Nov 25 06:49:45 nexus sshd[12897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.106.148 Nov 25 06:49:47 nexus sshd[12897]: Failed password for invalid user valma from 148.70.106.148 port 51328 ssh2 Nov 25 06:49:47 nexus sshd[12897]: Received disconnect from 148.70.106.148 port 51328:11: Bye Bye [preauth] Nov 25 06:49:47 nexus sshd[12897]: Disconnected from 148.70.106.148 port 51328 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=148.70.106.148 |
2019-11-28 02:27:29 |
| 101.173.104.93 | attackspam | UTC: 2019-11-26 port: 26/tcp |
2019-11-28 02:42:36 |
| 196.52.43.100 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-11-28 02:21:47 |
| 111.118.36.160 | attackspam | UTC: 2019-11-26 port: 123/udp |
2019-11-28 02:48:26 |