城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.139.109.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;39.139.109.206. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 00:30:01 CST 2025
;; MSG SIZE rcvd: 107
Host 206.109.139.39.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 206.109.139.39.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
51.77.109.98 | attackspam | Invalid user pi from 51.77.109.98 port 44696 |
2020-01-19 21:44:44 |
192.99.245.147 | attackbots | Jan 19 15:07:03 dedicated sshd[13434]: Invalid user warren from 192.99.245.147 port 34522 |
2020-01-19 22:15:38 |
68.116.41.6 | attack | Unauthorized connection attempt detected from IP address 68.116.41.6 to port 2220 [J] |
2020-01-19 21:42:50 |
49.234.68.13 | attackspam | Invalid user polycom from 49.234.68.13 port 59980 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.68.13 Failed password for invalid user polycom from 49.234.68.13 port 59980 ssh2 Invalid user user from 49.234.68.13 port 59380 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.68.13 |
2020-01-19 22:06:24 |
87.81.169.74 | attackbotsspam | Jan 19 14:25:45 mail sshd[5746]: Invalid user carlos from 87.81.169.74 Jan 19 14:25:45 mail sshd[5746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.81.169.74 Jan 19 14:25:45 mail sshd[5746]: Invalid user carlos from 87.81.169.74 Jan 19 14:25:46 mail sshd[5746]: Failed password for invalid user carlos from 87.81.169.74 port 47766 ssh2 Jan 19 14:26:36 mail sshd[5868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.81.169.74 user=debian-spamd Jan 19 14:26:38 mail sshd[5868]: Failed password for debian-spamd from 87.81.169.74 port 58708 ssh2 ... |
2020-01-19 21:40:51 |
106.12.49.118 | attackbotsspam | Invalid user meneses from 106.12.49.118 port 49916 |
2020-01-19 21:38:41 |
54.37.233.192 | attackbotsspam | Invalid user adi from 54.37.233.192 port 51700 |
2020-01-19 21:43:51 |
104.250.34.33 | attack | Unauthorized connection attempt detected from IP address 104.250.34.33 to port 22 [J] |
2020-01-19 21:55:11 |
147.139.5.31 | attackbots | Unauthorized connection attempt detected from IP address 147.139.5.31 to port 2220 [J] |
2020-01-19 21:51:40 |
101.255.52.171 | attackbots | Invalid user hjw from 101.255.52.171 port 43664 |
2020-01-19 21:39:47 |
138.68.4.198 | attack | Unauthorized connection attempt detected from IP address 138.68.4.198 to port 2220 [J] |
2020-01-19 21:52:54 |
144.34.253.93 | attackbots | Failed password for root from 144.34.253.93 port 42354 ssh2 Invalid user admin from 144.34.253.93 port 59068 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.253.93 Failed password for invalid user admin from 144.34.253.93 port 59068 ssh2 Invalid user admin from 144.34.253.93 port 47548 |
2020-01-19 22:01:11 |
120.132.116.86 | attackbots | Invalid user ubuntu from 120.132.116.86 port 56606 |
2020-01-19 21:53:49 |
171.4.228.188 | attack | Jan 19 12:58:39 work-partkepr sshd\[31779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.4.228.188 user=root Jan 19 12:58:40 work-partkepr sshd\[31779\]: Failed password for root from 171.4.228.188 port 7079 ssh2 ... |
2020-01-19 22:10:43 |
81.95.226.55 | attackbots | Automatic report - SSH Brute-Force Attack |
2020-01-19 22:12:08 |