城市(city): Las Vegas
省份(region): Nevada
国家(country): United States
运营商(isp): RTC Communications LLC
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.49.139.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;71.49.139.27. IN A
;; AUTHORITY SECTION:
. 368 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023011002 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 11 08:13:31 CST 2023
;; MSG SIZE rcvd: 105
27.139.49.71.in-addr.arpa domain name pointer 71-49-139-27.lsv2.centurylink.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
27.139.49.71.in-addr.arpa name = 71-49-139-27.lsv2.centurylink.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.198.176.82 | attackbotsspam | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-06-17 07:01:25 |
| 84.47.37.113 | attack | Honeypot attack, port: 445, PTR: adsl-d113.84-47-37.t-com.sk. |
2020-06-17 06:52:07 |
| 139.198.190.182 | attack | Jun 17 00:23:17 vps sshd[37832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.190.182 user=root Jun 17 00:23:19 vps sshd[37832]: Failed password for root from 139.198.190.182 port 56419 ssh2 Jun 17 00:26:15 vps sshd[52403]: Invalid user zhangweiyi from 139.198.190.182 port 51164 Jun 17 00:26:15 vps sshd[52403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.190.182 Jun 17 00:26:16 vps sshd[52403]: Failed password for invalid user zhangweiyi from 139.198.190.182 port 51164 ssh2 ... |
2020-06-17 06:46:20 |
| 200.122.249.203 | attackbots | Invalid user elizabeth1 from 200.122.249.203 port 43607 |
2020-06-17 06:50:33 |
| 49.113.245.19 | attack | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-06-17 06:50:11 |
| 82.203.157.247 | attackbots | WordPress brute force |
2020-06-17 07:13:26 |
| 103.252.196.150 | attackspambots | 2020-06-16T15:42:49.869265server.mjenks.net sshd[1159425]: Failed password for root from 103.252.196.150 port 46524 ssh2 2020-06-16T15:46:17.828082server.mjenks.net sshd[1159894]: Invalid user roland from 103.252.196.150 port 47522 2020-06-16T15:46:17.835339server.mjenks.net sshd[1159894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.252.196.150 2020-06-16T15:46:17.828082server.mjenks.net sshd[1159894]: Invalid user roland from 103.252.196.150 port 47522 2020-06-16T15:46:20.328830server.mjenks.net sshd[1159894]: Failed password for invalid user roland from 103.252.196.150 port 47522 ssh2 ... |
2020-06-17 06:58:45 |
| 123.206.17.3 | attack | Jun 17 00:58:43 ift sshd\[31274\]: Failed password for root from 123.206.17.3 port 41864 ssh2Jun 17 01:01:27 ift sshd\[32012\]: Invalid user connect from 123.206.17.3Jun 17 01:01:29 ift sshd\[32012\]: Failed password for invalid user connect from 123.206.17.3 port 45634 ssh2Jun 17 01:04:14 ift sshd\[32422\]: Failed password for root from 123.206.17.3 port 49402 ssh2Jun 17 01:06:57 ift sshd\[33070\]: Failed password for root from 123.206.17.3 port 53172 ssh2 ... |
2020-06-17 06:54:52 |
| 109.89.146.206 | attackbotsspam | Invalid user libuuid from 109.89.146.206 port 47388 |
2020-06-17 06:49:30 |
| 194.26.29.250 | attackbotsspam | Multiport scan : 80 ports scanned 25041 25115 25180 25231 25233 25286 25345 25404 25414 25459 25490 25539 25624 25692 25703 25779 25786 25810 25830 25866 25877 25914 25921 25942 25973 25996 26029 26067 26223 26249 26449 26460 26560 26598 26657 26669 26707 26777 26825 27058 27273 27631 27821 27824 27902 27909 27938 27997 28001 28018 28176 28214 28233 28271 28287 28313 28384 28412 28443 28453 28527 28565 28603 28627 28736 28776 28786 ..... |
2020-06-17 07:16:34 |
| 186.122.148.216 | attackspambots | Jun 16 22:35:04 ns382633 sshd\[29982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.148.216 user=root Jun 16 22:35:06 ns382633 sshd\[29982\]: Failed password for root from 186.122.148.216 port 49760 ssh2 Jun 16 22:46:03 ns382633 sshd\[32167\]: Invalid user hca from 186.122.148.216 port 54644 Jun 16 22:46:03 ns382633 sshd\[32167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.148.216 Jun 16 22:46:04 ns382633 sshd\[32167\]: Failed password for invalid user hca from 186.122.148.216 port 54644 ssh2 |
2020-06-17 07:16:47 |
| 67.211.143.1 | attackbotsspam | Honeypot attack, port: 81, PTR: 67-211-143-1.unassigned.ntelos.net. |
2020-06-17 07:03:36 |
| 149.202.164.82 | attackspam | 2020-06-17T01:00:12.737287afi-git.jinr.ru sshd[7159]: Invalid user flask from 149.202.164.82 port 47428 2020-06-17T01:00:12.740861afi-git.jinr.ru sshd[7159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 2020-06-17T01:00:12.737287afi-git.jinr.ru sshd[7159]: Invalid user flask from 149.202.164.82 port 47428 2020-06-17T01:00:15.419447afi-git.jinr.ru sshd[7159]: Failed password for invalid user flask from 149.202.164.82 port 47428 ssh2 2020-06-17T01:03:38.982784afi-git.jinr.ru sshd[7952]: Invalid user remote from 149.202.164.82 port 46980 ... |
2020-06-17 07:19:54 |
| 112.85.42.172 | attack | Jun 17 01:05:45 eventyay sshd[11312]: Failed password for root from 112.85.42.172 port 19444 ssh2 Jun 17 01:05:48 eventyay sshd[11312]: Failed password for root from 112.85.42.172 port 19444 ssh2 Jun 17 01:05:51 eventyay sshd[11312]: Failed password for root from 112.85.42.172 port 19444 ssh2 Jun 17 01:05:55 eventyay sshd[11312]: Failed password for root from 112.85.42.172 port 19444 ssh2 ... |
2020-06-17 07:10:44 |
| 218.92.0.133 | attack | Jun 17 01:38:46 ift sshd\[38383\]: Failed password for root from 218.92.0.133 port 18610 ssh2Jun 17 01:38:57 ift sshd\[38383\]: Failed password for root from 218.92.0.133 port 18610 ssh2Jun 17 01:39:00 ift sshd\[38383\]: Failed password for root from 218.92.0.133 port 18610 ssh2Jun 17 01:39:07 ift sshd\[38469\]: Failed password for root from 218.92.0.133 port 54803 ssh2Jun 17 01:39:09 ift sshd\[38469\]: Failed password for root from 218.92.0.133 port 54803 ssh2 ... |
2020-06-17 06:42:45 |