城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.139.52.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8164
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;72.139.52.136. IN A
;; AUTHORITY SECTION:
. 312 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 06:38:33 CST 2022
;; MSG SIZE rcvd: 106
136.52.139.72.in-addr.arpa domain name pointer unallocated-static.rogers.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
136.52.139.72.in-addr.arpa name = unallocated-static.rogers.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 219.134.218.28 | attack | Sep 7 12:30:36 mail.srvfarm.net postfix/smtpd[1053368]: lost connection after RSET from unknown[219.134.218.28] Sep 7 12:30:46 mail.srvfarm.net postfix/smtpd[1050786]: lost connection after RSET from unknown[219.134.218.28] Sep 7 12:30:48 mail.srvfarm.net postfix/smtpd[1053367]: lost connection after RSET from unknown[219.134.218.28] Sep 7 12:30:49 mail.srvfarm.net postfix/smtpd[1053357]: lost connection after RSET from unknown[219.134.218.28] Sep 7 12:30:51 mail.srvfarm.net postfix/smtpd[1039279]: lost connection after RSET from unknown[219.134.218.28] |
2020-09-12 02:38:51 |
| 177.184.240.193 | attackspam | Sep 7 12:21:23 mail.srvfarm.net postfix/smtpd[1053448]: warning: unknown[177.184.240.193]: SASL PLAIN authentication failed: Sep 7 12:21:24 mail.srvfarm.net postfix/smtpd[1053448]: lost connection after AUTH from unknown[177.184.240.193] Sep 7 12:27:27 mail.srvfarm.net postfix/smtps/smtpd[1055414]: warning: unknown[177.184.240.193]: SASL PLAIN authentication failed: Sep 7 12:27:27 mail.srvfarm.net postfix/smtps/smtpd[1055414]: lost connection after AUTH from unknown[177.184.240.193] Sep 7 12:27:47 mail.srvfarm.net postfix/smtps/smtpd[1050812]: warning: unknown[177.184.240.193]: SASL PLAIN authentication failed: |
2020-09-12 02:41:01 |
| 113.161.79.191 | attack | Sep 11 15:31:43 sshgateway sshd\[522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.79.191 user=root Sep 11 15:31:45 sshgateway sshd\[522\]: Failed password for root from 113.161.79.191 port 54630 ssh2 Sep 11 15:35:19 sshgateway sshd\[653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.79.191 user=root Sep 11 15:35:20 sshgateway sshd\[653\]: Failed password for root from 113.161.79.191 port 52778 ssh2 Sep 11 15:37:17 sshgateway sshd\[742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.79.191 user=root Sep 11 15:37:19 sshgateway sshd\[742\]: Failed password for root from 113.161.79.191 port 58566 ssh2 Sep 11 15:39:07 sshgateway sshd\[872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.79.191 user=root Sep 11 15:39:09 sshgateway sshd\[872\]: Failed password for root from 113.161.79.191 port 361 |
2020-09-12 02:37:02 |
| 170.84.8.84 | attackbots | SMTP brute force |
2020-09-12 02:23:11 |
| 182.122.10.215 | attack | Lines containing failures of 182.122.10.215 Sep 11 07:02:49 keyhelp sshd[31257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.10.215 user=r.r Sep 11 07:02:51 keyhelp sshd[31257]: Failed password for r.r from 182.122.10.215 port 13400 ssh2 Sep 11 07:02:51 keyhelp sshd[31257]: Received disconnect from 182.122.10.215 port 13400:11: Bye Bye [preauth] Sep 11 07:02:51 keyhelp sshd[31257]: Disconnected from authenticating user r.r 182.122.10.215 port 13400 [preauth] Sep 11 07:05:16 keyhelp sshd[31868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.10.215 user=r.r Sep 11 07:05:19 keyhelp sshd[31868]: Failed password for r.r from 182.122.10.215 port 42430 ssh2 Sep 11 07:05:19 keyhelp sshd[31868]: Received disconnect from 182.122.10.215 port 42430:11: Bye Bye [preauth] Sep 11 07:05:19 keyhelp sshd[31868]: Disconnected from authenticating user r.r 182.122.10.215 port 42430 [preaut........ ------------------------------ |
2020-09-12 02:47:30 |
| 112.85.42.180 | attackspam | Sep 11 21:27:13 ift sshd\[38704\]: Failed password for root from 112.85.42.180 port 13565 ssh2Sep 11 21:27:23 ift sshd\[38704\]: Failed password for root from 112.85.42.180 port 13565 ssh2Sep 11 21:27:26 ift sshd\[38704\]: Failed password for root from 112.85.42.180 port 13565 ssh2Sep 11 21:27:33 ift sshd\[38741\]: Failed password for root from 112.85.42.180 port 43403 ssh2Sep 11 21:27:36 ift sshd\[38741\]: Failed password for root from 112.85.42.180 port 43403 ssh2 ... |
2020-09-12 02:27:44 |
| 62.176.115.154 | attackbotsspam | Unauthorized connection attempt from IP address 62.176.115.154 on Port 445(SMB) |
2020-09-12 02:37:18 |
| 5.188.86.216 | attackspambots | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-11T18:22:48Z |
2020-09-12 02:49:47 |
| 74.120.14.50 | attack | Unauthorized connection attempt detected port 8080 |
2020-09-12 02:34:52 |
| 114.67.254.244 | attack | Sep 11 12:04:31 Tower sshd[16244]: Connection from 114.67.254.244 port 59866 on 192.168.10.220 port 22 rdomain "" Sep 11 12:04:34 Tower sshd[16244]: Invalid user elastic from 114.67.254.244 port 59866 Sep 11 12:04:34 Tower sshd[16244]: error: Could not get shadow information for NOUSER Sep 11 12:04:34 Tower sshd[16244]: Failed password for invalid user elastic from 114.67.254.244 port 59866 ssh2 Sep 11 12:04:35 Tower sshd[16244]: Received disconnect from 114.67.254.244 port 59866:11: Bye Bye [preauth] Sep 11 12:04:35 Tower sshd[16244]: Disconnected from invalid user elastic 114.67.254.244 port 59866 [preauth] |
2020-09-12 02:31:20 |
| 162.142.125.26 | attackspam | firewall-block, port(s): 21/tcp |
2020-09-12 02:22:00 |
| 189.252.68.183 | attackbotsspam | Icarus honeypot on github |
2020-09-12 02:48:21 |
| 93.34.12.254 | attackbots | (sshd) Failed SSH login from 93.34.12.254 (IT/Italy/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 10 19:13:17 jbs1 sshd[27368]: Failed password for root from 93.34.12.254 port 55132 ssh2 Sep 10 19:13:19 jbs1 sshd[27368]: Failed password for root from 93.34.12.254 port 55132 ssh2 Sep 10 19:13:21 jbs1 sshd[27368]: Failed password for root from 93.34.12.254 port 55132 ssh2 Sep 10 19:13:23 jbs1 sshd[27368]: Failed password for root from 93.34.12.254 port 55132 ssh2 Sep 10 19:13:25 jbs1 sshd[27368]: Failed password for root from 93.34.12.254 port 55132 ssh2 |
2020-09-12 02:35:33 |
| 118.126.97.243 | attack |
|
2020-09-12 02:44:36 |
| 190.108.45.196 | attack | Sep 7 12:09:15 mail.srvfarm.net postfix/smtps/smtpd[1033778]: warning: unknown[190.108.45.196]: SASL PLAIN authentication failed: Sep 7 12:09:16 mail.srvfarm.net postfix/smtps/smtpd[1033778]: lost connection after AUTH from unknown[190.108.45.196] Sep 7 12:17:11 mail.srvfarm.net postfix/smtps/smtpd[1050813]: warning: unknown[190.108.45.196]: SASL PLAIN authentication failed: Sep 7 12:17:12 mail.srvfarm.net postfix/smtps/smtpd[1050813]: lost connection after AUTH from unknown[190.108.45.196] Sep 7 12:17:23 mail.srvfarm.net postfix/smtps/smtpd[1051109]: warning: unknown[190.108.45.196]: SASL PLAIN authentication failed: |
2020-09-12 02:43:17 |