城市(city): unknown
省份(region): unknown
国家(country): United Kingdom of Great Britain and Northern Ireland (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 86.16.139.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53542
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;86.16.139.116. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:59:57 CST 2025
;; MSG SIZE rcvd: 106
116.139.16.86.in-addr.arpa domain name pointer cpc79921-stkp12-2-0-cust371.10-2.cable.virginm.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
116.139.16.86.in-addr.arpa name = cpc79921-stkp12-2-0-cust371.10-2.cable.virginm.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 179.235.240.189 | attack | rdp brute-force attack |
2019-10-02 16:22:34 |
| 222.186.175.154 | attack | Oct 2 10:38:17 root sshd[29010]: Failed password for root from 222.186.175.154 port 51574 ssh2 Oct 2 10:38:21 root sshd[29010]: Failed password for root from 222.186.175.154 port 51574 ssh2 Oct 2 10:38:26 root sshd[29010]: Failed password for root from 222.186.175.154 port 51574 ssh2 Oct 2 10:38:33 root sshd[29010]: Failed password for root from 222.186.175.154 port 51574 ssh2 ... |
2019-10-02 16:42:03 |
| 173.208.200.154 | attackbotsspam | 20 attempts against mh-misbehave-ban on ice.magehost.pro |
2019-10-02 16:38:53 |
| 148.70.201.162 | attackspambots | Oct 2 09:51:18 SilenceServices sshd[19768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.201.162 Oct 2 09:51:20 SilenceServices sshd[19768]: Failed password for invalid user rotartsinimdA from 148.70.201.162 port 35600 ssh2 Oct 2 09:56:30 SilenceServices sshd[21244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.201.162 |
2019-10-02 16:16:13 |
| 218.249.24.98 | attackbotsspam | Brute force attempt |
2019-10-02 16:26:30 |
| 221.122.67.66 | attackspambots | Oct 1 19:04:17 php1 sshd\[12923\]: Invalid user user from 221.122.67.66 Oct 1 19:04:17 php1 sshd\[12923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66 Oct 1 19:04:19 php1 sshd\[12923\]: Failed password for invalid user user from 221.122.67.66 port 47816 ssh2 Oct 1 19:10:02 php1 sshd\[14270\]: Invalid user kp from 221.122.67.66 Oct 1 19:10:02 php1 sshd\[14270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.122.67.66 |
2019-10-02 16:37:19 |
| 13.59.186.123 | attack | Oct 2 11:01:44 tuotantolaitos sshd[10869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.59.186.123 Oct 2 11:01:46 tuotantolaitos sshd[10869]: Failed password for invalid user 87654321 from 13.59.186.123 port 37488 ssh2 ... |
2019-10-02 16:30:57 |
| 112.175.232.155 | attackspam | SSH Bruteforce |
2019-10-02 16:15:25 |
| 77.81.230.143 | attackspam | Oct 2 05:04:13 localhost sshd\[9640\]: Invalid user cheryl from 77.81.230.143 port 52914 Oct 2 05:04:13 localhost sshd\[9640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.81.230.143 Oct 2 05:04:15 localhost sshd\[9640\]: Failed password for invalid user cheryl from 77.81.230.143 port 52914 ssh2 ... |
2019-10-02 16:21:07 |
| 5.9.141.8 | attackbots | 20 attempts against mh-misbehave-ban on pluto.magehost.pro |
2019-10-02 16:22:15 |
| 176.27.8.105 | attackspam | Automatic report - Port Scan Attack |
2019-10-02 16:51:38 |
| 164.132.57.16 | attackbotsspam | Oct 2 02:56:27 ny01 sshd[18651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16 Oct 2 02:56:29 ny01 sshd[18651]: Failed password for invalid user stack from 164.132.57.16 port 43486 ssh2 Oct 2 03:00:21 ny01 sshd[19482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16 |
2019-10-02 16:43:40 |
| 77.247.110.222 | attackspambots | 10/02/2019-10:12:41.298305 77.247.110.222 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 75 |
2019-10-02 16:31:37 |
| 212.147.15.213 | attackspambots | Invalid user oliver from 212.147.15.213 port 28485 |
2019-10-02 16:33:54 |
| 106.13.93.161 | attackbots | Oct 2 10:04:53 vps01 sshd[9904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.161 Oct 2 10:04:56 vps01 sshd[9904]: Failed password for invalid user demo from 106.13.93.161 port 39032 ssh2 |
2019-10-02 16:26:10 |