城市(city): unknown
省份(region): unknown
国家(country): Czech Republic
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.113.117.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7140
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.113.117.140. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019080401 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 05 05:48:00 CST 2019
;; MSG SIZE rcvd: 118
140.117.113.94.in-addr.arpa domain name pointer ip-94-113-117-140.net.upcbroadband.cz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.117.113.94.in-addr.arpa name = ip-94-113-117-140.net.upcbroadband.cz.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 112.217.225.59 | attackspam | Nov 9 13:59:35 server sshd\[2861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.225.59 user=root Nov 9 13:59:37 server sshd\[2861\]: Failed password for root from 112.217.225.59 port 55492 ssh2 Nov 9 14:19:53 server sshd\[8056\]: Invalid user akanuma from 112.217.225.59 Nov 9 14:19:53 server sshd\[8056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.217.225.59 Nov 9 14:19:56 server sshd\[8056\]: Failed password for invalid user akanuma from 112.217.225.59 port 63702 ssh2 ... |
2019-11-09 22:54:45 |
| 202.98.213.218 | attack | Nov 9 15:04:19 MK-Soft-Root2 sshd[27198]: Failed password for root from 202.98.213.218 port 27508 ssh2 ... |
2019-11-09 22:46:18 |
| 193.70.42.33 | attack | Nov 9 14:57:38 venus sshd\[6808\]: Invalid user password from 193.70.42.33 port 41154 Nov 9 14:57:38 venus sshd\[6808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.42.33 Nov 9 14:57:40 venus sshd\[6808\]: Failed password for invalid user password from 193.70.42.33 port 41154 ssh2 ... |
2019-11-09 23:04:19 |
| 163.172.207.104 | attackspambots | \[2019-11-09 08:31:48\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T08:31:48.366-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="2011972592277524",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/57599",ACLName="no_extension_match" \[2019-11-09 08:37:05\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T08:37:05.651-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="1011972592277524",SessionID="0x7fdf2caef968",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/57056",ACLName="no_extension_match" \[2019-11-09 08:38:12\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T08:38:12.724-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972595725636",SessionID="0x7fdf2caef968",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/51556",ACLName |
2019-11-09 22:29:12 |
| 45.136.110.48 | attackbotsspam | Nov 9 14:00:07 h2177944 kernel: \[6179994.437514\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.48 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=24091 PROTO=TCP SPT=50518 DPT=9128 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 9 14:02:03 h2177944 kernel: \[6180110.152984\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.48 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=41595 PROTO=TCP SPT=50518 DPT=8339 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 9 14:17:06 h2177944 kernel: \[6181012.849596\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.48 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=26527 PROTO=TCP SPT=50518 DPT=9321 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 9 14:23:37 h2177944 kernel: \[6181404.125895\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.48 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=16727 PROTO=TCP SPT=50518 DPT=9063 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 9 14:46:40 h2177944 kernel: \[6182786.252186\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.48 DST=85.214.117.9 |
2019-11-09 22:39:34 |
| 187.188.251.219 | attackspam | Nov 9 15:54:38 MK-Soft-VM6 sshd[32057]: Failed password for root from 187.188.251.219 port 34072 ssh2 Nov 9 15:59:14 MK-Soft-VM6 sshd[32066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.251.219 ... |
2019-11-09 23:01:47 |
| 91.121.114.69 | attackbots | 2019-11-09T10:16:34.367874scmdmz1 sshd\[29664\]: Invalid user temp from 91.121.114.69 port 40270 2019-11-09T10:16:34.370557scmdmz1 sshd\[29664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=webserver.filixme.fr 2019-11-09T10:16:36.709629scmdmz1 sshd\[29664\]: Failed password for invalid user temp from 91.121.114.69 port 40270 ssh2 ... |
2019-11-09 22:50:26 |
| 106.12.86.240 | attack | Nov 9 10:28:27 firewall sshd[9728]: Invalid user testuser from 106.12.86.240 Nov 9 10:28:29 firewall sshd[9728]: Failed password for invalid user testuser from 106.12.86.240 port 50502 ssh2 Nov 9 10:34:22 firewall sshd[9832]: Invalid user clucarel from 106.12.86.240 ... |
2019-11-09 22:33:00 |
| 77.40.2.88 | attackspambots | Chat Spam |
2019-11-09 22:55:52 |
| 222.186.175.202 | attackbots | Nov 9 15:57:38 MK-Soft-VM7 sshd[25336]: Failed password for root from 222.186.175.202 port 56184 ssh2 Nov 9 15:57:43 MK-Soft-VM7 sshd[25336]: Failed password for root from 222.186.175.202 port 56184 ssh2 ... |
2019-11-09 23:02:12 |
| 176.31.182.117 | attackbots | Joomla Admin : try to force the door... |
2019-11-09 22:40:39 |
| 121.137.106.165 | attackspambots | Nov 9 15:52:53 nextcloud sshd\[12650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.137.106.165 user=root Nov 9 15:52:55 nextcloud sshd\[12650\]: Failed password for root from 121.137.106.165 port 53130 ssh2 Nov 9 15:57:44 nextcloud sshd\[20253\]: Invalid user cristino from 121.137.106.165 Nov 9 15:57:44 nextcloud sshd\[20253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.137.106.165 ... |
2019-11-09 23:00:54 |
| 116.75.191.208 | attackspambots | Nov 9 07:17:13 |
2019-11-09 22:25:07 |
| 192.111.135.210 | attackbots | Automatic report - XMLRPC Attack |
2019-11-09 22:44:55 |
| 120.92.35.127 | attackspam | $f2bV_matches |
2019-11-09 22:51:40 |