城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.50.125.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.50.125.227.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 11:49:33 CST 2025
;; MSG SIZE  rcvd: 107227.125.50.104.in-addr.arpa domain name pointer 104-50-125-227.lightspeed.irvnca.sbcglobal.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
227.125.50.104.in-addr.arpa	name = 104-50-125-227.lightspeed.irvnca.sbcglobal.net.
Authoritative answers can be found from:| IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 124.156.41.20 | attack | ICMP MH Probe, Scan /Distributed - | 2020-05-26 20:49:24 | 
| 129.211.146.50 | attackbotsspam | May 26 10:35:34 abendstille sshd\[6880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.146.50 user=root May 26 10:35:35 abendstille sshd\[6880\]: Failed password for root from 129.211.146.50 port 56038 ssh2 May 26 10:40:28 abendstille sshd\[11949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.146.50 user=root May 26 10:40:29 abendstille sshd\[11949\]: Failed password for root from 129.211.146.50 port 54772 ssh2 May 26 10:45:28 abendstille sshd\[17059\]: Invalid user test from 129.211.146.50 ... | 2020-05-26 20:57:47 | 
| 167.99.7.149 | attackbots | firewall-block, port(s): 34/tcp | 2020-05-26 20:17:51 | 
| 117.245.137.170 | attackbotsspam | Unauthorized connection attempt from IP address 117.245.137.170 on Port 445(SMB) | 2020-05-26 20:24:58 | 
| 113.163.216.186 | attackbots | May 26 09:00:09 Invalid user colleen from 113.163.216.186 port 16132 | 2020-05-26 20:43:44 | 
| 92.46.25.222 | attack | Telnet/23 MH Probe, Scan, BF, Hack - | 2020-05-26 20:27:14 | 
| 177.128.234.78 | attackbots | Invalid user lolly from 177.128.234.78 port 39184 | 2020-05-26 20:29:18 | 
| 186.215.197.15 | attackspambots | (imapd) Failed IMAP login from 186.215.197.15 (BR/Brazil/projelmec.static.gvt.net.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 26 11:59:47 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user= | 2020-05-26 20:54:52 | 
| 110.35.2.11 | attackbots | firewall-block, port(s): 23/tcp | 2020-05-26 20:37:19 | 
| 1.161.209.175 | attack | Telnet/23 MH Probe, Scan, BF, Hack - | 2020-05-26 20:41:19 | 
| 139.59.77.240 | attack | May 26 00:03:42 host2 sshd[25721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.240 user=r.r May 26 00:03:45 host2 sshd[25721]: Failed password for r.r from 139.59.77.240 port 57682 ssh2 May 26 00:03:45 host2 sshd[25721]: Received disconnect from 139.59.77.240: 11: Bye Bye [preauth] May 26 00:11:13 host2 sshd[22335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.240 user=r.r May 26 00:11:15 host2 sshd[22335]: Failed password for r.r from 139.59.77.240 port 58296 ssh2 May 26 00:11:16 host2 sshd[22335]: Received disconnect from 139.59.77.240: 11: Bye Bye [preauth] May 26 00:15:00 host2 sshd[2672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.77.240 user=r.r May 26 00:15:02 host2 sshd[2672]: Failed password for r.r from 139.59.77.240 port 41836 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=139.59.77 | 2020-05-26 20:36:47 | 
| 117.221.51.119 | attackbotsspam | Unauthorized connection attempt from IP address 117.221.51.119 on Port 445(SMB) | 2020-05-26 20:26:47 | 
| 220.127.148.8 | attack | May 26 12:25:35 ns382633 sshd\[12419\]: Invalid user admin from 220.127.148.8 port 45874 May 26 12:25:35 ns382633 sshd\[12419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.127.148.8 May 26 12:25:37 ns382633 sshd\[12419\]: Failed password for invalid user admin from 220.127.148.8 port 45874 ssh2 May 26 12:39:41 ns382633 sshd\[14735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.127.148.8 user=root May 26 12:39:43 ns382633 sshd\[14735\]: Failed password for root from 220.127.148.8 port 45762 ssh2 | 2020-05-26 20:52:17 | 
| 110.137.216.217 | attack | 1590478202 - 05/26/2020 09:30:02 Host: 110.137.216.217/110.137.216.217 Port: 445 TCP Blocked | 2020-05-26 20:39:39 | 
| 88.20.216.90 | attack | SSH/22 MH Probe, BF, Hack - | 2020-05-26 20:44:51 |