城市(city): Bakersfield
省份(region): California
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.55.112.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51995
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.55.112.5. IN A
;; AUTHORITY SECTION:
. 280 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022110600 1800 900 604800 86400
;; Query time: 152 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 06 22:55:35 CST 2022
;; MSG SIZE rcvd: 105
5.112.55.104.in-addr.arpa domain name pointer 104-55-112-5.lightspeed.bkfdca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
5.112.55.104.in-addr.arpa name = 104-55-112-5.lightspeed.bkfdca.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 207.246.117.162 | attackspam | Lines containing failures of 207.246.117.162 (max 1000) May 3 14:12:53 srv postfix/submission/smtpd[38225]: warning: hostname 207.246.117.162.vultr.com does not resolve to address 207.246.117.162 May 3 14:12:53 srv postfix/submission/smtpd[38225]: connect from unknown[207.246.117.162] May 3 14:12:53 srv postfix/smtps/smtpd[38224]: warning: hostname 207.246.117.162.vultr.com does not resolve to address 207.246.117.162 May 3 14:12:53 srv postfix/smtps/smtpd[38224]: connect from unknown[207.246.117.162] May 3 14:12:53 srv postfix/submission/smtpd[38225]: lost connection after CONNECT from unknown[207.246.117.162] May 3 14:12:53 srv postfix/submission/smtpd[38225]: disconnect from unknown[207.246.117.162] commands=0/0 May 3 14:12:59 srv postfix/smtps/smtpd[38224]: SSL_accept error from unknown[207.246.117.162]: -1 May 3 14:12:59 srv postfix/smtps/smtpd[38224]: lost connection after CONNECT from unknown[207.246.117.162] May 3 14:12:59 srv postfix/smtps/smtpd[38224]: ........ ------------------------------ |
2020-05-03 22:21:31 |
| 141.98.80.204 | attackspambots | 05/03/2020-09:35:17.150336 141.98.80.204 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-03 22:48:00 |
| 122.51.134.52 | attackbotsspam | May 3 14:08:52 inter-technics sshd[3921]: Invalid user darryl from 122.51.134.52 port 43338 May 3 14:08:52 inter-technics sshd[3921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.134.52 May 3 14:08:52 inter-technics sshd[3921]: Invalid user darryl from 122.51.134.52 port 43338 May 3 14:08:54 inter-technics sshd[3921]: Failed password for invalid user darryl from 122.51.134.52 port 43338 ssh2 May 3 14:13:08 inter-technics sshd[4949]: Invalid user yoshi from 122.51.134.52 port 39396 ... |
2020-05-03 22:38:28 |
| 142.93.109.76 | attack | Brute-force attempt banned |
2020-05-03 22:08:19 |
| 2.229.4.181 | attack | 2020-05-03T08:31:23.918575sorsha.thespaminator.com sshd[6512]: Invalid user admin from 2.229.4.181 port 52428 2020-05-03T08:31:26.081089sorsha.thespaminator.com sshd[6512]: Failed password for invalid user admin from 2.229.4.181 port 52428 ssh2 ... |
2020-05-03 22:36:16 |
| 124.206.0.236 | attackspambots | 5x Failed Password |
2020-05-03 22:34:37 |
| 218.92.0.200 | attackspam | May 3 16:15:33 pve1 sshd[21210]: Failed password for root from 218.92.0.200 port 41430 ssh2 May 3 16:15:36 pve1 sshd[21210]: Failed password for root from 218.92.0.200 port 41430 ssh2 ... |
2020-05-03 22:27:34 |
| 179.232.31.36 | attack | [portscan] Port scan |
2020-05-03 22:36:51 |
| 182.182.120.186 | attack | Brute forcing RDP port 3389 |
2020-05-03 22:18:03 |
| 103.123.8.75 | attack | May 3 15:54:34 ns381471 sshd[8551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.75 May 3 15:54:37 ns381471 sshd[8551]: Failed password for invalid user ashwin from 103.123.8.75 port 36596 ssh2 |
2020-05-03 22:40:50 |
| 115.84.92.137 | attackspam | failed_logins |
2020-05-03 22:31:13 |
| 190.113.142.197 | attackspambots | May 3 20:15:29 webhost01 sshd[30491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.113.142.197 May 3 20:15:32 webhost01 sshd[30491]: Failed password for invalid user hik from 190.113.142.197 port 42936 ssh2 ... |
2020-05-03 22:42:01 |
| 167.71.207.168 | attackspam | May 3 14:29:22 haigwepa sshd[27195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.207.168 May 3 14:29:25 haigwepa sshd[27195]: Failed password for invalid user aarushi from 167.71.207.168 port 57304 ssh2 ... |
2020-05-03 22:08:01 |
| 45.58.125.72 | attackbots | SIPVicious Scanner Detection |
2020-05-03 22:33:03 |
| 188.166.251.156 | attackspambots | (sshd) Failed SSH login from 188.166.251.156 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 3 14:01:08 amsweb01 sshd[9661]: Invalid user user from 188.166.251.156 port 35214 May 3 14:01:10 amsweb01 sshd[9661]: Failed password for invalid user user from 188.166.251.156 port 35214 ssh2 May 3 14:09:25 amsweb01 sshd[10458]: Invalid user akbar from 188.166.251.156 port 33276 May 3 14:09:27 amsweb01 sshd[10458]: Failed password for invalid user akbar from 188.166.251.156 port 33276 ssh2 May 3 14:13:59 amsweb01 sshd[11004]: Invalid user mailman from 188.166.251.156 port 43046 |
2020-05-03 22:05:46 |