城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.12.78.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.12.78.194.			IN	A
;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:46:38 CST 2022
;; MSG SIZE  rcvd: 106
        194.78.12.107.in-addr.arpa domain name pointer mta-107-12-78-194.ec.rr.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
194.78.12.107.in-addr.arpa	name = mta-107-12-78-194.ec.rr.com.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 41.155.203.100 | attackspambots | Fail2Ban Ban Triggered  | 
                    2020-01-23 14:59:02 | 
| 107.155.81.121 | attackbots | Invalid user admin from 107.155.81.121 port 50550  | 
                    2020-01-23 14:05:50 | 
| 218.92.0.200 | attack | Jan 23 07:23:29 legacy sshd[6063]: Failed password for root from 218.92.0.200 port 25648 ssh2 Jan 23 07:24:11 legacy sshd[6077]: Failed password for root from 218.92.0.200 port 64864 ssh2 ...  | 
                    2020-01-23 14:25:46 | 
| 159.203.73.181 | attackspambots | Invalid user jenny from 159.203.73.181 port 51747  | 
                    2020-01-23 14:53:35 | 
| 79.124.78.78 | attack | $f2bV_matches  | 
                    2020-01-23 14:26:38 | 
| 177.137.150.100 | attackbots | Jan 22 20:08:10 server sshd\[31620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.infoeng.com.br user=root Jan 22 20:08:12 server sshd\[31620\]: Failed password for root from 177.137.150.100 port 50092 ssh2 Jan 22 20:14:47 server sshd\[722\]: Invalid user samir from 177.137.150.100 Jan 22 20:14:47 server sshd\[722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.infoeng.com.br Jan 22 20:14:49 server sshd\[722\]: Failed password for invalid user samir from 177.137.150.100 port 54624 ssh2 ...  | 
                    2020-01-23 14:27:54 | 
| 117.50.49.57 | attackbotsspam | Jan 23 05:39:02 ovpn sshd\[24331\]: Invalid user scan from 117.50.49.57 Jan 23 05:39:02 ovpn sshd\[24331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.49.57 Jan 23 05:39:04 ovpn sshd\[24331\]: Failed password for invalid user scan from 117.50.49.57 port 33892 ssh2 Jan 23 05:40:47 ovpn sshd\[24835\]: Invalid user ashley from 117.50.49.57 Jan 23 05:40:47 ovpn sshd\[24835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.49.57  | 
                    2020-01-23 15:01:42 | 
| 201.242.157.151 | attackspambots | 1579713284 - 01/22/2020 18:14:44 Host: 201.242.157.151/201.242.157.151 Port: 445 TCP Blocked  | 
                    2020-01-23 14:28:59 | 
| 35.246.120.81 | attack | Jan 23 08:16:59 pkdns2 sshd\[6372\]: Invalid user vnc from 35.246.120.81Jan 23 08:17:01 pkdns2 sshd\[6372\]: Failed password for invalid user vnc from 35.246.120.81 port 58188 ssh2Jan 23 08:19:34 pkdns2 sshd\[6510\]: Invalid user testftp from 35.246.120.81Jan 23 08:19:36 pkdns2 sshd\[6510\]: Failed password for invalid user testftp from 35.246.120.81 port 56950 ssh2Jan 23 08:22:11 pkdns2 sshd\[6670\]: Invalid user freedom from 35.246.120.81Jan 23 08:22:13 pkdns2 sshd\[6670\]: Failed password for invalid user freedom from 35.246.120.81 port 55706 ssh2 ...  | 
                    2020-01-23 14:50:22 | 
| 106.12.176.17 | attackbotsspam | Jan 19 05:16:34 163-172-32-151 sshd[29511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.17 Jan 19 05:16:34 163-172-32-151 sshd[29511]: Invalid user hadoop from 106.12.176.17 port 58154 Jan 19 05:16:36 163-172-32-151 sshd[29511]: Failed password for invalid user hadoop from 106.12.176.17 port 58154 ssh2 ...  | 
                    2020-01-23 14:14:31 | 
| 165.22.109.173 | attackbotsspam | Unauthorized connection attempt detected from IP address 165.22.109.173 to port 2220 [J]  | 
                    2020-01-23 14:49:10 | 
| 185.176.27.90 | attackspambots | firewall-block, port(s): 7710/tcp, 40810/tcp  | 
                    2020-01-23 15:07:14 | 
| 221.235.184.78 | attack | Unauthorized connection attempt detected from IP address 221.235.184.78 to port 3390 [J]  | 
                    2020-01-23 14:57:56 | 
| 64.225.65.214 | attack | SSH/22 MH Probe, BF, Hack -  | 
                    2020-01-23 14:17:56 | 
| 170.130.187.2 | attackspambots | Port scan denied  | 
                    2020-01-23 14:11:34 |