城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.70.157.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.70.157.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:14:10 CST 2025
;; MSG SIZE rcvd: 107
242.157.70.108.in-addr.arpa domain name pointer 108-70-157-242.lightspeed.irvnca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.157.70.108.in-addr.arpa name = 108-70-157-242.lightspeed.irvnca.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 132.232.29.131 | attackbots | Jun 10 05:54:25 vps647732 sshd[15155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.29.131 Jun 10 05:54:27 vps647732 sshd[15155]: Failed password for invalid user avid from 132.232.29.131 port 56816 ssh2 ... |
2020-06-10 13:06:20 |
| 36.111.184.80 | attack | Tried sshing with brute force. |
2020-06-10 13:31:29 |
| 92.118.160.5 | attack | Port scan denied |
2020-06-10 13:33:46 |
| 176.65.241.26 | attack | Jun 10 05:21:41 gestao sshd[22149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.65.241.26 Jun 10 05:21:43 gestao sshd[22149]: Failed password for invalid user user from 176.65.241.26 port 42844 ssh2 Jun 10 05:25:55 gestao sshd[22268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.65.241.26 ... |
2020-06-10 13:14:50 |
| 118.24.160.242 | attack | Jun 10 05:54:00 nextcloud sshd\[2904\]: Invalid user xavierj from 118.24.160.242 Jun 10 05:54:00 nextcloud sshd\[2904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.160.242 Jun 10 05:54:02 nextcloud sshd\[2904\]: Failed password for invalid user xavierj from 118.24.160.242 port 51156 ssh2 |
2020-06-10 13:30:46 |
| 201.122.102.21 | attackspam | (sshd) Failed SSH login from 201.122.102.21 (MX/Mexico/dsl-201-122-102-21-sta.prod-empresarial.com.mx): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 10 06:30:29 ubnt-55d23 sshd[2671]: Invalid user oracle from 201.122.102.21 port 58470 Jun 10 06:30:30 ubnt-55d23 sshd[2671]: Failed password for invalid user oracle from 201.122.102.21 port 58470 ssh2 |
2020-06-10 13:10:51 |
| 60.12.221.84 | attackbotsspam | Jun 10 07:03:01 pkdns2 sshd\[64508\]: Failed password for root from 60.12.221.84 port 34776 ssh2Jun 10 07:06:03 pkdns2 sshd\[64663\]: Invalid user admin from 60.12.221.84Jun 10 07:06:05 pkdns2 sshd\[64663\]: Failed password for invalid user admin from 60.12.221.84 port 51960 ssh2Jun 10 07:09:05 pkdns2 sshd\[64798\]: Failed password for root from 60.12.221.84 port 40932 ssh2Jun 10 07:12:02 pkdns2 sshd\[64989\]: Invalid user zxy from 60.12.221.84Jun 10 07:12:03 pkdns2 sshd\[64989\]: Failed password for invalid user zxy from 60.12.221.84 port 58110 ssh2 ... |
2020-06-10 13:29:04 |
| 222.186.175.150 | attackbots | Jun 10 06:57:00 minden010 sshd[31065]: Failed password for root from 222.186.175.150 port 5266 ssh2 Jun 10 06:57:13 minden010 sshd[31065]: Failed password for root from 222.186.175.150 port 5266 ssh2 Jun 10 06:57:13 minden010 sshd[31065]: error: maximum authentication attempts exceeded for root from 222.186.175.150 port 5266 ssh2 [preauth] ... |
2020-06-10 13:08:40 |
| 159.203.63.125 | attackspambots | Jun 10 11:55:22 webhost01 sshd[30734]: Failed password for root from 159.203.63.125 port 52960 ssh2 ... |
2020-06-10 13:11:04 |
| 212.64.68.71 | attackbotsspam | Jun 9 19:15:40 hanapaa sshd\[26100\]: Invalid user monitor from 212.64.68.71 Jun 9 19:15:40 hanapaa sshd\[26100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.68.71 Jun 9 19:15:42 hanapaa sshd\[26100\]: Failed password for invalid user monitor from 212.64.68.71 port 42544 ssh2 Jun 9 19:19:47 hanapaa sshd\[26450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.68.71 user=root Jun 9 19:19:50 hanapaa sshd\[26450\]: Failed password for root from 212.64.68.71 port 38308 ssh2 |
2020-06-10 13:27:42 |
| 178.128.168.87 | attackspam | SSH login attempts. |
2020-06-10 13:23:08 |
| 223.71.7.251 | attackbotsspam | Jun 10 07:56:02 lukav-desktop sshd\[29386\]: Invalid user www from 223.71.7.251 Jun 10 07:56:02 lukav-desktop sshd\[29386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.7.251 Jun 10 07:56:04 lukav-desktop sshd\[29386\]: Failed password for invalid user www from 223.71.7.251 port 52348 ssh2 Jun 10 07:57:58 lukav-desktop sshd\[29437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.7.251 user=backup Jun 10 07:58:00 lukav-desktop sshd\[29437\]: Failed password for backup from 223.71.7.251 port 42372 ssh2 |
2020-06-10 13:28:07 |
| 3.136.22.172 | attack | $f2bV_matches |
2020-06-10 13:35:49 |
| 106.37.72.121 | attack | Jun 10 04:56:42 scw-6657dc sshd[9362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.72.121 Jun 10 04:56:42 scw-6657dc sshd[9362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.37.72.121 Jun 10 04:56:44 scw-6657dc sshd[9362]: Failed password for invalid user debian from 106.37.72.121 port 55639 ssh2 ... |
2020-06-10 13:38:51 |
| 142.93.226.18 | attackspambots | SSH bruteforce |
2020-06-10 13:15:14 |