城市(city): Oklahoma City
省份(region): Oklahoma
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): AT&T Services, Inc.
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.75.99.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53333
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;108.75.99.19. IN A
;; AUTHORITY SECTION:
. 3578 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019090100 1800 900 604800 86400
;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 02 01:08:37 CST 2019
;; MSG SIZE rcvd: 116
19.99.75.108.in-addr.arpa domain name pointer adsl-108-75-99-19.dsl.okcyok.sbcglobal.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
19.99.75.108.in-addr.arpa name = adsl-108-75-99-19.dsl.okcyok.sbcglobal.net.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
222.186.175.155 | attack | Dec 1 15:53:17 MK-Soft-Root1 sshd[20483]: Failed password for root from 222.186.175.155 port 33730 ssh2 Dec 1 15:53:22 MK-Soft-Root1 sshd[20483]: Failed password for root from 222.186.175.155 port 33730 ssh2 ... |
2019-12-01 23:01:32 |
188.70.42.41 | attack | Dec 1 07:19:47 cavern sshd[16170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.70.42.41 |
2019-12-01 22:39:21 |
117.92.177.78 | attack | Dec 1 01:10:51 esmtp postfix/smtpd[19294]: lost connection after AUTH from unknown[117.92.177.78] Dec 1 01:10:58 esmtp postfix/smtpd[19179]: lost connection after AUTH from unknown[117.92.177.78] Dec 1 01:11:00 esmtp postfix/smtpd[19294]: lost connection after AUTH from unknown[117.92.177.78] Dec 1 01:11:01 esmtp postfix/smtpd[19179]: lost connection after AUTH from unknown[117.92.177.78] Dec 1 01:11:05 esmtp postfix/smtpd[19294]: lost connection after AUTH from unknown[117.92.177.78] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=117.92.177.78 |
2019-12-01 22:48:55 |
171.5.241.75 | attack | Dec 1 16:45:35 www sshd\[81750\]: Invalid user administrator from 171.5.241.75 Dec 1 16:45:35 www sshd\[81750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.5.241.75 Dec 1 16:45:37 www sshd\[81750\]: Failed password for invalid user administrator from 171.5.241.75 port 8288 ssh2 ... |
2019-12-01 23:13:58 |
218.92.0.201 | attackbots | Dec 1 16:04:05 vpn01 sshd[5156]: Failed password for root from 218.92.0.201 port 52263 ssh2 ... |
2019-12-01 23:09:57 |
100.43.85.201 | attackspam | port scan and connect, tcp 443 (https) |
2019-12-01 22:39:57 |
103.80.210.112 | attackbotsspam | Unauthorized connection attempt from IP address 103.80.210.112 on Port 445(SMB) |
2019-12-01 23:06:45 |
186.212.180.28 | attackspambots | Unauthorized connection attempt from IP address 186.212.180.28 on Port 445(SMB) |
2019-12-01 23:03:34 |
222.186.175.220 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220 user=root Failed password for root from 222.186.175.220 port 58110 ssh2 Failed password for root from 222.186.175.220 port 58110 ssh2 Failed password for root from 222.186.175.220 port 58110 ssh2 Failed password for root from 222.186.175.220 port 58110 ssh2 |
2019-12-01 22:57:50 |
94.255.246.250 | attackspam | Attempted to connect 2 times to port 23 TCP |
2019-12-01 22:43:25 |
77.247.109.49 | attackspam | [portscan] Port scan |
2019-12-01 22:37:12 |
184.177.56.194 | attackbotsspam | Unauthorized connection attempt from IP address 184.177.56.194 on Port 445(SMB) |
2019-12-01 23:13:31 |
222.186.175.182 | attackbotsspam | 2019-12-01T15:12:16.974097shield sshd\[8789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root 2019-12-01T15:12:19.243779shield sshd\[8789\]: Failed password for root from 222.186.175.182 port 16694 ssh2 2019-12-01T15:12:22.633094shield sshd\[8789\]: Failed password for root from 222.186.175.182 port 16694 ssh2 2019-12-01T15:12:26.051334shield sshd\[8789\]: Failed password for root from 222.186.175.182 port 16694 ssh2 2019-12-01T15:12:29.400325shield sshd\[8789\]: Failed password for root from 222.186.175.182 port 16694 ssh2 |
2019-12-01 23:12:43 |
27.73.115.54 | attack | Dec 1 07:11:06 seraph sshd[10632]: Invalid user admin from 27.73.115.54 Dec 1 07:11:06 seraph sshd[10632]: pam_unix(sshd:auth): authentication fai= lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D27.73.115.54 Dec 1 07:11:08 seraph sshd[10632]: Failed password for invalid user admin = from 27.73.115.54 port 46085 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=27.73.115.54 |
2019-12-01 22:35:38 |
5.140.52.130 | attackspam | Dec 1 15:45:37 [munged] sshd[1291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.140.52.130 |
2019-12-01 23:14:37 |