城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.102.90.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;12.102.90.94. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:52:38 CST 2025
;; MSG SIZE rcvd: 105
94.90.102.12.in-addr.arpa domain name pointer 94.muek.snfc.sfjca01r1.dsl.att.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
94.90.102.12.in-addr.arpa name = 94.muek.snfc.sfjca01r1.dsl.att.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.118.38.38 | attackbotsspam | Dec 12 13:18:09 webserver postfix/smtpd\[15635\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 12 13:18:44 webserver postfix/smtpd\[15635\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 12 13:19:18 webserver postfix/smtpd\[15635\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 12 13:19:53 webserver postfix/smtpd\[15653\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 12 13:20:28 webserver postfix/smtpd\[15635\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-12-12 20:35:59 |
| 114.224.159.46 | attack | 2019-12-12 00:24:41 H=(ylmf-pc) [114.224.159.46]:51630 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc 2019-12-12 00:24:42 H=(ylmf-pc) [114.224.159.46]:49984 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc 2019-12-12 00:24:43 H=(ylmf-pc) [114.224.159.46]:58455 I=[192.147.25.65]:25 rejected EHLO or HELO ylmf-pc: CHECK_HELO: ylmf-pc ... |
2019-12-12 20:35:38 |
| 138.94.160.57 | attack | Dec 11 23:58:38 kapalua sshd\[11585\]: Invalid user rail from 138.94.160.57 Dec 11 23:58:38 kapalua sshd\[11585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=57-160-94-138.turbonetburitis.com.br Dec 11 23:58:39 kapalua sshd\[11585\]: Failed password for invalid user rail from 138.94.160.57 port 39034 ssh2 Dec 12 00:07:57 kapalua sshd\[12610\]: Invalid user jubran from 138.94.160.57 Dec 12 00:07:57 kapalua sshd\[12610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=57-160-94-138.turbonetburitis.com.br |
2019-12-12 20:46:52 |
| 63.81.87.100 | attackspambots | Dec 12 08:17:44 grey postfix/smtpd\[17821\]: NOQUEUE: reject: RCPT from announce.vidyad.com\[63.81.87.100\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.100\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.100\]\; from=\ |
2019-12-12 20:18:04 |
| 5.39.67.154 | attack | Dec 12 09:55:34 heissa sshd\[3774\]: Invalid user mosca from 5.39.67.154 port 38341 Dec 12 09:55:34 heissa sshd\[3774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns356848.ip-5-39-67.eu Dec 12 09:55:36 heissa sshd\[3774\]: Failed password for invalid user mosca from 5.39.67.154 port 38341 ssh2 Dec 12 10:00:51 heissa sshd\[9471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns356848.ip-5-39-67.eu user=root Dec 12 10:00:53 heissa sshd\[9471\]: Failed password for root from 5.39.67.154 port 42698 ssh2 |
2019-12-12 20:18:36 |
| 117.50.46.176 | attackbotsspam | Dec 12 07:53:59 sip sshd[20895]: Failed password for root from 117.50.46.176 port 44096 ssh2 Dec 12 08:07:38 sip sshd[21045]: Failed password for root from 117.50.46.176 port 37960 ssh2 |
2019-12-12 20:25:41 |
| 125.74.27.185 | attack | 2019-12-12T11:14:37.796901abusebot-2.cloudsearch.cf sshd\[12253\]: Invalid user gayla from 125.74.27.185 port 41539 2019-12-12T11:14:37.804231abusebot-2.cloudsearch.cf sshd\[12253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.27.185 2019-12-12T11:14:39.597559abusebot-2.cloudsearch.cf sshd\[12253\]: Failed password for invalid user gayla from 125.74.27.185 port 41539 ssh2 2019-12-12T11:23:01.175772abusebot-2.cloudsearch.cf sshd\[12317\]: Invalid user cool from 125.74.27.185 port 38934 |
2019-12-12 20:09:36 |
| 106.13.1.203 | attackspam | Dec 12 12:49:06 server sshd\[24700\]: Invalid user vandusen from 106.13.1.203 Dec 12 12:49:06 server sshd\[24700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.1.203 Dec 12 12:49:08 server sshd\[24700\]: Failed password for invalid user vandusen from 106.13.1.203 port 59426 ssh2 Dec 12 12:58:39 server sshd\[27612\]: Invalid user hamzeh from 106.13.1.203 Dec 12 12:58:39 server sshd\[27612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.1.203 ... |
2019-12-12 20:13:05 |
| 195.154.38.177 | attackspam | SSH Brute-Forcing (ownc) |
2019-12-12 20:23:52 |
| 222.186.169.194 | attackspam | Dec 12 13:03:50 amit sshd\[1025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Dec 12 13:03:52 amit sshd\[1025\]: Failed password for root from 222.186.169.194 port 28454 ssh2 Dec 12 13:04:16 amit sshd\[1029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root ... |
2019-12-12 20:10:59 |
| 5.62.159.119 | attack | Registration form abuse |
2019-12-12 20:17:49 |
| 180.168.36.86 | attackspambots | SSH bruteforce |
2019-12-12 20:49:08 |
| 35.225.211.131 | attackbotsspam | 35.225.211.131 - - \[12/Dec/2019:11:23:55 +0100\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 35.225.211.131 - - \[12/Dec/2019:11:23:57 +0100\] "POST /wp-login.php HTTP/1.0" 200 4236 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 35.225.211.131 - - \[12/Dec/2019:11:23:58 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-12-12 20:29:52 |
| 139.0.12.19 | attackspambots | Unauthorized connection attempt detected from IP address 139.0.12.19 to port 445 |
2019-12-12 20:11:21 |
| 188.166.117.213 | attack | 2019-12-12T07:45:42.463776shield sshd\[11505\]: Invalid user terre from 188.166.117.213 port 36272 2019-12-12T07:45:42.468220shield sshd\[11505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213 2019-12-12T07:45:44.425144shield sshd\[11505\]: Failed password for invalid user terre from 188.166.117.213 port 36272 ssh2 2019-12-12T07:51:06.284046shield sshd\[12279\]: Invalid user zonaWifi123 from 188.166.117.213 port 44824 2019-12-12T07:51:06.288531shield sshd\[12279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213 |
2019-12-12 20:30:10 |