城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.99.222.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;12.99.222.147. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 18:34:10 CST 2025
;; MSG SIZE rcvd: 106
147.222.99.12.in-addr.arpa domain name pointer 147.mubd.phnx.la6ca01r1.dsl.att.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
147.222.99.12.in-addr.arpa name = 147.mubd.phnx.la6ca01r1.dsl.att.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 122.118.210.142 | attackspam | " " |
2020-05-23 21:20:55 |
| 45.148.10.198 | attackspam | scan r |
2020-05-23 21:19:35 |
| 119.31.126.100 | attackbots | Failed password for invalid user abq from 119.31.126.100 port 43510 ssh2 Invalid user nea from 119.31.126.100 port 46686 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.31.126.100 Failed password for invalid user nea from 119.31.126.100 port 46686 ssh2 Invalid user yn from 119.31.126.100 port 49864 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.31.126.100 Failed password for invalid user yn from 119.31.126.100 port 49864 ssh2 |
2020-05-23 21:27:49 |
| 218.92.0.165 | attack | Failed password for root from 218.92.0.165 port 28576 ssh2 Failed password for root from 218.92.0.165 port 28576 ssh2 Failed password for root from 218.92.0.165 port 28576 ssh2 Failed password for root from 218.92.0.165 port 28576 ssh2 |
2020-05-23 21:18:46 |
| 51.254.220.20 | attack | May 23 12:29:10 game-panel sshd[10941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20 May 23 12:29:12 game-panel sshd[10941]: Failed password for invalid user ooe from 51.254.220.20 port 50218 ssh2 May 23 12:34:29 game-panel sshd[11182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20 |
2020-05-23 20:47:10 |
| 51.255.199.33 | attack | May 23 12:56:20 game-panel sshd[12375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.199.33 May 23 12:56:22 game-panel sshd[12375]: Failed password for invalid user sav from 51.255.199.33 port 49082 ssh2 May 23 13:03:23 game-panel sshd[12733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.199.33 |
2020-05-23 21:11:44 |
| 200.43.231.1 | attack | May 23 14:02:16 santamaria sshd\[26216\]: Invalid user xad from 200.43.231.1 May 23 14:02:16 santamaria sshd\[26216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.43.231.1 May 23 14:02:18 santamaria sshd\[26216\]: Failed password for invalid user xad from 200.43.231.1 port 34350 ssh2 ... |
2020-05-23 21:26:45 |
| 181.65.164.179 | attackbotsspam | May 23 15:02:45 h1745522 sshd[4272]: Invalid user dul from 181.65.164.179 port 50762 May 23 15:02:45 h1745522 sshd[4272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.164.179 May 23 15:02:45 h1745522 sshd[4272]: Invalid user dul from 181.65.164.179 port 50762 May 23 15:02:47 h1745522 sshd[4272]: Failed password for invalid user dul from 181.65.164.179 port 50762 ssh2 May 23 15:05:50 h1745522 sshd[4331]: Invalid user nki from 181.65.164.179 port 38556 May 23 15:05:50 h1745522 sshd[4331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.164.179 May 23 15:05:50 h1745522 sshd[4331]: Invalid user nki from 181.65.164.179 port 38556 May 23 15:05:52 h1745522 sshd[4331]: Failed password for invalid user nki from 181.65.164.179 port 38556 ssh2 May 23 15:08:50 h1745522 sshd[4414]: Invalid user gql from 181.65.164.179 port 54582 ... |
2020-05-23 21:25:14 |
| 79.137.34.248 | attackbotsspam | May 23 19:35:03 webhost01 sshd[15801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.34.248 May 23 19:35:05 webhost01 sshd[15801]: Failed password for invalid user ktg from 79.137.34.248 port 50949 ssh2 ... |
2020-05-23 20:48:07 |
| 36.110.217.140 | attackspambots | pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.217.140 Failed password for invalid user ibc from 36.110.217.140 port 46056 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.217.140 |
2020-05-23 20:50:18 |
| 1.255.153.93 | attackbotsspam | May 23 14:02:28 debian-2gb-nbg1-2 kernel: \[12494161.483328\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=1.255.153.93 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=9489 PROTO=TCP SPT=55220 DPT=5900 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-23 21:16:37 |
| 198.108.67.106 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort |
2020-05-23 20:54:39 |
| 95.209.132.8 | attack | May 23 15:38:03 tuotantolaitos sshd[16318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.209.132.8 May 23 15:38:06 tuotantolaitos sshd[16318]: Failed password for invalid user admin from 95.209.132.8 port 36997 ssh2 ... |
2020-05-23 21:28:24 |
| 78.132.137.229 | attackbotsspam | Automatic report - Port Scan Attack |
2020-05-23 20:55:54 |
| 58.57.15.29 | attack | May 23 14:45:52 home sshd[7049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.15.29 May 23 14:45:54 home sshd[7049]: Failed password for invalid user grid from 58.57.15.29 port 47273 ssh2 May 23 14:49:05 home sshd[7323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.15.29 ... |
2020-05-23 21:15:35 |