城市(city): Minneapolis
省份(region): Minnesota
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): University of Minnesota
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.101.12.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35173
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;128.101.12.142. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019070200 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 03 01:34:02 CST 2019
;; MSG SIZE rcvd: 118
142.12.101.128.in-addr.arpa domain name pointer us-ww201051803.uservices.umn.edu.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
142.12.101.128.in-addr.arpa name = us-ww201051803.uservices.umn.edu.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
123.4.105.22 | attackspambots | Automatic report - Port Scan Attack |
2019-07-15 14:58:52 |
103.212.140.135 | attackbotsspam | Jul 15 02:29:33 localhost kernel: [14416366.835441] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=103.212.140.135 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x20 TTL=48 ID=2112 DF PROTO=TCP SPT=58699 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 Jul 15 02:29:33 localhost kernel: [14416366.835472] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=103.212.140.135 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x20 TTL=48 ID=2112 DF PROTO=TCP SPT=58699 DPT=8291 SEQ=1872484757 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405AC0103030201010402) Jul 15 02:29:36 localhost kernel: [14416370.044023] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=103.212.140.135 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x20 TTL=48 ID=28960 DF PROTO=TCP SPT=64314 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 Jul 15 02:29:36 localhost kernel: [14416370.044052] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=103.2 |
2019-07-15 14:56:03 |
114.32.200.188 | attack | Automatic report - Port Scan Attack |
2019-07-15 14:26:55 |
113.172.25.64 | attackspambots | 2019-07-14T18:04:20.993903mizuno.rwx.ovh sshd[32747]: Connection from 113.172.25.64 port 50963 on 78.46.61.178 port 22 2019-07-14T18:04:23.824237mizuno.rwx.ovh sshd[32747]: Invalid user admin from 113.172.25.64 port 50963 2019-07-14T18:04:23.831300mizuno.rwx.ovh sshd[32747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.172.25.64 2019-07-14T18:04:20.993903mizuno.rwx.ovh sshd[32747]: Connection from 113.172.25.64 port 50963 on 78.46.61.178 port 22 2019-07-14T18:04:23.824237mizuno.rwx.ovh sshd[32747]: Invalid user admin from 113.172.25.64 port 50963 2019-07-14T18:04:25.678425mizuno.rwx.ovh sshd[32747]: Failed password for invalid user admin from 113.172.25.64 port 50963 ssh2 ... |
2019-07-15 14:24:09 |
187.16.96.37 | attackspam | Jul 15 08:57:58 eventyay sshd[27809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.96.37 Jul 15 08:57:59 eventyay sshd[27809]: Failed password for invalid user meme from 187.16.96.37 port 49462 ssh2 Jul 15 09:03:42 eventyay sshd[29330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.16.96.37 ... |
2019-07-15 15:18:39 |
153.36.232.36 | attackspambots | Jul 15 02:09:58 aat-srv002 sshd[3768]: Failed password for root from 153.36.232.36 port 11337 ssh2 Jul 15 02:10:08 aat-srv002 sshd[3781]: Failed password for root from 153.36.232.36 port 39286 ssh2 Jul 15 02:10:20 aat-srv002 sshd[3790]: Failed password for root from 153.36.232.36 port 11897 ssh2 ... |
2019-07-15 15:15:41 |
129.150.86.200 | attackbots | Jul 15 12:28:22 areeb-Workstation sshd\[511\]: Invalid user sas from 129.150.86.200 Jul 15 12:28:22 areeb-Workstation sshd\[511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.150.86.200 Jul 15 12:28:24 areeb-Workstation sshd\[511\]: Failed password for invalid user sas from 129.150.86.200 port 50152 ssh2 ... |
2019-07-15 15:00:36 |
37.49.225.219 | attack | 2019-07-13 15:48:55 -> 2019-07-14 23:03:40 : 1268 login attempts (37.49.225.219) |
2019-07-15 14:32:06 |
91.121.101.159 | attack | Jul 15 02:47:47 debian sshd\[16095\]: Invalid user yac from 91.121.101.159 port 42352 Jul 15 02:47:47 debian sshd\[16095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.101.159 Jul 15 02:47:48 debian sshd\[16095\]: Failed password for invalid user yac from 91.121.101.159 port 42352 ssh2 ... |
2019-07-15 15:03:39 |
175.197.145.63 | attackspambots | Automatic report - Port Scan Attack |
2019-07-15 15:17:24 |
189.68.226.95 | attack | Automatic report - Port Scan Attack |
2019-07-15 15:15:11 |
177.188.247.92 | attackspam | Automatic report - Port Scan Attack |
2019-07-15 15:14:16 |
112.16.93.184 | attackbotsspam | Jul 15 08:29:11 MK-Soft-Root1 sshd\[27839\]: Invalid user mc from 112.16.93.184 port 33142 Jul 15 08:29:11 MK-Soft-Root1 sshd\[27839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.16.93.184 Jul 15 08:29:13 MK-Soft-Root1 sshd\[27839\]: Failed password for invalid user mc from 112.16.93.184 port 33142 ssh2 ... |
2019-07-15 15:11:46 |
153.36.232.139 | attackspam | SSH Brute Force, server-1 sshd[481]: Failed password for root from 153.36.232.139 port 32943 ssh2 |
2019-07-15 14:26:27 |
179.211.64.199 | attackspam | Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb. |
2019-07-15 14:27:59 |