城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.124.38.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.124.38.99.			IN	A
;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 178 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:42:42 CST 2022
;; MSG SIZE  rcvd: 105
        99.38.124.13.in-addr.arpa domain name pointer ec2-13-124-38-99.ap-northeast-2.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
99.38.124.13.in-addr.arpa	name = ec2-13-124-38-99.ap-northeast-2.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 41.39.213.53 | attack | Unauthorized connection attempt from IP address 41.39.213.53 on Port 445(SMB)  | 
                    2020-05-28 08:18:16 | 
| 191.241.242.10 | attackbotsspam | Unauthorized connection attempt from IP address 191.241.242.10 on Port 445(SMB)  | 
                    2020-05-28 08:14:34 | 
| 39.65.207.150 | attackspambots | SSH login attempts.  | 
                    2020-05-28 12:23:58 | 
| 129.211.38.207 | attackbots | Wordpress malicious attack:[sshd]  | 
                    2020-05-28 12:14:33 | 
| 219.153.100.153 | attackbotsspam | May 28 05:49:14 h1745522 sshd[17772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.100.153 user=root May 28 05:49:16 h1745522 sshd[17772]: Failed password for root from 219.153.100.153 port 38874 ssh2 May 28 05:53:44 h1745522 sshd[17876]: Invalid user zimbra from 219.153.100.153 port 46936 May 28 05:53:44 h1745522 sshd[17876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.100.153 May 28 05:53:44 h1745522 sshd[17876]: Invalid user zimbra from 219.153.100.153 port 46936 May 28 05:53:47 h1745522 sshd[17876]: Failed password for invalid user zimbra from 219.153.100.153 port 46936 ssh2 May 28 05:55:56 h1745522 sshd[17947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.100.153 user=root May 28 05:55:58 h1745522 sshd[17947]: Failed password for root from 219.153.100.153 port 44560 ssh2 May 28 05:58:11 h1745522 sshd[18106]: pam_unix(sshd:auth) ...  | 
                    2020-05-28 12:18:13 | 
| 83.219.128.94 | attackbots | 2020-05-28T03:54:43.973112server.espacesoutien.com sshd[18901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.219.128.94 user=root 2020-05-28T03:54:46.149241server.espacesoutien.com sshd[18901]: Failed password for root from 83.219.128.94 port 54458 ssh2 2020-05-28T03:58:17.849481server.espacesoutien.com sshd[19417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.219.128.94 user=root 2020-05-28T03:58:19.403335server.espacesoutien.com sshd[19417]: Failed password for root from 83.219.128.94 port 59826 ssh2 ...  | 
                    2020-05-28 12:12:08 | 
| 182.61.149.31 | attackbots | May 28 05:53:30 srv-ubuntu-dev3 sshd[45404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.31 user=root May 28 05:53:32 srv-ubuntu-dev3 sshd[45404]: Failed password for root from 182.61.149.31 port 60246 ssh2 May 28 05:56:03 srv-ubuntu-dev3 sshd[45832]: Invalid user host from 182.61.149.31 May 28 05:56:03 srv-ubuntu-dev3 sshd[45832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.31 May 28 05:56:03 srv-ubuntu-dev3 sshd[45832]: Invalid user host from 182.61.149.31 May 28 05:56:06 srv-ubuntu-dev3 sshd[45832]: Failed password for invalid user host from 182.61.149.31 port 37580 ssh2 May 28 05:58:31 srv-ubuntu-dev3 sshd[46156]: Invalid user khuay from 182.61.149.31 May 28 05:58:31 srv-ubuntu-dev3 sshd[46156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.31 May 28 05:58:31 srv-ubuntu-dev3 sshd[46156]: Invalid user khuay from 182.61.14 ...  | 
                    2020-05-28 12:05:48 | 
| 185.143.74.73 | attack | May 28 05:31:46 mail postfix/smtpd\[23414\]: warning: unknown\[185.143.74.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ May 28 06:02:50 mail postfix/smtpd\[24064\]: warning: unknown\[185.143.74.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ May 28 06:04:35 mail postfix/smtpd\[24064\]: warning: unknown\[185.143.74.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ May 28 06:06:17 mail postfix/smtpd\[24654\]: warning: unknown\[185.143.74.73\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\  | 
                    2020-05-28 12:09:49 | 
| 139.99.237.183 | attackspam | SSH login attempts.  | 
                    2020-05-28 12:32:12 | 
| 27.221.97.4 | attackspam | May 28 05:54:49 eventyay sshd[21834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.221.97.4 May 28 05:54:52 eventyay sshd[21834]: Failed password for invalid user loverd from 27.221.97.4 port 48146 ssh2 May 28 05:58:13 eventyay sshd[21938]: Failed password for root from 27.221.97.4 port 41567 ssh2 ...  | 
                    2020-05-28 12:20:08 | 
| 68.183.124.53 | attack | Invalid user 123Admin from 68.183.124.53 port 34530  | 
                    2020-05-28 08:12:17 | 
| 181.65.164.179 | attack | (sshd) Failed SSH login from 181.65.164.179 (PE/Peru/www.smartempresas.telefonica.com.pe): 5 in the last 3600 secs  | 
                    2020-05-28 12:07:10 | 
| 51.38.83.164 | attack | SSH login attempts.  | 
                    2020-05-28 12:24:55 | 
| 120.92.42.123 | attack | SSH Brute-Forcing (server1)  | 
                    2020-05-28 12:02:24 | 
| 34.92.46.76 | attackspam | May 28 05:58:15 santamaria sshd\[10606\]: Invalid user benida from 34.92.46.76 May 28 05:58:15 santamaria sshd\[10606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.92.46.76 May 28 05:58:17 santamaria sshd\[10606\]: Failed password for invalid user benida from 34.92.46.76 port 52778 ssh2 ...  | 
                    2020-05-28 12:15:53 |