城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.57.66.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.57.66.19. IN A
;; AUTHORITY SECTION:
. 400 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:33:21 CST 2022
;; MSG SIZE rcvd: 105
19.66.57.130.in-addr.arpa domain name pointer mfdevelopercommunity.com.
19.66.57.130.in-addr.arpa domain name pointer mfdevelopercommunity.co.uk.
19.66.57.130.in-addr.arpa domain name pointer mfcommunity.net.
19.66.57.130.in-addr.arpa domain name pointer mfcommunity.com.
19.66.57.130.in-addr.arpa domain name pointer mfcommunity.co.uk.
19.66.57.130.in-addr.arpa domain name pointer manageoutsourcing.com.
19.66.57.130.in-addr.arpa domain name pointer mainframemigration.net.
19.66.57.130.in-addr.arpa domain name pointer *.mainframemigration.net.
19.66.57.130.in-addr.arpa domain name pointer mainframemigration.com.
19.66.57.130.in-addr.arpa domain name pointer *.mainframemigration.com.
19.66.57.130.in-addr.arpa domain name pointer lonestaragile.com.
19.66.57.130.in-addr.arpa domain name pointer legacytransformation.com.
19.66.57.130.in-addr.arpa domain name pointer legacymining.com.
19.66.57.130.in-addr.arpa domain name pointer knowledgemining.com.
19.66.57.130.in-addr.arpa domain name pointer ftp.com.
19.66.57.13
;; Truncated, retrying in TCP mode.
Server: 183.60.82.98
Address: 183.60.82.98#53
Non-authoritative answer:
19.66.57.130.in-addr.arpa name = mercuryportal.com.
19.66.57.130.in-addr.arpa name = arcsight.net.
19.66.57.130.in-addr.arpa name = www2.wrq.com.
19.66.57.130.in-addr.arpa name = reflection.com.
19.66.57.130.in-addr.arpa name = ideas.microfocus.com.
19.66.57.130.in-addr.arpa name = dl.microfocus.com.
19.66.57.130.in-addr.arpa name = partner.microfocus.com.
19.66.57.130.in-addr.arpa name = www.support.microfocus.com.
19.66.57.130.in-addr.arpa name = documentation.microfocus.com.
19.66.57.130.in-addr.arpa name = vibe.novell.com.
19.66.57.130.in-addr.arpa name = login.innerweb.novell.com.
19.66.57.130.in-addr.arpa name = longviewsoftwareholdings.com.
19.66.57.130.in-addr.arpa name = xn--xys934f.xn--55qx5d.hk.
19.66.57.130.in-addr.arpa name = cobolportal.co.jp.
19.66.57.130.in-addr.arpa name = visualcobol.net.
19.66.57.130.in-addr.arpa name = thevirtualmainframe.com.
19.66.57.130.in-addr.arpa name = forums.steeltrace.com.
19.66.57.130.in-addr.arpa name = steeltrace.com.
19.66.57.130.in-addr.arpa name = *.steeltrace.com.
19.66.57.130.in-addr.arpa name = softwaretransformation.com.
19.66.57.130.in-addr.arpa name = rumba.com.
19.66.57.130.in-addr.arpa name = *.rumba.com.
19.66.57.130.in-addr.arpa name = rescueware.com.
19.66.57.130.in-addr.arpa name = relativitytechnologies.com.
19.66.57.130.in-addr.arpa name = relativity-tech.com.
19.66.57.130.in-addr.arpa name = relativity.in.
19.66.57.130.in-addr.arpa name = qaload.com.
19.66.57.130.in-addr.arpa name = qadirector.com.
19.66.57.130.in-addr.arpa name = qacenter.us.
19.66.57.130.in-addr.arpa name = numega.us.
19.66.57.130.in-addr.arpa name = numega.com.
19.66.57.130.in-addr.arpa name = netmanage.com.
19.66.57.130.in-addr.arpa name = modernizationworkbench.com.
19.66.57.130.in-addr.arpa name = modernizationroadmap.com.
19.66.57.130.in-addr.arpa name = microfocusworld.com.
19.66.57.130.in-addr.arpa name = microfocussoftware.com.
19.66.57.130.in-addr.arpa name = mi
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 109.194.54.126 | attackbotsspam | Dec 8 19:58:37 php1 sshd\[26693\]: Invalid user shikasyo from 109.194.54.126 Dec 8 19:58:37 php1 sshd\[26693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126 Dec 8 19:58:38 php1 sshd\[26693\]: Failed password for invalid user shikasyo from 109.194.54.126 port 42724 ssh2 Dec 8 20:04:10 php1 sshd\[27390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.194.54.126 user=root Dec 8 20:04:12 php1 sshd\[27390\]: Failed password for root from 109.194.54.126 port 48770 ssh2 |
2019-12-09 14:17:05 |
| 78.183.151.209 | attack | Unauthorized connection attempt detected from IP address 78.183.151.209 to port 2323 |
2019-12-09 13:59:06 |
| 96.78.175.36 | attackbots | Dec 9 06:59:53 loxhost sshd\[31390\]: Invalid user otakar from 96.78.175.36 port 49429 Dec 9 06:59:53 loxhost sshd\[31390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.36 Dec 9 06:59:55 loxhost sshd\[31390\]: Failed password for invalid user otakar from 96.78.175.36 port 49429 ssh2 Dec 9 07:05:38 loxhost sshd\[31586\]: Invalid user pcap from 96.78.175.36 port 54271 Dec 9 07:05:38 loxhost sshd\[31586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.175.36 ... |
2019-12-09 14:10:11 |
| 106.13.59.131 | attackbotsspam | Dec 9 00:43:11 plusreed sshd[19639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.59.131 user=root Dec 9 00:43:13 plusreed sshd[19639]: Failed password for root from 106.13.59.131 port 39596 ssh2 ... |
2019-12-09 14:02:15 |
| 51.15.243.82 | attackspambots | Dec 8 19:46:07 auw2 sshd\[672\]: Invalid user admin from 51.15.243.82 Dec 8 19:46:07 auw2 sshd\[672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=layla.dontexist.org Dec 8 19:46:09 auw2 sshd\[672\]: Failed password for invalid user admin from 51.15.243.82 port 45452 ssh2 Dec 8 19:52:15 auw2 sshd\[1386\]: Invalid user akiyo from 51.15.243.82 Dec 8 19:52:15 auw2 sshd\[1386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=layla.dontexist.org |
2019-12-09 13:54:58 |
| 119.29.2.157 | attackbotsspam | Dec 9 00:58:30 linuxvps sshd\[45063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.2.157 user=root Dec 9 00:58:33 linuxvps sshd\[45063\]: Failed password for root from 119.29.2.157 port 36297 ssh2 Dec 9 01:04:41 linuxvps sshd\[49274\]: Invalid user www from 119.29.2.157 Dec 9 01:04:41 linuxvps sshd\[49274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.2.157 Dec 9 01:04:44 linuxvps sshd\[49274\]: Failed password for invalid user www from 119.29.2.157 port 40602 ssh2 |
2019-12-09 14:05:33 |
| 27.72.102.190 | attackspam | Dec 9 06:08:42 hcbbdb sshd\[24810\]: Invalid user applicon from 27.72.102.190 Dec 9 06:08:42 hcbbdb sshd\[24810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.102.190 Dec 9 06:08:43 hcbbdb sshd\[24810\]: Failed password for invalid user applicon from 27.72.102.190 port 28964 ssh2 Dec 9 06:15:24 hcbbdb sshd\[25661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.102.190 user=root Dec 9 06:15:26 hcbbdb sshd\[25661\]: Failed password for root from 27.72.102.190 port 50961 ssh2 |
2019-12-09 14:15:57 |
| 178.128.216.127 | attackbotsspam | Dec 9 06:22:49 meumeu sshd[17947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.216.127 Dec 9 06:22:51 meumeu sshd[17947]: Failed password for invalid user bellamy from 178.128.216.127 port 51294 ssh2 Dec 9 06:31:41 meumeu sshd[22287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.216.127 ... |
2019-12-09 13:47:45 |
| 185.214.164.10 | attack | MYH,DEF POST /downloader/ |
2019-12-09 14:12:29 |
| 212.16.187.24 | attack | Tries to login WordPress (wp-login.php) |
2019-12-09 14:23:15 |
| 68.183.236.66 | attackspambots | Dec 9 10:54:11 gw1 sshd[23828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.66 Dec 9 10:54:13 gw1 sshd[23828]: Failed password for invalid user mcduffey from 68.183.236.66 port 49106 ssh2 ... |
2019-12-09 13:57:41 |
| 149.202.180.143 | attackspam | 2019-12-09T06:59:53.994606 sshd[31713]: Invalid user victoria12 from 149.202.180.143 port 56798 2019-12-09T06:59:54.005970 sshd[31713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.180.143 2019-12-09T06:59:53.994606 sshd[31713]: Invalid user victoria12 from 149.202.180.143 port 56798 2019-12-09T06:59:56.509683 sshd[31713]: Failed password for invalid user victoria12 from 149.202.180.143 port 56798 ssh2 2019-12-09T07:04:51.682802 sshd[31842]: Invalid user 123456 from 149.202.180.143 port 60102 ... |
2019-12-09 14:29:08 |
| 37.187.114.135 | attackspam | Dec 9 05:56:10 * sshd[27486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.114.135 Dec 9 05:56:12 * sshd[27486]: Failed password for invalid user louise from 37.187.114.135 port 57524 ssh2 |
2019-12-09 13:54:27 |
| 211.253.10.96 | attack | Dec 9 01:12:07 plusreed sshd[27107]: Invalid user admin from 211.253.10.96 ... |
2019-12-09 14:27:23 |
| 188.166.145.179 | attackbots | Dec 9 07:11:55 meumeu sshd[28459]: Failed password for gdm from 188.166.145.179 port 46352 ssh2 Dec 9 07:17:03 meumeu sshd[29123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.145.179 Dec 9 07:17:06 meumeu sshd[29123]: Failed password for invalid user accounts from 188.166.145.179 port 55430 ssh2 ... |
2019-12-09 14:27:49 |