城市(city): unknown
省份(region): unknown
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.63.74.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36891
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.63.74.241. IN A
;; AUTHORITY SECTION:
. 379 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:33:22 CST 2022
;; MSG SIZE rcvd: 106
241.74.63.130.in-addr.arpa domain name pointer portia.ccs.yorku.ca.
241.74.63.130.in-addr.arpa domain name pointer ozmachext.apps01.yorku.ca.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
241.74.63.130.in-addr.arpa name = portia.ccs.yorku.ca.
241.74.63.130.in-addr.arpa name = ozmachext.apps01.yorku.ca.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 46.38.144.146 | attack | 2019-11-11T19:38:02.147018mail01 postfix/smtpd[14553]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-11T19:38:04.148665mail01 postfix/smtpd[15517]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-11T19:38:13.451274mail01 postfix/smtpd[14553]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-12 02:41:24 |
| 167.71.82.184 | attack | Nov 11 23:43:52 itv-usvr-01 sshd[5917]: Invalid user kiste from 167.71.82.184 Nov 11 23:43:52 itv-usvr-01 sshd[5917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.82.184 Nov 11 23:43:52 itv-usvr-01 sshd[5917]: Invalid user kiste from 167.71.82.184 Nov 11 23:43:54 itv-usvr-01 sshd[5917]: Failed password for invalid user kiste from 167.71.82.184 port 45040 ssh2 Nov 11 23:47:16 itv-usvr-01 sshd[6069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.82.184 user=root Nov 11 23:47:18 itv-usvr-01 sshd[6069]: Failed password for root from 167.71.82.184 port 54440 ssh2 |
2019-11-12 02:52:28 |
| 104.232.53.243 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2019-11-12 02:43:11 |
| 37.187.78.170 | attackbotsspam | 2019-11-12T01:18:21.200625luisaranguren sshd[267027]: Connection from 37.187.78.170 port 24519 on 10.10.10.6 port 22 2019-11-12T01:18:23.165146luisaranguren sshd[267027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.78.170 user=root 2019-11-12T01:18:24.964247luisaranguren sshd[267027]: Failed password for root from 37.187.78.170 port 24519 ssh2 2019-11-12T01:41:50.091812luisaranguren sshd[270132]: Connection from 37.187.78.170 port 41625 on 10.10.10.6 port 22 2019-11-12T01:41:51.719607luisaranguren sshd[270132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.78.170 user=root 2019-11-12T01:41:53.147527luisaranguren sshd[270132]: Failed password for root from 37.187.78.170 port 41625 ssh2 ... |
2019-11-12 02:27:24 |
| 216.218.206.101 | attack | firewall-block, port(s): 30005/tcp |
2019-11-12 03:00:42 |
| 104.236.124.45 | attackbotsspam | Nov 11 19:16:36 MK-Soft-VM8 sshd[31855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.124.45 Nov 11 19:16:38 MK-Soft-VM8 sshd[31855]: Failed password for invalid user zaninoni from 104.236.124.45 port 45514 ssh2 ... |
2019-11-12 02:56:04 |
| 207.7.140.67 | attackspam | firewall-block, port(s): 1433/tcp |
2019-11-12 03:01:52 |
| 93.120.128.68 | attackbots | Chat Spam |
2019-11-12 02:50:22 |
| 209.97.188.148 | attackbotsspam | WordPress login Brute force / Web App Attack on client site. |
2019-11-12 02:36:42 |
| 51.75.28.134 | attack | 2019-11-09 07:17:15 server sshd[37320]: Failed password for invalid user root from 51.75.28.134 port 52854 ssh2 |
2019-11-12 02:43:38 |
| 202.151.30.141 | attack | $f2bV_matches |
2019-11-12 02:41:06 |
| 123.206.30.83 | attackbotsspam | Invalid user sheh from 123.206.30.83 port 44798 |
2019-11-12 02:47:49 |
| 46.105.124.52 | attackbots | Nov 11 19:13:17 MK-Soft-VM7 sshd[31309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.124.52 Nov 11 19:13:18 MK-Soft-VM7 sshd[31309]: Failed password for invalid user test4444 from 46.105.124.52 port 50628 ssh2 ... |
2019-11-12 02:38:01 |
| 18.206.195.87 | attack | 3389BruteforceFW21 |
2019-11-12 02:45:59 |
| 91.222.237.73 | attackbotsspam | 91.222.236.0/22 blocked putinstan not allowed |
2019-11-12 02:38:50 |