城市(city): New Glasgow
省份(region): Nova Scotia
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.67.212.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31295
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.67.212.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:49:25 CST 2025
;; MSG SIZE rcvd: 107
Host 124.212.67.142.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 124.212.67.142.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 183.91.4.124 | attackspambots | Unauthorized connection attempt from IP address 183.91.4.124 on Port 445(SMB) |
2019-09-29 16:46:55 |
| 196.189.56.247 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 29-09-2019 04:50:17. |
2019-09-29 16:43:30 |
| 202.215.36.230 | attackspambots | Sep 29 06:19:56 vtv3 sshd\[22045\]: Invalid user oracle from 202.215.36.230 port 62069 Sep 29 06:19:56 vtv3 sshd\[22045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.215.36.230 Sep 29 06:19:59 vtv3 sshd\[22045\]: Failed password for invalid user oracle from 202.215.36.230 port 62069 ssh2 Sep 29 06:22:14 vtv3 sshd\[23499\]: Invalid user vagrant from 202.215.36.230 port 61641 Sep 29 06:22:14 vtv3 sshd\[23499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.215.36.230 Sep 29 06:33:58 vtv3 sshd\[29563\]: Invalid user chun from 202.215.36.230 port 59798 Sep 29 06:33:58 vtv3 sshd\[29563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.215.36.230 Sep 29 06:34:00 vtv3 sshd\[29563\]: Failed password for invalid user chun from 202.215.36.230 port 59798 ssh2 Sep 29 06:36:17 vtv3 sshd\[31065\]: Invalid user www from 202.215.36.230 port 63417 Sep 29 06:36:17 vtv3 sshd\[31065 |
2019-09-29 16:33:30 |
| 50.236.62.30 | attackspambots | Sep 28 22:40:53 eddieflores sshd\[14963\]: Invalid user NetLinx from 50.236.62.30 Sep 28 22:40:53 eddieflores sshd\[14963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.236.62.30 Sep 28 22:40:55 eddieflores sshd\[14963\]: Failed password for invalid user NetLinx from 50.236.62.30 port 45839 ssh2 Sep 28 22:45:04 eddieflores sshd\[15296\]: Invalid user porteria from 50.236.62.30 Sep 28 22:45:04 eddieflores sshd\[15296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.236.62.30 |
2019-09-29 16:54:55 |
| 112.85.42.72 | attackspambots | Sep 29 10:15:43 MK-Soft-Root1 sshd[22546]: Failed password for root from 112.85.42.72 port 15469 ssh2 Sep 29 10:15:46 MK-Soft-Root1 sshd[22546]: Failed password for root from 112.85.42.72 port 15469 ssh2 ... |
2019-09-29 16:33:06 |
| 190.117.157.115 | attack | Sep 28 19:44:18 lcprod sshd\[15676\]: Invalid user ubnt from 190.117.157.115 Sep 28 19:44:18 lcprod sshd\[15676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.munialtoalianza.gob.pe Sep 28 19:44:19 lcprod sshd\[15676\]: Failed password for invalid user ubnt from 190.117.157.115 port 35054 ssh2 Sep 28 19:49:19 lcprod sshd\[16123\]: Invalid user ir from 190.117.157.115 Sep 28 19:49:19 lcprod sshd\[16123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.munialtoalianza.gob.pe |
2019-09-29 17:07:36 |
| 106.53.11.43 | attackbots | Invalid user ts6 from 106.53.11.43 port 42582 |
2019-09-29 16:39:44 |
| 118.24.2.69 | attack | Sep 29 10:28:00 h2177944 sshd\[16867\]: Invalid user nimda321 from 118.24.2.69 port 56316 Sep 29 10:28:00 h2177944 sshd\[16867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.2.69 Sep 29 10:28:03 h2177944 sshd\[16867\]: Failed password for invalid user nimda321 from 118.24.2.69 port 56316 ssh2 Sep 29 10:32:51 h2177944 sshd\[17109\]: Invalid user ZE3rj from 118.24.2.69 port 58568 ... |
2019-09-29 16:52:51 |
| 82.196.3.212 | attackbots | xmlrpc attack |
2019-09-29 16:38:34 |
| 222.186.173.154 | attack | 19/9/29@04:04:55: FAIL: IoT-SSH address from=222.186.173.154 ... |
2019-09-29 16:26:03 |
| 139.99.37.130 | attackbotsspam | Sep 29 02:08:08 aat-srv002 sshd[3866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Sep 29 02:08:10 aat-srv002 sshd[3866]: Failed password for invalid user hy123 from 139.99.37.130 port 15394 ssh2 Sep 29 02:12:15 aat-srv002 sshd[4010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 Sep 29 02:12:18 aat-srv002 sshd[4010]: Failed password for invalid user fernanda123 from 139.99.37.130 port 52164 ssh2 ... |
2019-09-29 16:54:01 |
| 68.45.62.109 | attack | Invalid user janitor from 68.45.62.109 port 49542 |
2019-09-29 16:40:00 |
| 190.236.190.34 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 29-09-2019 04:50:16. |
2019-09-29 16:43:49 |
| 190.201.107.157 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 29-09-2019 04:50:16. |
2019-09-29 16:46:33 |
| 206.167.33.12 | attackbotsspam | 2019-09-29T15:02:33.705738enmeeting.mahidol.ac.th sshd\[6945\]: Invalid user cbrown from 206.167.33.12 port 59734 2019-09-29T15:02:33.722263enmeeting.mahidol.ac.th sshd\[6945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.12 2019-09-29T15:02:35.879709enmeeting.mahidol.ac.th sshd\[6945\]: Failed password for invalid user cbrown from 206.167.33.12 port 59734 ssh2 ... |
2019-09-29 16:32:38 |