城市(city): Dingess
省份(region): West Virginia
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.242.89.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;172.242.89.103. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 217 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:30:57 CST 2025
;; MSG SIZE rcvd: 107
103.89.242.172.in-addr.arpa domain name pointer 172-242-89-103.cust.exede.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
103.89.242.172.in-addr.arpa name = 172-242-89-103.cust.exede.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 201.248.215.70 | attack | 445/tcp 445/tcp 445/tcp [2019-09-03]3pkt |
2019-09-03 16:40:30 |
| 14.181.191.178 | attackspam | 445/tcp [2019-09-03]1pkt |
2019-09-03 16:47:29 |
| 114.67.66.199 | attackbots | Sep 3 08:10:56 *** sshd[1123]: User root from 114.67.66.199 not allowed because not listed in AllowUsers |
2019-09-03 16:39:15 |
| 58.171.108.172 | attackspam | Sep 3 10:18:43 mail sshd\[9188\]: Invalid user git from 58.171.108.172 port 40690 Sep 3 10:18:43 mail sshd\[9188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.171.108.172 Sep 3 10:18:45 mail sshd\[9188\]: Failed password for invalid user git from 58.171.108.172 port 40690 ssh2 Sep 3 10:24:44 mail sshd\[10074\]: Invalid user school from 58.171.108.172 port 20498 Sep 3 10:24:44 mail sshd\[10074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.171.108.172 |
2019-09-03 16:26:19 |
| 182.219.172.224 | attackbotsspam | Sep 2 22:21:10 lcprod sshd\[4010\]: Invalid user asep from 182.219.172.224 Sep 2 22:21:10 lcprod sshd\[4010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.219.172.224 Sep 2 22:21:13 lcprod sshd\[4010\]: Failed password for invalid user asep from 182.219.172.224 port 38940 ssh2 Sep 2 22:26:14 lcprod sshd\[4463\]: Invalid user databse from 182.219.172.224 Sep 2 22:26:14 lcprod sshd\[4463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.219.172.224 |
2019-09-03 16:36:40 |
| 123.138.18.35 | attackbots | Sep 3 10:22:36 mail sshd\[9733\]: Invalid user user from 123.138.18.35 port 32772 Sep 3 10:22:36 mail sshd\[9733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35 Sep 3 10:22:38 mail sshd\[9733\]: Failed password for invalid user user from 123.138.18.35 port 32772 ssh2 Sep 3 10:26:12 mail sshd\[10340\]: Invalid user appman from 123.138.18.35 port 47278 Sep 3 10:26:12 mail sshd\[10340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.18.35 |
2019-09-03 16:30:42 |
| 183.99.77.161 | attack | Sep 3 10:39:38 dedicated sshd[14503]: Invalid user juliano from 183.99.77.161 port 14929 |
2019-09-03 16:42:38 |
| 191.53.59.55 | attackbotsspam | Excessive failed login attempts on port 25 |
2019-09-03 16:41:40 |
| 222.188.29.169 | attackbotsspam | 22/tcp [2019-09-03]1pkt |
2019-09-03 16:29:46 |
| 140.148.225.91 | attackspam | Fail2Ban Ban Triggered |
2019-09-03 16:51:15 |
| 188.165.243.31 | attackspambots | Sep 2 22:22:37 web9 sshd\[3666\]: Invalid user bcbackup from 188.165.243.31 Sep 2 22:22:37 web9 sshd\[3666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.243.31 Sep 2 22:22:39 web9 sshd\[3666\]: Failed password for invalid user bcbackup from 188.165.243.31 port 15707 ssh2 Sep 2 22:26:26 web9 sshd\[4435\]: Invalid user pulse from 188.165.243.31 Sep 2 22:26:26 web9 sshd\[4435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.243.31 |
2019-09-03 16:42:08 |
| 190.211.141.217 | attack | Sep 3 09:30:43 mail sshd\[2376\]: Invalid user chwei from 190.211.141.217 port 49161 Sep 3 09:30:43 mail sshd\[2376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.141.217 ... |
2019-09-03 16:48:31 |
| 110.252.46.64 | attackbotsspam | Unauthorised access (Sep 3) SRC=110.252.46.64 LEN=40 TTL=49 ID=44715 TCP DPT=8080 WINDOW=13850 SYN Unauthorised access (Sep 2) SRC=110.252.46.64 LEN=40 TTL=49 ID=28821 TCP DPT=8080 WINDOW=13850 SYN |
2019-09-03 16:51:50 |
| 43.224.212.59 | attackspambots | Sep 2 21:43:34 hanapaa sshd\[27276\]: Invalid user sham from 43.224.212.59 Sep 2 21:43:34 hanapaa sshd\[27276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.224.212.59 Sep 2 21:43:35 hanapaa sshd\[27276\]: Failed password for invalid user sham from 43.224.212.59 port 55868 ssh2 Sep 2 21:48:31 hanapaa sshd\[27735\]: Invalid user beginner from 43.224.212.59 Sep 2 21:48:31 hanapaa sshd\[27735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.224.212.59 |
2019-09-03 15:57:14 |
| 107.170.227.141 | attackspam | Sep 3 10:23:11 meumeu sshd[420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141 Sep 3 10:23:13 meumeu sshd[420]: Failed password for invalid user sameer from 107.170.227.141 port 33354 ssh2 Sep 3 10:27:16 meumeu sshd[904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.227.141 ... |
2019-09-03 16:39:36 |