城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.16.64.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14840
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.16.64.40. IN A
;; AUTHORITY SECTION:
. 96 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 208 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:05:04 CST 2022
;; MSG SIZE rcvd: 105
40.64.16.199.in-addr.arpa domain name pointer www.nga.gov.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.64.16.199.in-addr.arpa name = www.nga.gov.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 58.33.31.174 | attackspambots | May 16 02:44:52 Ubuntu-1404-trusty-64-minimal sshd\[14337\]: Invalid user roro from 58.33.31.174 May 16 02:44:52 Ubuntu-1404-trusty-64-minimal sshd\[14337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.31.174 May 16 02:44:53 Ubuntu-1404-trusty-64-minimal sshd\[14337\]: Failed password for invalid user roro from 58.33.31.174 port 11471 ssh2 May 16 02:48:22 Ubuntu-1404-trusty-64-minimal sshd\[15565\]: Invalid user srvadmin from 58.33.31.174 May 16 02:48:22 Ubuntu-1404-trusty-64-minimal sshd\[15565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.31.174 |
2020-05-17 00:00:29 |
| 192.144.164.134 | attackbotsspam | prod6 ... |
2020-05-17 00:45:38 |
| 176.31.255.63 | attackbots | Invalid user adela from 176.31.255.63 port 58449 |
2020-05-17 00:54:34 |
| 77.78.14.146 | attackspam | 1589393524 - 05/13/2020 20:12:04 Host: 77.78.14.146/77.78.14.146 Port: 8080 TCP Blocked |
2020-05-17 00:24:27 |
| 191.184.42.175 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-05-17 00:25:30 |
| 205.185.117.22 | attackspambots | Invalid user fake from 205.185.117.22 port 60620 |
2020-05-17 00:08:52 |
| 211.23.125.95 | attackbotsspam | 2020-05-15 20:43:47.410209-0500 localhost sshd[31572]: Failed password for invalid user odoo from 211.23.125.95 port 45602 ssh2 |
2020-05-17 00:02:38 |
| 61.177.172.128 | attack | May 16 08:53:14 abendstille sshd\[21699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128 user=root May 16 08:53:16 abendstille sshd\[21699\]: Failed password for root from 61.177.172.128 port 7545 ssh2 May 16 08:53:33 abendstille sshd\[22094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128 user=root May 16 08:53:35 abendstille sshd\[22094\]: Failed password for root from 61.177.172.128 port 31997 ssh2 May 16 08:53:55 abendstille sshd\[22269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128 user=root ... |
2020-05-17 00:36:16 |
| 222.186.180.17 | attack | May 16 04:45:12 vserver sshd\[31726\]: Failed password for root from 222.186.180.17 port 21376 ssh2May 16 04:45:15 vserver sshd\[31726\]: Failed password for root from 222.186.180.17 port 21376 ssh2May 16 04:45:18 vserver sshd\[31726\]: Failed password for root from 222.186.180.17 port 21376 ssh2May 16 04:45:21 vserver sshd\[31726\]: Failed password for root from 222.186.180.17 port 21376 ssh2 ... |
2020-05-17 00:03:26 |
| 111.7.100.16 | attack | Unauthorized connection attempt detected from IP address 111.7.100.16 to port 81 |
2020-05-17 00:21:18 |
| 198.108.67.29 | attackbotsspam | Automatic report - Banned IP Access |
2020-05-17 00:04:11 |
| 67.205.142.246 | attack | May 15 13:29:20 mail sshd\[26294\]: Invalid user administrator from 67.205.142.246 May 15 13:29:20 mail sshd\[26294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.142.246 ... |
2020-05-17 00:34:02 |
| 118.70.109.185 | attack | May 15 20:10:05 Host-KEWR-E sshd[12501]: Disconnected from invalid user unreal 118.70.109.185 port 47482 [preauth] ... |
2020-05-17 00:17:09 |
| 183.82.48.34 | attack | Attempted connection to ports 22, 8291, 8728. |
2020-05-17 00:31:39 |
| 209.85.220.41 | attack | Sending out 419 type spam emails from IP 209.85.220.41 (Google.com) "Congratulations Dear Winner, We are pleased to inform you of the result of the just concluded annual final draws held by Facebook Lottery Group in Cash Promotion to encourage the usage of Facebook world wide.The online international lotto promo draws was conducted from an exclusive list of 50,000.00 companies/ corporate bodies and 30.000.000 individual users email addresses from Europe, North & South America, Asia, Australia, New Zealand, Middle-East and Africa, were picked by an "Advanced Automated Random Computer Search Machine" from the Facebook Platform. This is a millennium scientific computer which was used. It is a promotional program aimed at encouraging Facebook Users; therefore you do not need to buy ticket to enter for it. "NO TICKETS WERE SOLD"." |
2020-05-17 00:17:45 |