城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.111.99.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.111.99.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 22:18:26 CST 2025
;; MSG SIZE rcvd: 107
142.99.111.216.in-addr.arpa domain name pointer 216-111-99-142.dia.static.qwest.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.99.111.216.in-addr.arpa name = 216-111-99-142.dia.static.qwest.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 223.206.236.134 | attack | Automatic report - XMLRPC Attack |
2020-04-27 02:06:30 |
| 188.165.238.199 | attackspam | Apr 26 18:03:42 srv01 sshd[26801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.238.199 user=root Apr 26 18:03:44 srv01 sshd[26801]: Failed password for root from 188.165.238.199 port 49950 ssh2 Apr 26 18:06:54 srv01 sshd[26996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.238.199 user=root Apr 26 18:06:56 srv01 sshd[26996]: Failed password for root from 188.165.238.199 port 46818 ssh2 Apr 26 18:10:06 srv01 sshd[27325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.238.199 user=root Apr 26 18:10:08 srv01 sshd[27325]: Failed password for root from 188.165.238.199 port 43690 ssh2 ... |
2020-04-27 02:13:00 |
| 182.151.52.45 | attackbotsspam | Apr 26 15:18:33 mail sshd[15287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.52.45 Apr 26 15:18:35 mail sshd[15287]: Failed password for invalid user testuser from 182.151.52.45 port 34668 ssh2 Apr 26 15:21:39 mail sshd[15795]: Failed password for root from 182.151.52.45 port 41456 ssh2 |
2020-04-27 02:18:44 |
| 87.246.7.29 | attackbotsspam | (smtpauth) Failed SMTP AUTH login from 87.246.7.29 (BG/Bulgaria/29.0-255.7.246.87.in-addr.arpa): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-26 20:48:01 login authenticator failed for (KbDFFGe04) [87.246.7.29]: 535 Incorrect authentication data (set_id=sales@b-s-pipe.com) |
2020-04-27 01:54:21 |
| 222.186.180.223 | attackbotsspam | Apr 26 19:11:44 combo sshd[29427]: Failed password for root from 222.186.180.223 port 39190 ssh2 Apr 26 19:11:47 combo sshd[29427]: Failed password for root from 222.186.180.223 port 39190 ssh2 Apr 26 19:11:50 combo sshd[29427]: Failed password for root from 222.186.180.223 port 39190 ssh2 ... |
2020-04-27 02:12:31 |
| 13.67.51.182 | attackspambots | Apr 26 14:55:11 server sshd[43319]: Failed password for invalid user ish from 13.67.51.182 port 49092 ssh2 Apr 26 15:00:03 server sshd[46642]: Failed password for invalid user adolfo from 13.67.51.182 port 36302 ssh2 Apr 26 15:04:48 server sshd[50185]: Failed password for invalid user systest from 13.67.51.182 port 51726 ssh2 |
2020-04-27 02:27:48 |
| 111.229.211.78 | attack | 20 attempts against mh-ssh on echoip |
2020-04-27 02:28:08 |
| 182.61.169.8 | attackspam | Repeated brute force against a port |
2020-04-27 02:32:20 |
| 202.63.195.59 | attackbots | Apr 26 11:25:52 XXXXXX sshd[40463]: Invalid user admin from 202.63.195.59 port 52837 |
2020-04-27 02:01:41 |
| 125.161.139.52 | attackbots | 125.161.139.52 - - \[26/Apr/2020:05:00:00 -0700\] "POST /index.php/admin/ HTTP/1.1" 404 20411125.161.139.52 - - \[26/Apr/2020:05:00:00 -0700\] "POST /index.php/admin/index/ HTTP/1.1" 404 20435125.161.139.52 - - \[26/Apr/2020:05:00:01 -0700\] "POST /index.php/admin/sales_order/ HTTP/1.1" 404 20459 ... |
2020-04-27 02:08:51 |
| 114.67.69.80 | attack | Apr 26 15:34:32 [host] sshd[2503]: Invalid user ce Apr 26 15:34:32 [host] sshd[2503]: pam_unix(sshd:a Apr 26 15:34:35 [host] sshd[2503]: Failed password |
2020-04-27 01:58:13 |
| 218.92.0.184 | attackspam | Brute force attempt |
2020-04-27 02:18:18 |
| 106.12.168.83 | attack | Apr 26 11:51:47 XXXXXX sshd[40937]: Invalid user cj from 106.12.168.83 port 58490 |
2020-04-27 02:00:00 |
| 45.83.64.101 | attack | DNS named version attempt |
2020-04-27 02:11:49 |
| 103.214.128.5 | attackspam | Unauthorized connection attempt from IP address 103.214.128.5 on Port 445(SMB) |
2020-04-27 01:53:27 |