城市(city): Hillsboro
省份(region): Oregon
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.20.29.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53091
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;24.20.29.71. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:10:28 CST 2025
;; MSG SIZE rcvd: 104
71.29.20.24.in-addr.arpa domain name pointer c-24-20-29-71.hsd1.or.comcast.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
71.29.20.24.in-addr.arpa name = c-24-20-29-71.hsd1.or.comcast.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 69.17.153.139 | attackspambots | 2019-12-15T10:17:10.262506scmdmz1 sshd\[2151\]: Invalid user kt from 69.17.153.139 port 37769 2019-12-15T10:17:10.266081scmdmz1 sshd\[2151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.17.153.139 2019-12-15T10:17:12.274398scmdmz1 sshd\[2151\]: Failed password for invalid user kt from 69.17.153.139 port 37769 ssh2 ... |
2019-12-15 17:33:09 |
| 158.69.121.200 | attack | \[2019-12-15 03:37:01\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-15T03:37:01.942-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0046423112971",SessionID="0x7f0fb4fbea58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.121.200/65454",ACLName="no_extension_match" \[2019-12-15 03:37:32\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-15T03:37:32.429-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146423112971",SessionID="0x7f0fb447f838",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.121.200/53752",ACLName="no_extension_match" \[2019-12-15 03:38:03\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-15T03:38:03.906-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146423112971",SessionID="0x7f0fb462f398",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.121.200/59204",ACLName="no_ext |
2019-12-15 17:02:05 |
| 37.49.227.109 | attack | 161/udp 5353/udp 17/udp... [2019-10-14/12-15]297pkt,2pt.(tcp),25pt.(udp) |
2019-12-15 17:04:24 |
| 112.85.42.89 | attackbots | 2019-12-15T10:25:38.846417scmdmz1 sshd\[3005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89 user=root 2019-12-15T10:25:40.592205scmdmz1 sshd\[3005\]: Failed password for root from 112.85.42.89 port 62386 ssh2 2019-12-15T10:25:43.131360scmdmz1 sshd\[3005\]: Failed password for root from 112.85.42.89 port 62386 ssh2 ... |
2019-12-15 17:39:13 |
| 112.85.42.173 | attack | Fail2Ban - SSH Bruteforce Attempt |
2019-12-15 17:20:10 |
| 104.245.144.42 | attackspambots | (From joesph.merrett@outlook.com) Do you want to post your business on 1000's of Advertising sites monthly? One tiny investment every month will get you virtually unlimited traffic to your site forever! Check out our site for details: http://www.postyouradsontonsofsites.xyz |
2019-12-15 17:18:29 |
| 210.245.26.142 | attack | Dec 15 09:23:35 mc1 kernel: \[557042.726772\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=210.245.26.142 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=63968 PROTO=TCP SPT=56123 DPT=6958 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 15 09:27:10 mc1 kernel: \[557257.980477\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=210.245.26.142 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=47200 PROTO=TCP SPT=56123 DPT=6920 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 15 09:28:56 mc1 kernel: \[557363.543392\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=210.245.26.142 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=3563 PROTO=TCP SPT=56123 DPT=7909 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-12-15 17:17:18 |
| 98.143.148.45 | attackbotsspam | detected by Fail2Ban |
2019-12-15 17:28:35 |
| 138.36.204.234 | attack | Fail2Ban - SSH Bruteforce Attempt |
2019-12-15 17:37:41 |
| 143.208.181.35 | attackspam | Dec 15 07:21:47 ns382633 sshd\[15735\]: Invalid user iii from 143.208.181.35 port 54142 Dec 15 07:21:47 ns382633 sshd\[15735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.208.181.35 Dec 15 07:21:50 ns382633 sshd\[15735\]: Failed password for invalid user iii from 143.208.181.35 port 54142 ssh2 Dec 15 07:28:03 ns382633 sshd\[16671\]: Invalid user maitrayee from 143.208.181.35 port 34368 Dec 15 07:28:03 ns382633 sshd\[16671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.208.181.35 |
2019-12-15 17:17:44 |
| 176.106.140.241 | attack | [portscan] Port scan |
2019-12-15 17:05:16 |
| 167.86.103.240 | attack | Unauthorized connection attempt detected from IP address 167.86.103.240 to port 993 |
2019-12-15 17:34:27 |
| 77.199.87.64 | attackspambots | Dec 15 09:23:55 MK-Soft-VM8 sshd[10242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.199.87.64 Dec 15 09:23:56 MK-Soft-VM8 sshd[10242]: Failed password for invalid user emiko from 77.199.87.64 port 44984 ssh2 ... |
2019-12-15 17:26:11 |
| 138.68.82.220 | attack | Dec 15 10:07:45 markkoudstaal sshd[32069]: Failed password for root from 138.68.82.220 port 49690 ssh2 Dec 15 10:13:14 markkoudstaal sshd[457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.220 Dec 15 10:13:16 markkoudstaal sshd[457]: Failed password for invalid user dovecot from 138.68.82.220 port 58050 ssh2 |
2019-12-15 17:16:48 |
| 50.192.49.5 | attackspambots | Autoban 50.192.49.5 AUTH/CONNECT |
2019-12-15 17:22:19 |