城市(city): Pretoria
省份(region): Gauteng
国家(country): South Africa
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.66.156.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;41.66.156.117. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:22:52 CST 2025
;; MSG SIZE rcvd: 106
117.156.66.41.in-addr.arpa domain name pointer 41-66-156-117-available.africainx.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
117.156.66.41.in-addr.arpa name = 41-66-156-117-available.africainx.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 105.198.236.98 | attackspambots | Unauthorized connection attempt from IP address 105.198.236.98 on Port 445(SMB) |
2019-10-06 02:24:16 |
| 183.82.111.77 | attack | Unauthorized connection attempt from IP address 183.82.111.77 on Port 445(SMB) |
2019-10-06 01:56:26 |
| 77.247.110.225 | attackspambots | \[2019-10-05 13:56:07\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-05T13:56:07.417-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0248701148236518005",SessionID="0x7f1e1c02d9c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.225/53456",ACLName="no_extension_match" \[2019-10-05 13:56:07\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-05T13:56:07.544-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="000290601148525260112",SessionID="0x7f1e1ccade48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.225/53790",ACLName="no_extension_match" \[2019-10-05 13:57:15\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-05T13:57:15.607-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00292401148825681012",SessionID="0x7f1e1c02d9c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.110.225/5526 |
2019-10-06 02:13:40 |
| 95.9.36.91 | attackspambots | Unauthorized connection attempt from IP address 95.9.36.91 on Port 445(SMB) |
2019-10-06 02:15:12 |
| 188.213.174.36 | attackbotsspam | Oct 5 18:03:42 dev0-dcde-rnet sshd[16462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.174.36 Oct 5 18:03:44 dev0-dcde-rnet sshd[16462]: Failed password for invalid user Food2017 from 188.213.174.36 port 37306 ssh2 Oct 5 18:07:28 dev0-dcde-rnet sshd[16485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.174.36 |
2019-10-06 02:13:01 |
| 106.13.56.45 | attackbots | Oct 5 15:43:06 localhost sshd\[16887\]: Invalid user Q1w2e3e4 from 106.13.56.45 port 47632 Oct 5 15:43:06 localhost sshd\[16887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.45 Oct 5 15:43:08 localhost sshd\[16887\]: Failed password for invalid user Q1w2e3e4 from 106.13.56.45 port 47632 ssh2 Oct 5 15:48:29 localhost sshd\[17013\]: Invalid user P4rol412 from 106.13.56.45 port 53156 Oct 5 15:48:29 localhost sshd\[17013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.45 ... |
2019-10-06 02:19:46 |
| 148.70.33.136 | attackbots | Oct 5 20:00:00 cp sshd[7321]: Failed password for root from 148.70.33.136 port 45812 ssh2 Oct 5 20:00:00 cp sshd[7321]: Failed password for root from 148.70.33.136 port 45812 ssh2 |
2019-10-06 02:26:18 |
| 104.131.84.59 | attack | Oct 5 17:26:50 areeb-Workstation sshd[20212]: Failed password for root from 104.131.84.59 port 46982 ssh2 ... |
2019-10-06 02:04:07 |
| 222.186.173.238 | attack | Oct 5 20:13:23 s64-1 sshd[3331]: Failed password for root from 222.186.173.238 port 54852 ssh2 Oct 5 20:13:41 s64-1 sshd[3331]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 54852 ssh2 [preauth] Oct 5 20:13:59 s64-1 sshd[3334]: Failed password for root from 222.186.173.238 port 16472 ssh2 ... |
2019-10-06 02:19:20 |
| 51.68.125.206 | attackspam | Oct 5 20:21:27 vps01 sshd[7251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.125.206 Oct 5 20:21:29 vps01 sshd[7251]: Failed password for invalid user 1 from 51.68.125.206 port 59910 ssh2 |
2019-10-06 02:30:21 |
| 95.173.160.84 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2019-10-06 01:57:06 |
| 182.71.25.186 | attack | Unauthorized connection attempt from IP address 182.71.25.186 on Port 445(SMB) |
2019-10-06 01:58:30 |
| 2.187.131.181 | attackbotsspam | Unauthorized connection attempt from IP address 2.187.131.181 on Port 445(SMB) |
2019-10-06 02:12:22 |
| 49.248.9.158 | attackbots | Unauthorized connection attempt from IP address 49.248.9.158 on Port 445(SMB) |
2019-10-06 02:13:52 |
| 216.83.53.174 | attackbotsspam | Unauthorized connection attempt from IP address 216.83.53.174 on Port 445(SMB) |
2019-10-06 02:04:24 |