城市(city): Fort Wayne
省份(region): Indiana
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.102.144.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.102.144.68. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 08:11:52 CST 2025
;; MSG SIZE rcvd: 106
68.144.102.50.in-addr.arpa domain name pointer 50-102-144-68.ekht.in.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.144.102.50.in-addr.arpa name = 50-102-144-68.ekht.in.frontiernet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 58.87.67.226 | attackspam | Oct 10 10:14:23 sauna sshd[73133]: Failed password for root from 58.87.67.226 port 55718 ssh2 ... |
2019-10-10 18:03:21 |
| 141.98.10.61 | attack | Oct 10 08:12:53 heicom postfix/smtpd\[22505\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure Oct 10 08:38:22 heicom postfix/smtpd\[24234\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure Oct 10 09:04:00 heicom postfix/smtpd\[24234\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure Oct 10 09:29:34 heicom postfix/smtpd\[24429\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure Oct 10 09:55:21 heicom postfix/smtpd\[25606\]: warning: unknown\[141.98.10.61\]: SASL LOGIN authentication failed: authentication failure ... |
2019-10-10 18:42:20 |
| 111.246.26.195 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 04:45:18. |
2019-10-10 18:41:04 |
| 212.224.124.75 | attackbots | Oct 10 00:38:24 kapalua sshd\[31331\]: Invalid user Caramba@321 from 212.224.124.75 Oct 10 00:38:24 kapalua sshd\[31331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsde406-1.fornex.org Oct 10 00:38:26 kapalua sshd\[31331\]: Failed password for invalid user Caramba@321 from 212.224.124.75 port 54402 ssh2 Oct 10 00:42:17 kapalua sshd\[31810\]: Invalid user Ten2017 from 212.224.124.75 Oct 10 00:42:17 kapalua sshd\[31810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsde406-1.fornex.org |
2019-10-10 18:48:43 |
| 112.220.85.26 | attackspam | Automatic report - Banned IP Access |
2019-10-10 18:16:57 |
| 163.172.207.104 | attackbotsspam | \[2019-10-10 02:01:14\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-10T02:01:14.026-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="6100011972592277524",SessionID="0x7fc3ac8f6cd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/52070",ACLName="no_extension_match" \[2019-10-10 02:01:47\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-10T02:01:47.360-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011972595725636",SessionID="0x7fc3ac8f6cd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/55049",ACLName="no_extension_match" \[2019-10-10 02:05:29\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-10T02:05:29.562-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="7100011972592277524",SessionID="0x7fc3ac8f6cd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/62996",A |
2019-10-10 18:10:32 |
| 1.170.111.97 | attack | Port Scan: TCP/23 |
2019-10-10 18:22:35 |
| 14.157.138.242 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/14.157.138.242/ CN - 1H : (511) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4134 IP : 14.157.138.242 CIDR : 14.156.0.0/14 PREFIX COUNT : 5430 UNIQUE IP COUNT : 106919680 WYKRYTE ATAKI Z ASN4134 : 1H - 11 3H - 37 6H - 65 12H - 113 24H - 226 DateTime : 2019-10-10 05:45:47 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-10 18:22:16 |
| 42.113.91.142 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 04:45:22. |
2019-10-10 18:34:49 |
| 189.112.109.189 | attackbots | Oct 10 11:57:41 DAAP sshd[7674]: Invalid user Renault@123 from 189.112.109.189 port 49815 ... |
2019-10-10 18:29:23 |
| 132.232.125.152 | attackbotsspam | Oct 10 04:39:09 plusreed sshd[10580]: Invalid user 2018@2018 from 132.232.125.152 ... |
2019-10-10 18:19:31 |
| 66.70.189.209 | attack | Oct 10 06:34:47 dedicated sshd[2272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.209 user=root Oct 10 06:34:49 dedicated sshd[2272]: Failed password for root from 66.70.189.209 port 49187 ssh2 |
2019-10-10 18:08:15 |
| 36.90.18.199 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 10-10-2019 04:45:22. |
2019-10-10 18:35:17 |
| 188.166.251.87 | attackspam | Oct 9 21:56:05 wbs sshd\[10280\]: Invalid user Admin@800 from 188.166.251.87 Oct 9 21:56:05 wbs sshd\[10280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87 Oct 9 21:56:06 wbs sshd\[10280\]: Failed password for invalid user Admin@800 from 188.166.251.87 port 47340 ssh2 Oct 9 22:00:46 wbs sshd\[10664\]: Invalid user 5TGB6YHN7UJM from 188.166.251.87 Oct 9 22:00:46 wbs sshd\[10664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87 |
2019-10-10 18:05:43 |
| 123.206.80.113 | attack | Oct 10 07:01:31 www sshd\[14712\]: Failed password for root from 123.206.80.113 port 39358 ssh2Oct 10 07:05:38 www sshd\[14757\]: Failed password for root from 123.206.80.113 port 43836 ssh2Oct 10 07:09:49 www sshd\[14841\]: Failed password for root from 123.206.80.113 port 48324 ssh2 ... |
2019-10-10 18:48:55 |