城市(city): Whitehorse
省份(region): Yukon
国家(country): Canada
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 50.117.139.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;50.117.139.142. IN A
;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:45:38 CST 2021
;; MSG SIZE rcvd: 43
'
142.139.117.50.in-addr.arpa domain name pointer d50-117-139-142.yt.northwestel.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.139.117.50.in-addr.arpa name = d50-117-139-142.yt.northwestel.net.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
144.48.227.74 | attackspam | Aug 30 07:58:56 haigwepa sshd[29799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.227.74 Aug 30 07:58:58 haigwepa sshd[29799]: Failed password for invalid user wzr from 144.48.227.74 port 39974 ssh2 ... |
2020-08-30 14:04:33 |
125.109.130.99 | attackbotsspam | [portscan] Port scan |
2020-08-30 13:49:30 |
218.92.0.175 | attackspam | Aug 30 07:22:08 piServer sshd[30656]: Failed password for root from 218.92.0.175 port 30362 ssh2 Aug 30 07:22:12 piServer sshd[30656]: Failed password for root from 218.92.0.175 port 30362 ssh2 Aug 30 07:22:16 piServer sshd[30656]: Failed password for root from 218.92.0.175 port 30362 ssh2 Aug 30 07:22:21 piServer sshd[30656]: Failed password for root from 218.92.0.175 port 30362 ssh2 ... |
2020-08-30 13:26:06 |
42.176.243.180 | attackbots | Port probing on unauthorized port 23 |
2020-08-30 13:33:28 |
129.204.19.9 | attackspambots | Aug 30 07:32:55 hosting sshd[25440]: Invalid user nrg from 129.204.19.9 port 51770 ... |
2020-08-30 13:44:55 |
123.135.163.2 | attack |
|
2020-08-30 13:50:10 |
153.179.13.173 | attackspam | Aug 30 06:15:40 meumeu sshd[614956]: Invalid user oracle from 153.179.13.173 port 57253 Aug 30 06:15:40 meumeu sshd[614956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.179.13.173 Aug 30 06:15:40 meumeu sshd[614956]: Invalid user oracle from 153.179.13.173 port 57253 Aug 30 06:15:42 meumeu sshd[614956]: Failed password for invalid user oracle from 153.179.13.173 port 57253 ssh2 Aug 30 06:16:27 meumeu sshd[614972]: Invalid user za from 153.179.13.173 port 57264 Aug 30 06:16:27 meumeu sshd[614972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.179.13.173 Aug 30 06:16:27 meumeu sshd[614972]: Invalid user za from 153.179.13.173 port 57264 Aug 30 06:16:30 meumeu sshd[614972]: Failed password for invalid user za from 153.179.13.173 port 57264 ssh2 Aug 30 06:16:54 meumeu sshd[614980]: Invalid user liangyzh from 153.179.13.173 port 61474 ... |
2020-08-30 13:27:07 |
192.99.245.135 | attackbotsspam | Invalid user venkat from 192.99.245.135 port 49810 |
2020-08-30 13:39:25 |
218.92.0.250 | attack | Aug 30 07:17:27 ovpn sshd\[14865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250 user=root Aug 30 07:17:29 ovpn sshd\[14865\]: Failed password for root from 218.92.0.250 port 5403 ssh2 Aug 30 07:17:32 ovpn sshd\[14865\]: Failed password for root from 218.92.0.250 port 5403 ssh2 Aug 30 07:17:36 ovpn sshd\[14865\]: Failed password for root from 218.92.0.250 port 5403 ssh2 Aug 30 07:17:47 ovpn sshd\[14977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.250 user=root |
2020-08-30 13:24:20 |
121.13.252.50 | attack | port scan hack attempt |
2020-08-30 13:31:07 |
125.124.1.189 | attackspambots | Multiple SSH authentication failures from 125.124.1.189 |
2020-08-30 13:22:09 |
36.69.93.227 | attackspam | Port probing on unauthorized port 445 |
2020-08-30 13:37:07 |
181.40.76.162 | attackbots | Invalid user huw from 181.40.76.162 port 58154 |
2020-08-30 13:40:49 |
36.110.27.122 | attackspambots | Aug 30 07:37:48 abendstille sshd\[30496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.27.122 user=root Aug 30 07:37:51 abendstille sshd\[30496\]: Failed password for root from 36.110.27.122 port 59632 ssh2 Aug 30 07:42:46 abendstille sshd\[3247\]: Invalid user ye from 36.110.27.122 Aug 30 07:42:46 abendstille sshd\[3247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.27.122 Aug 30 07:42:48 abendstille sshd\[3247\]: Failed password for invalid user ye from 36.110.27.122 port 56928 ssh2 ... |
2020-08-30 14:05:17 |
61.177.172.54 | attackbotsspam | Aug 30 05:50:22 hcbbdb sshd\[6057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54 user=root Aug 30 05:50:25 hcbbdb sshd\[6057\]: Failed password for root from 61.177.172.54 port 45221 ssh2 Aug 30 05:50:28 hcbbdb sshd\[6057\]: Failed password for root from 61.177.172.54 port 45221 ssh2 Aug 30 05:50:32 hcbbdb sshd\[6057\]: Failed password for root from 61.177.172.54 port 45221 ssh2 Aug 30 05:50:36 hcbbdb sshd\[6057\]: Failed password for root from 61.177.172.54 port 45221 ssh2 |
2020-08-30 13:56:37 |