城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.140.213.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43010
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.140.213.86. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025063000 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 19:55:25 CST 2025
;; MSG SIZE rcvd: 106
86.213.140.50.in-addr.arpa domain name pointer c-50-140-213-86.hsd1.fl.comcast.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
86.213.140.50.in-addr.arpa name = c-50-140-213-86.hsd1.fl.comcast.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 142.93.68.181 | attackbots |
|
2020-09-21 07:47:37 |
| 54.37.6.190 | attackspambots | Sep 21 00:02:14 root sshd[11720]: Invalid user netman from 54.37.6.190 ... |
2020-09-21 07:41:21 |
| 42.3.166.83 | attackspam | Sep 20 14:00:46 logopedia-1vcpu-1gb-nyc1-01 sshd[442878]: Invalid user admin from 42.3.166.83 port 54225 ... |
2020-09-21 07:47:05 |
| 211.149.132.104 | attackbotsspam | Blocked by Sophos UTM Network Protection . / / proto=6 . srcport=51363 . dstport=2375 . (2317) |
2020-09-21 07:41:52 |
| 119.82.135.244 | attack | Sep 21 02:04:55 www4 sshd\[40654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.82.135.244 user=root Sep 21 02:04:57 www4 sshd\[40654\]: Failed password for root from 119.82.135.244 port 49420 ssh2 Sep 21 02:09:41 www4 sshd\[41208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.82.135.244 user=root ... |
2020-09-21 07:47:56 |
| 167.71.187.10 | attackbots | Sep 20 23:06:21 vps639187 sshd\[2055\]: Invalid user admin from 167.71.187.10 port 56348 Sep 20 23:06:22 vps639187 sshd\[2055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.187.10 Sep 20 23:06:24 vps639187 sshd\[2055\]: Failed password for invalid user admin from 167.71.187.10 port 56348 ssh2 ... |
2020-09-21 08:06:16 |
| 201.208.27.137 | attackbotsspam | Unauthorized connection attempt from IP address 201.208.27.137 on Port 445(SMB) |
2020-09-21 08:02:21 |
| 212.70.149.52 | attackbotsspam | 2020-09-21 05:35:48 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=gs@no-server.de\) 2020-09-21 05:36:13 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=test01@no-server.de\) 2020-09-21 05:36:39 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=oslo-gw7@no-server.de\) 2020-09-21 05:37:05 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=pxe@no-server.de\) 2020-09-21 05:37:56 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=firmy@no-server.de\) 2020-09-21 05:38:21 dovecot_login authenticator failed for \(User\) \[212.70.149.52\]: 535 Incorrect authentication data \(set_id=adams@no-server.de\) ... |
2020-09-21 12:00:43 |
| 201.186.243.225 | attackspam | Sep 20 21:07:09 vps639187 sshd\[32343\]: Invalid user cablecom from 201.186.243.225 port 47286 Sep 20 21:07:09 vps639187 sshd\[32343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.186.243.225 Sep 20 21:07:11 vps639187 sshd\[32343\]: Failed password for invalid user cablecom from 201.186.243.225 port 47286 ssh2 ... |
2020-09-21 12:01:16 |
| 82.135.215.105 | attackbots | Unauthorized connection attempt from IP address 82.135.215.105 on Port 445(SMB) |
2020-09-21 07:46:39 |
| 201.26.164.160 | attack | Sep 20 14:00:52 logopedia-1vcpu-1gb-nyc1-01 sshd[442898]: Failed password for root from 201.26.164.160 port 40658 ssh2 ... |
2020-09-21 07:36:09 |
| 88.102.242.217 | attackbotsspam | Sep 20 18:00:52 blackbee postfix/smtpd[4198]: NOQUEUE: reject: RCPT from 217.242.broadband7.iol.cz[88.102.242.217]: 554 5.7.1 Service unavailable; Client host [88.102.242.217] blocked using cbl.abuseat.org; Blocked - see http://www.abuseat.org/lookup.cgi?ip=88.102.242.217; from= |
2020-09-21 07:39:31 |
| 2607:f298:5:110b::658:603b | attackspam | 2607:f298:5:110b::658:603b - - [20/Sep/2020:19:16:04 +0100] "POST /wp-login.php HTTP/1.1" 200 2252 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 2607:f298:5:110b::658:603b - - [20/Sep/2020:19:16:06 +0100] "POST /wp-login.php HTTP/1.1" 200 2231 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 2607:f298:5:110b::658:603b - - [20/Sep/2020:19:16:07 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-09-21 07:38:13 |
| 141.98.81.154 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 22 proto: tcp cat: Misc Attackbytes: 74 |
2020-09-21 07:53:38 |
| 117.50.77.220 | attackspam | invalid user student1 from 117.50.77.220 port 47456 ssh2 |
2020-09-21 07:29:52 |