城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.74.131.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.74.131.93. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:00:01 CST 2025
;; MSG SIZE rcvd: 105
93.131.74.50.in-addr.arpa domain name pointer syn-050-074-131-093.biz.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
93.131.74.50.in-addr.arpa name = syn-050-074-131-093.biz.spectrum.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 219.144.130.208 | attackspam | SQL Injection |
2019-07-07 11:26:19 |
| 23.129.64.150 | attackspam | SSH Brute-Forcing (ownc) |
2019-07-07 10:48:02 |
| 185.211.245.170 | attackspambots | Jul 7 04:20:05 mail postfix/smtpd\[30628\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 7 04:55:58 mail postfix/smtpd\[31119\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 7 04:56:06 mail postfix/smtpd\[31119\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jul 7 04:58:40 mail postfix/smtpd\[31279\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-07-07 11:24:46 |
| 201.72.179.51 | attackbots | detected by Fail2Ban |
2019-07-07 10:43:57 |
| 182.75.201.82 | attack | Jul 7 03:58:30 bouncer sshd\[28977\]: Invalid user he from 182.75.201.82 port 46546 Jul 7 03:58:30 bouncer sshd\[28977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.201.82 Jul 7 03:58:32 bouncer sshd\[28977\]: Failed password for invalid user he from 182.75.201.82 port 46546 ssh2 ... |
2019-07-07 10:49:57 |
| 113.135.55.198 | attackbotsspam | SSH/22 MH Probe, BF, Hack - |
2019-07-07 11:12:40 |
| 92.118.37.43 | attackbots | Jul 7 03:27:15 h2177944 kernel: \[787174.186667\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=18594 PROTO=TCP SPT=49067 DPT=4080 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 7 03:30:49 h2177944 kernel: \[787387.911022\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=57960 PROTO=TCP SPT=49067 DPT=4656 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 7 03:31:32 h2177944 kernel: \[787431.555923\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=28293 PROTO=TCP SPT=49067 DPT=5682 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 7 03:34:55 h2177944 kernel: \[787634.514990\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=58586 PROTO=TCP SPT=49067 DPT=5213 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 7 03:39:32 h2177944 kernel: \[787910.809881\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.43 DST=85.214.117.9 LEN=40 TO |
2019-07-07 10:36:47 |
| 37.139.0.226 | attackbots | Jul 6 18:24:26 aat-srv002 sshd[18159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.0.226 Jul 6 18:24:28 aat-srv002 sshd[18159]: Failed password for invalid user mauricio from 37.139.0.226 port 35424 ssh2 Jul 6 18:27:06 aat-srv002 sshd[18206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.0.226 Jul 6 18:27:08 aat-srv002 sshd[18206]: Failed password for invalid user teamspeak from 37.139.0.226 port 60536 ssh2 ... |
2019-07-07 11:24:10 |
| 3.86.102.162 | attack | Jul 6 23:08:34 TCP Attack: SRC=3.86.102.162 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=235 DF PROTO=TCP SPT=41468 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0 |
2019-07-07 11:25:55 |
| 46.101.27.6 | attackbotsspam | Jul 7 03:42:16 icinga sshd[16818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.27.6 Jul 7 03:42:18 icinga sshd[16818]: Failed password for invalid user scan from 46.101.27.6 port 51358 ssh2 ... |
2019-07-07 11:21:54 |
| 58.57.34.124 | attackbots | Jul 6 15:52:07 josie sshd[3675]: Invalid user icinga from 58.57.34.124 Jul 6 15:52:07 josie sshd[3675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.34.124 Jul 6 15:52:09 josie sshd[3675]: Failed password for invalid user icinga from 58.57.34.124 port 37258 ssh2 Jul 6 15:52:09 josie sshd[3678]: Received disconnect from 58.57.34.124: 11: Bye Bye Jul 6 15:59:55 josie sshd[8461]: Invalid user webmaster from 58.57.34.124 Jul 6 15:59:55 josie sshd[8461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.57.34.124 Jul 6 15:59:57 josie sshd[8461]: Failed password for invalid user webmaster from 58.57.34.124 port 40758 ssh2 Jul 6 15:59:57 josie sshd[8464]: Received disconnect from 58.57.34.124: 11: Bye Bye Jul 6 16:02:41 josie sshd[9917]: Invalid user eddie from 58.57.34.124 Jul 6 16:02:41 josie sshd[9917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=........ ------------------------------- |
2019-07-07 10:43:37 |
| 83.167.38.45 | attack | Jul 6 19:32:30 olgosrv01 sshd[9131]: Invalid user maxreg from 83.167.38.45 Jul 6 19:32:30 olgosrv01 sshd[9131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.167.38.45 Jul 6 19:32:32 olgosrv01 sshd[9131]: Failed password for invalid user maxreg from 83.167.38.45 port 43144 ssh2 Jul 6 19:32:32 olgosrv01 sshd[9131]: Received disconnect from 83.167.38.45: 11: Bye Bye [preauth] Jul 6 19:37:11 olgosrv01 sshd[9539]: Invalid user test from 83.167.38.45 Jul 6 19:37:11 olgosrv01 sshd[9539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.167.38.45 Jul 6 19:37:13 olgosrv01 sshd[9539]: Failed password for invalid user test from 83.167.38.45 port 40794 ssh2 Jul 6 19:37:13 olgosrv01 sshd[9539]: Received disconnect from 83.167.38.45: 11: Bye Bye [preauth] Jul 6 19:39:29 olgosrv01 sshd[9718]: Invalid user webmaster from 83.167.38.45 Jul 6 19:39:29 olgosrv01 sshd[9718]: pam_unix(sshd:aut........ ------------------------------- |
2019-07-07 11:17:20 |
| 112.217.225.59 | attackbotsspam | Tried sshing with brute force. |
2019-07-07 11:15:41 |
| 121.228.54.213 | attack | Jul 7 01:01:51 mxgate1 postfix/postscreen[31845]: CONNECT from [121.228.54.213]:59362 to [176.31.12.44]:25 Jul 7 01:01:51 mxgate1 postfix/dnsblog[31890]: addr 121.228.54.213 listed by domain zen.spamhaus.org as 127.0.0.11 Jul 7 01:01:57 mxgate1 postfix/postscreen[31845]: DNSBL rank 2 for [121.228.54.213]:59362 Jul x@x Jul 7 01:01:59 mxgate1 postfix/postscreen[31845]: DISCONNECT [121.228.54.213]:59362 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=121.228.54.213 |
2019-07-07 10:49:17 |
| 185.220.100.253 | attackbots | Unauthorized SSH login attempts |
2019-07-07 11:06:32 |