城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.42.107.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19686
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;63.42.107.31. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 19:20:35 CST 2025
;; MSG SIZE rcvd: 105
31.107.42.63.in-addr.arpa domain name pointer host31.sub-63-42-107.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
31.107.42.63.in-addr.arpa name = host31.sub-63-42-107.myvzw.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 92.242.240.17 | attackspam | Sep 9 23:50:07 mail sshd\[16071\]: Invalid user zaq12wsx from 92.242.240.17 port 46036 Sep 9 23:50:07 mail sshd\[16071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17 Sep 9 23:50:09 mail sshd\[16071\]: Failed password for invalid user zaq12wsx from 92.242.240.17 port 46036 ssh2 Sep 9 23:56:35 mail sshd\[16916\]: Invalid user test1 from 92.242.240.17 port 52476 Sep 9 23:56:35 mail sshd\[16916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.240.17 |
2019-09-10 07:38:16 |
| 5.36.42.141 | attackspambots | Sep 9 04:56:02 aiointranet sshd\[30365\]: Invalid user admin from 5.36.42.141 Sep 9 04:56:02 aiointranet sshd\[30365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.36.42.141.dynamic-dsl-ip.omantel.net.om Sep 9 04:56:09 aiointranet sshd\[30365\]: Failed password for invalid user admin from 5.36.42.141 port 53225 ssh2 Sep 9 04:56:11 aiointranet sshd\[30365\]: Failed password for invalid user admin from 5.36.42.141 port 53225 ssh2 Sep 9 04:56:13 aiointranet sshd\[30365\]: Failed password for invalid user admin from 5.36.42.141 port 53225 ssh2 |
2019-09-10 07:20:15 |
| 178.128.14.26 | attackbotsspam | $f2bV_matches |
2019-09-10 07:40:54 |
| 185.232.30.130 | attackspam | Sep 9 19:34:50 TCP Attack: SRC=185.232.30.130 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=245 PROTO=TCP SPT=53050 DPT=33997 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-09-10 07:21:21 |
| 41.215.173.59 | attackbots | Sep 9 17:39:17 lnxmail61 postfix/smtpd[14061]: warning: unknown[41.215.173.59]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 9 17:39:17 lnxmail61 postfix/smtpd[14061]: lost connection after AUTH from unknown[41.215.173.59] Sep 9 17:40:54 lnxmail61 postfix/submission/smtpd[18188]: NOQUEUE: reject: RCPT from unknown[41.215.173.59]: 554 5.7.1 |
2019-09-10 06:57:38 |
| 195.64.213.135 | attackspam | [portscan] Port scan |
2019-09-10 06:55:13 |
| 170.210.52.126 | attack | Sep 10 00:15:01 icinga sshd[17423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.52.126 Sep 10 00:15:03 icinga sshd[17423]: Failed password for invalid user web from 170.210.52.126 port 58953 ssh2 ... |
2019-09-10 06:55:30 |
| 200.164.217.210 | attackbots | Sep 10 00:42:12 SilenceServices sshd[25821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.164.217.210 Sep 10 00:42:14 SilenceServices sshd[25821]: Failed password for invalid user ark from 200.164.217.210 port 51041 ssh2 Sep 10 00:49:23 SilenceServices sshd[31253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.164.217.210 |
2019-09-10 07:12:36 |
| 37.187.127.13 | attackspambots | $f2bV_matches |
2019-09-10 07:19:26 |
| 188.15.110.93 | attackspam | Sep 10 00:56:57 SilenceServices sshd[4600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.15.110.93 Sep 10 00:56:59 SilenceServices sshd[4600]: Failed password for invalid user ftpuser from 188.15.110.93 port 64951 ssh2 Sep 10 01:03:19 SilenceServices sshd[9783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.15.110.93 |
2019-09-10 07:13:10 |
| 107.170.109.82 | attack | Sep 9 23:52:11 DAAP sshd[19684]: Invalid user developer from 107.170.109.82 port 57484 Sep 9 23:52:11 DAAP sshd[19684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.109.82 Sep 9 23:52:11 DAAP sshd[19684]: Invalid user developer from 107.170.109.82 port 57484 Sep 9 23:52:13 DAAP sshd[19684]: Failed password for invalid user developer from 107.170.109.82 port 57484 ssh2 Sep 9 23:52:11 DAAP sshd[19684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.109.82 Sep 9 23:52:11 DAAP sshd[19684]: Invalid user developer from 107.170.109.82 port 57484 Sep 9 23:52:13 DAAP sshd[19684]: Failed password for invalid user developer from 107.170.109.82 port 57484 ssh2 ... |
2019-09-10 07:37:06 |
| 217.182.253.230 | attackspam | Sep 9 13:20:59 tdfoods sshd\[10287\]: Invalid user oracle from 217.182.253.230 Sep 9 13:20:59 tdfoods sshd\[10287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=230.ip-217-182-253.eu Sep 9 13:21:01 tdfoods sshd\[10287\]: Failed password for invalid user oracle from 217.182.253.230 port 56056 ssh2 Sep 9 13:26:08 tdfoods sshd\[10850\]: Invalid user redmine from 217.182.253.230 Sep 9 13:26:08 tdfoods sshd\[10850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=230.ip-217-182-253.eu |
2019-09-10 07:27:28 |
| 182.87.137.164 | attack | Sep 9 09:56:37 mailman postfix/smtpd[8536]: warning: unknown[182.87.137.164]: SASL LOGIN authentication failed: authentication failure |
2019-09-10 07:04:56 |
| 177.32.242.93 | attack | Automatic report - Port Scan Attack |
2019-09-10 07:40:01 |
| 36.156.24.43 | attackbots | Sep 10 06:12:54 webhost01 sshd[8241]: Failed password for root from 36.156.24.43 port 43496 ssh2 Sep 10 06:12:56 webhost01 sshd[8241]: Failed password for root from 36.156.24.43 port 43496 ssh2 ... |
2019-09-10 07:32:47 |