城市(city): Jersey City
省份(region): New Jersey
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): MegaPath Corporation
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.134.26.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10768
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.134.26.62. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019053100 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 31 19:37:41 CST 2019
;; MSG SIZE rcvd: 116
62.26.134.66.in-addr.arpa domain name pointer h-66-134-26-62.nycm.ny.globalcapacity.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
62.26.134.66.in-addr.arpa name = h-66-134-26-62.nycm.ny.globalcapacity.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 186.154.39.224 | attackbotsspam | Auto Detect Rule! proto TCP (SYN), 186.154.39.224:59562->gjan.info:23, len 40 |
2020-09-16 21:33:03 |
| 60.243.173.65 | attack | Auto Detect Rule! proto TCP (SYN), 60.243.173.65:12945->gjan.info:23, len 40 |
2020-09-16 21:39:52 |
| 31.7.62.32 | attackspam | Port scan denied |
2020-09-16 21:50:34 |
| 138.91.89.115 | attackbots | Sep 16 09:21:40 ny01 sshd[8472]: Failed password for root from 138.91.89.115 port 39952 ssh2 Sep 16 09:28:49 ny01 sshd[9862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.91.89.115 Sep 16 09:28:51 ny01 sshd[9862]: Failed password for invalid user ftpuser from 138.91.89.115 port 53480 ssh2 |
2020-09-16 21:35:33 |
| 185.39.11.32 | attackspam | Sep 16 15:29:40 [host] kernel: [595034.751260] [UF Sep 16 15:30:21 [host] kernel: [595075.653715] [UF Sep 16 15:35:19 [host] kernel: [595374.079994] [UF Sep 16 15:38:41 [host] kernel: [595575.618198] [UF Sep 16 15:39:23 [host] kernel: [595617.784168] [UF Sep 16 15:43:24 [host] kernel: [595859.113980] [UF |
2020-09-16 21:46:47 |
| 27.5.22.215 | attackbotsspam | Auto Detect Rule! proto TCP (SYN), 27.5.22.215:60608->gjan.info:23, len 40 |
2020-09-16 21:16:12 |
| 144.202.44.255 | attack |
|
2020-09-16 21:28:44 |
| 115.96.254.190 | attackbotsspam | Auto Detect Rule! proto TCP (SYN), 115.96.254.190:12236->gjan.info:23, len 40 |
2020-09-16 21:31:48 |
| 76.186.73.35 | attackbots | Sep 16 11:30:36 ns3033917 sshd[2857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.186.73.35 user=root Sep 16 11:30:38 ns3033917 sshd[2857]: Failed password for root from 76.186.73.35 port 57459 ssh2 Sep 16 11:38:53 ns3033917 sshd[2901]: Invalid user maya from 76.186.73.35 port 35613 ... |
2020-09-16 21:25:44 |
| 220.128.102.12 | attackbots | Unauthorized connection attempt from IP address 220.128.102.12 on Port 445(SMB) |
2020-09-16 21:26:37 |
| 116.232.49.123 | attackbots | Unauthorized connection attempt from IP address 116.232.49.123 on Port 445(SMB) |
2020-09-16 21:25:20 |
| 82.148.31.110 | attackbots | 1,06-00/00 [bc00/m01] PostRequest-Spammer scoring: stockholm |
2020-09-16 21:47:37 |
| 116.89.93.209 | attackbots | Sep 15 17:00:28 scw-focused-cartwright sshd[10152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.89.93.209 Sep 15 17:00:30 scw-focused-cartwright sshd[10152]: Failed password for invalid user admin from 116.89.93.209 port 39548 ssh2 |
2020-09-16 21:38:29 |
| 180.249.166.2 | attack | Unauthorized connection attempt from IP address 180.249.166.2 on Port 445(SMB) |
2020-09-16 21:42:37 |
| 187.135.19.68 | attackbots | Unauthorized connection attempt from IP address 187.135.19.68 on Port 445(SMB) |
2020-09-16 21:37:39 |