城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): Verizon
主机名(hostname): unknown
机构(organization): MCI Communications Services, Inc. d/b/a Verizon Business
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.14.166.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62320
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.14.166.52. IN A
;; AUTHORITY SECTION:
. 2299 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019071801 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 19 02:45:41 CST 2019
;; MSG SIZE rcvd: 116
52.166.14.66.in-addr.arpa domain name pointer static-66-14-166-52.bdsl.frontiernet.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
52.166.14.66.in-addr.arpa name = static-66-14-166-52.bdsl.frontiernet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.83.98.104 | attack | Nov 25 11:23:45 legacy sshd[11730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.98.104 Nov 25 11:23:47 legacy sshd[11730]: Failed password for invalid user ursela from 51.83.98.104 port 45976 ssh2 Nov 25 11:29:54 legacy sshd[11891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.98.104 ... |
2019-11-25 19:04:52 |
| 200.29.216.141 | attackspambots | Unauthorised access (Nov 25) SRC=200.29.216.141 LEN=52 TTL=106 ID=7425 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-25 19:38:55 |
| 101.79.62.143 | attack | Invalid user perry from 101.79.62.143 port 43846 |
2019-11-25 19:26:35 |
| 200.85.170.250 | attackbots | Port 1433 Scan |
2019-11-25 19:30:53 |
| 113.172.40.153 | attack | Nov 25 07:20:42 xeon postfix/smtpd[60558]: warning: unknown[113.172.40.153]: SASL PLAIN authentication failed: authentication failure |
2019-11-25 19:26:02 |
| 113.248.22.122 | attack | scan z |
2019-11-25 19:21:55 |
| 151.80.254.73 | attackspambots | 2019-11-25T10:21:32.354036shield sshd\[4589\]: Invalid user info from 151.80.254.73 port 55744 2019-11-25T10:21:32.358505shield sshd\[4589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.73 2019-11-25T10:21:33.579765shield sshd\[4589\]: Failed password for invalid user info from 151.80.254.73 port 55744 ssh2 2019-11-25T10:28:18.230044shield sshd\[6353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.73 user=root 2019-11-25T10:28:20.188856shield sshd\[6353\]: Failed password for root from 151.80.254.73 port 35318 ssh2 |
2019-11-25 19:37:15 |
| 91.121.157.83 | attack | SSH brute-force: detected 26 distinct usernames within a 24-hour window. |
2019-11-25 19:10:31 |
| 184.75.211.156 | attackspambots | 0,58-01/00 [bc01/m22] PostRequest-Spammer scoring: brussels |
2019-11-25 19:12:59 |
| 140.143.241.251 | attack | Invalid user smmsp from 140.143.241.251 port 52438 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.241.251 Failed password for invalid user smmsp from 140.143.241.251 port 52438 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.241.251 user=root Failed password for root from 140.143.241.251 port 54258 ssh2 |
2019-11-25 19:22:48 |
| 171.251.22.179 | attackbotsspam | Nov 25 12:06:27 icinga sshd[16882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.251.22.179 Nov 25 12:06:29 icinga sshd[16882]: Failed password for invalid user admin from 171.251.22.179 port 54038 ssh2 Nov 25 12:07:52 icinga sshd[18568]: Failed password for root from 171.251.22.179 port 38788 ssh2 ... |
2019-11-25 19:26:18 |
| 54.39.138.251 | attackspambots | 2019-11-25T06:54:01.650919abusebot-3.cloudsearch.cf sshd\[16321\]: Invalid user brochmann from 54.39.138.251 port 39928 |
2019-11-25 19:17:12 |
| 182.156.209.222 | attack | Repeated brute force against a port |
2019-11-25 19:07:39 |
| 123.30.168.123 | attackspam | Automatic report - XMLRPC Attack |
2019-11-25 19:05:44 |
| 123.31.29.203 | attackspambots | 2019-11-25T07:50:31.499013scmdmz1 sshd\[5185\]: Invalid user driva from 123.31.29.203 port 36158 2019-11-25T07:50:31.501646scmdmz1 sshd\[5185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.29.203 2019-11-25T07:50:33.255299scmdmz1 sshd\[5185\]: Failed password for invalid user driva from 123.31.29.203 port 36158 ssh2 ... |
2019-11-25 19:24:43 |