城市(city): Redding
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): Shasta County Office of Education
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.244.41.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4037
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.244.41.198. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019061200 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 16:33:45 CST 2019
;; MSG SIZE rcvd: 117
198.41.244.66.in-addr.arpa domain name pointer 66-244-41-198.static.suhsd.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
198.41.244.66.in-addr.arpa name = 66-244-41-198.static.suhsd.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 51.38.126.92 | attack | Dec 18 18:40:31 sd-53420 sshd\[24320\]: Invalid user ser from 51.38.126.92 Dec 18 18:40:31 sd-53420 sshd\[24320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.126.92 Dec 18 18:40:34 sd-53420 sshd\[24320\]: Failed password for invalid user ser from 51.38.126.92 port 50652 ssh2 Dec 18 18:46:03 sd-53420 sshd\[26469\]: Invalid user pedley from 51.38.126.92 Dec 18 18:46:03 sd-53420 sshd\[26469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.126.92 ... |
2019-12-19 01:56:54 |
| 222.186.175.147 | attackbotsspam | Dec 18 07:36:25 auw2 sshd\[18413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147 user=root Dec 18 07:36:27 auw2 sshd\[18413\]: Failed password for root from 222.186.175.147 port 31578 ssh2 Dec 18 07:36:43 auw2 sshd\[18427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147 user=root Dec 18 07:36:45 auw2 sshd\[18427\]: Failed password for root from 222.186.175.147 port 53392 ssh2 Dec 18 07:36:49 auw2 sshd\[18427\]: Failed password for root from 222.186.175.147 port 53392 ssh2 |
2019-12-19 01:45:54 |
| 103.3.226.230 | attackbotsspam | Dec 18 17:33:17 ns382633 sshd\[30368\]: Invalid user jxd786 from 103.3.226.230 port 51174 Dec 18 17:33:17 ns382633 sshd\[30368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.230 Dec 18 17:33:19 ns382633 sshd\[30368\]: Failed password for invalid user jxd786 from 103.3.226.230 port 51174 ssh2 Dec 18 17:51:31 ns382633 sshd\[1382\]: Invalid user patrickm from 103.3.226.230 port 41774 Dec 18 17:51:31 ns382633 sshd\[1382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.230 |
2019-12-19 01:48:30 |
| 150.95.199.179 | attackbots | $f2bV_matches |
2019-12-19 01:54:19 |
| 212.237.25.99 | attack | Dec 16 02:29:29 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 212.237.25.99 port 47278 ssh2 (target: 158.69.100.155:22, password: r.r) Dec 16 02:29:30 wildwolf ssh-honeypotd[26164]: Failed password for admin from 212.237.25.99 port 48716 ssh2 (target: 158.69.100.155:22, password: admin) Dec 16 02:29:31 wildwolf ssh-honeypotd[26164]: Failed password for admin from 212.237.25.99 port 49936 ssh2 (target: 158.69.100.155:22, password: 1234) Dec 16 02:29:32 wildwolf ssh-honeypotd[26164]: Failed password for user from 212.237.25.99 port 51088 ssh2 (target: 158.69.100.155:22, password: user) Dec 16 02:29:33 wildwolf ssh-honeypotd[26164]: Failed password for ubnt from 212.237.25.99 port 52458 ssh2 (target: 158.69.100.155:22, password: ubnt) Dec 16 02:29:34 wildwolf ssh-honeypotd[26164]: Failed password for admin from 212.237.25.99 port 53658 ssh2 (target: 158.69.100.155:22, password: password) Dec 16 02:29:36 wildwolf ssh-honeypotd[26164]: Failed password for guest ........ ------------------------------ |
2019-12-19 02:12:38 |
| 37.187.120.96 | attackspam | Dec 18 17:20:42 mail sshd[27254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.120.96 Dec 18 17:20:44 mail sshd[27254]: Failed password for invalid user raymundo from 37.187.120.96 port 48162 ssh2 Dec 18 17:27:12 mail sshd[28216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.120.96 |
2019-12-19 01:57:17 |
| 87.67.213.23 | attackbotsspam | 2019-12-18T17:34:47.207726centos sshd\[26805\]: Invalid user mother from 87.67.213.23 port 46516 2019-12-18T17:34:47.264939centos sshd\[26805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.213-67-87.adsl-dyn.isp.belgacom.be 2019-12-18T17:34:48.949539centos sshd\[26805\]: Failed password for invalid user mother from 87.67.213.23 port 46516 ssh2 |
2019-12-19 02:06:09 |
| 145.255.239.178 | attack | [portscan] Port scan |
2019-12-19 02:02:22 |
| 51.83.249.63 | attackspam | Dec 18 07:38:39 php1 sshd\[11059\]: Invalid user 111111111 from 51.83.249.63 Dec 18 07:38:39 php1 sshd\[11059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.249.63 Dec 18 07:38:41 php1 sshd\[11059\]: Failed password for invalid user 111111111 from 51.83.249.63 port 46798 ssh2 Dec 18 07:43:56 php1 sshd\[11843\]: Invalid user 666666666 from 51.83.249.63 Dec 18 07:43:56 php1 sshd\[11843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.249.63 |
2019-12-19 01:52:07 |
| 79.109.239.218 | attack | Dec 18 07:30:42 eddieflores sshd\[7192\]: Invalid user apidath from 79.109.239.218 Dec 18 07:30:42 eddieflores sshd\[7192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.109.239.218.dyn.user.ono.com Dec 18 07:30:44 eddieflores sshd\[7192\]: Failed password for invalid user apidath from 79.109.239.218 port 48020 ssh2 Dec 18 07:36:53 eddieflores sshd\[7725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.109.239.218.dyn.user.ono.com user=root Dec 18 07:36:55 eddieflores sshd\[7725\]: Failed password for root from 79.109.239.218 port 54860 ssh2 |
2019-12-19 02:00:24 |
| 14.98.4.82 | attackbotsspam | Dec 18 08:11:57 kapalua sshd\[12806\]: Invalid user admin from 14.98.4.82 Dec 18 08:11:57 kapalua sshd\[12806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.4.82 Dec 18 08:12:00 kapalua sshd\[12806\]: Failed password for invalid user admin from 14.98.4.82 port 4181 ssh2 Dec 18 08:17:36 kapalua sshd\[13580\]: Invalid user fusco from 14.98.4.82 Dec 18 08:17:36 kapalua sshd\[13580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.4.82 |
2019-12-19 02:21:19 |
| 168.63.134.202 | attackbotsspam | Bad user agent |
2019-12-19 02:11:36 |
| 40.92.5.12 | attackbotsspam | Dec 18 17:34:45 debian-2gb-vpn-nbg1-1 kernel: [1058049.628596] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.5.12 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=104 ID=348 DF PROTO=TCP SPT=61414 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0 |
2019-12-19 01:59:50 |
| 51.75.236.162 | attack | Dec 18 23:04:55 gw1 sshd[4885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.236.162 Dec 18 23:04:57 gw1 sshd[4885]: Failed password for invalid user sinusbot from 51.75.236.162 port 42040 ssh2 ... |
2019-12-19 02:20:36 |
| 104.131.85.167 | attackbots | Dec 18 18:35:32 mail postfix/smtpd[5698]: warning: unknown[104.131.85.167]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 18 18:36:33 mail postfix/smtpd[412]: warning: unknown[104.131.85.167]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Dec 18 18:36:38 mail postfix/smtpd[5696]: warning: unknown[104.131.85.167]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-12-19 01:56:01 |