城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.64.12.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25086
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.64.12.217. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 02:29:24 CST 2025
;; MSG SIZE rcvd: 105
217.12.64.66.in-addr.arpa domain name pointer 217-12-64.66.static.logixcom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
217.12.64.66.in-addr.arpa name = 217-12-64.66.static.logixcom.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 157.44.247.81 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-01 03:34:06 |
| 222.186.169.194 | attack | Apr 30 21:12:42 melroy-server sshd[22253]: Failed password for root from 222.186.169.194 port 17250 ssh2 Apr 30 21:12:47 melroy-server sshd[22253]: Failed password for root from 222.186.169.194 port 17250 ssh2 ... |
2020-05-01 03:24:04 |
| 173.203.198.30 | attackbotsspam | 200430 10:43:05 [Warning] Access denied for user 'wordpress'@'173.203.198.30' (using password: YES) 200430 11:39:15 [Warning] Access denied for user 'root'@'173.203.198.30' (using password: YES) 200430 11:54:24 [Warning] Access denied for user 'root'@'173.203.198.30' (using password: YES) ... |
2020-05-01 03:51:13 |
| 114.108.236.192 | attackspam | 1588249532 - 04/30/2020 14:25:32 Host: 114.108.236.192/114.108.236.192 Port: 445 TCP Blocked |
2020-05-01 03:19:40 |
| 218.92.0.138 | attackbots | 2020-04-30T19:44:56.415358shield sshd\[1170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root 2020-04-30T19:44:57.791375shield sshd\[1170\]: Failed password for root from 218.92.0.138 port 22124 ssh2 2020-04-30T19:45:00.821858shield sshd\[1170\]: Failed password for root from 218.92.0.138 port 22124 ssh2 2020-04-30T19:45:03.589853shield sshd\[1170\]: Failed password for root from 218.92.0.138 port 22124 ssh2 2020-04-30T19:45:07.302002shield sshd\[1170\]: Failed password for root from 218.92.0.138 port 22124 ssh2 |
2020-05-01 03:56:05 |
| 162.243.237.90 | attackbotsspam | (sshd) Failed SSH login from 162.243.237.90 (US/United States/-): 5 in the last 3600 secs |
2020-05-01 03:27:19 |
| 41.218.204.149 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-01 03:42:28 |
| 183.17.228.153 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-01 03:30:10 |
| 83.147.242.130 | attack | Apr 29 14:42:06 dax sshd[16282]: Invalid user yarn from 83.147.242.130 Apr 29 14:42:06 dax sshd[16282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.147.242.130 Apr 29 14:42:08 dax sshd[16282]: Failed password for invalid user yarn from 83.147.242.130 port 29116 ssh2 Apr 29 14:42:08 dax sshd[16282]: Received disconnect from 83.147.242.130: 11: Bye Bye [preauth] Apr 29 14:44:49 dax sshd[16585]: Invalid user president from 83.147.242.130 Apr 29 14:44:49 dax sshd[16585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.147.242.130 Apr 29 14:44:51 dax sshd[16585]: Failed password for invalid user president from 83.147.242.130 port 41583 ssh2 Apr 29 14:44:51 dax sshd[16585]: Received disconnect from 83.147.242.130: 11: Bye Bye [preauth] Apr 29 14:46:07 dax sshd[16898]: Invalid user test from 83.147.242.130 Apr 29 14:46:07 dax sshd[16898]: pam_unix(sshd:auth): authentication failure; log........ ------------------------------- |
2020-05-01 03:52:54 |
| 106.12.192.129 | attackspambots | $f2bV_matches |
2020-05-01 03:43:10 |
| 51.91.251.20 | attack | Apr 30 22:11:56 pkdns2 sshd\[39877\]: Invalid user admin from 51.91.251.20Apr 30 22:11:59 pkdns2 sshd\[39877\]: Failed password for invalid user admin from 51.91.251.20 port 45624 ssh2Apr 30 22:15:47 pkdns2 sshd\[40036\]: Invalid user esbuser from 51.91.251.20Apr 30 22:15:50 pkdns2 sshd\[40036\]: Failed password for invalid user esbuser from 51.91.251.20 port 58508 ssh2Apr 30 22:19:30 pkdns2 sshd\[40174\]: Invalid user peter from 51.91.251.20Apr 30 22:19:32 pkdns2 sshd\[40174\]: Failed password for invalid user peter from 51.91.251.20 port 43160 ssh2 ... |
2020-05-01 03:40:50 |
| 154.85.37.20 | attack | Invalid user shock from 154.85.37.20 port 37972 |
2020-05-01 03:24:17 |
| 52.199.142.74 | attackspambots | Apr 29 13:12:59 srv1 sshd[16417]: Invalid user wcs from 52.199.142.74 Apr 29 13:12:59 srv1 sshd[16417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-199-142-74.ap-northeast-1.compute.amazonaws.com Apr 29 13:13:01 srv1 sshd[16417]: Failed password for invalid user wcs from 52.199.142.74 port 37650 ssh2 Apr 29 13:13:01 srv1 sshd[16418]: Received disconnect from 52.199.142.74: 11: Bye Bye ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=52.199.142.74 |
2020-05-01 03:50:55 |
| 114.67.91.168 | attackbots | 2020-04-30 02:13:45 server sshd[83563]: Failed password for invalid user portia from 114.67.91.168 port 40418 ssh2 |
2020-05-01 03:50:12 |
| 182.23.5.138 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-05-01 03:21:35 |