城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.112.94.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62047
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;67.112.94.128. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 19:10:51 CST 2025
;; MSG SIZE rcvd: 106
128.94.112.67.in-addr.arpa domain name pointer adsl-67-112-94-128.dsl.lsan03.pacbell.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
128.94.112.67.in-addr.arpa name = adsl-67-112-94-128.dsl.lsan03.pacbell.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 182.61.14.224 | attack | Dec 20 02:43:13 webhost01 sshd[22014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.224 Dec 20 02:43:15 webhost01 sshd[22014]: Failed password for invalid user P4SS2020 from 182.61.14.224 port 40176 ssh2 ... |
2019-12-20 04:09:50 |
| 37.46.121.192 | attack | Dec 18 13:42:33 xxxx sshd[4174]: Address 37.46.121.192 maps to vten1.netvinum.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Dec 18 13:42:33 xxxx sshd[4174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.46.121.192 user=r.r Dec 18 13:42:36 xxxx sshd[4174]: Failed password for r.r from 37.46.121.192 port 59271 ssh2 Dec 18 13:42:38 xxxx sshd[4176]: Address 37.46.121.192 maps to vten1.netvinum.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Dec 18 13:42:38 xxxx sshd[4176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.46.121.192 user=r.r Dec 18 13:42:39 xxxx sshd[4176]: Failed password for r.r from 37.46.121.192 port 59968 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=37.46.121.192 |
2019-12-20 04:16:33 |
| 142.93.214.20 | attack | Dec 19 17:35:42 sd-53420 sshd\[18450\]: User root from 142.93.214.20 not allowed because none of user's groups are listed in AllowGroups Dec 19 17:35:42 sd-53420 sshd\[18450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 user=root Dec 19 17:35:44 sd-53420 sshd\[18450\]: Failed password for invalid user root from 142.93.214.20 port 36492 ssh2 Dec 19 17:41:48 sd-53420 sshd\[20750\]: User root from 142.93.214.20 not allowed because none of user's groups are listed in AllowGroups Dec 19 17:41:48 sd-53420 sshd\[20750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.214.20 user=root ... |
2019-12-20 03:54:45 |
| 23.129.64.202 | attack | Dec 19 20:50:34 vpn01 sshd[1158]: Failed password for root from 23.129.64.202 port 33198 ssh2 Dec 19 20:50:36 vpn01 sshd[1158]: Failed password for root from 23.129.64.202 port 33198 ssh2 ... |
2019-12-20 03:57:37 |
| 129.213.63.120 | attack | Apr 27 01:54:02 vtv3 sshd[28956]: Invalid user wangyafang from 129.213.63.120 port 40928 Apr 27 01:54:02 vtv3 sshd[28956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120 Dec 19 16:14:58 vtv3 sshd[3047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120 Dec 19 16:14:59 vtv3 sshd[3047]: Failed password for invalid user brendis from 129.213.63.120 port 38554 ssh2 Dec 19 16:23:20 vtv3 sshd[7151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120 Dec 19 16:37:50 vtv3 sshd[14442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120 Dec 19 16:37:52 vtv3 sshd[14442]: Failed password for invalid user named from 129.213.63.120 port 42538 ssh2 Dec 19 16:42:53 vtv3 sshd[16848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.63.120 Dec 19 16:57:48 vtv3 sshd[237 |
2019-12-20 04:17:49 |
| 106.12.49.244 | attackspam | Dec 19 20:40:53 MainVPS sshd[31984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.244 user=sshd Dec 19 20:40:55 MainVPS sshd[31984]: Failed password for sshd from 106.12.49.244 port 49868 ssh2 Dec 19 20:47:15 MainVPS sshd[11847]: Invalid user linni from 106.12.49.244 port 42966 Dec 19 20:47:15 MainVPS sshd[11847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.49.244 Dec 19 20:47:15 MainVPS sshd[11847]: Invalid user linni from 106.12.49.244 port 42966 Dec 19 20:47:17 MainVPS sshd[11847]: Failed password for invalid user linni from 106.12.49.244 port 42966 ssh2 ... |
2019-12-20 04:08:37 |
| 187.142.44.154 | attackspam | Automatic report - Port Scan Attack |
2019-12-20 04:00:17 |
| 103.45.70.111 | attackbotsspam | Unauthorized connection attempt detected from IP address 103.45.70.111 to port 1433 |
2019-12-20 04:19:58 |
| 118.48.211.197 | attackspambots | Dec 19 22:00:06 server sshd\[9537\]: Invalid user bledsoe from 118.48.211.197 Dec 19 22:00:06 server sshd\[9537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.48.211.197 Dec 19 22:00:08 server sshd\[9537\]: Failed password for invalid user bledsoe from 118.48.211.197 port 24538 ssh2 Dec 19 22:08:07 server sshd\[11882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.48.211.197 user=root Dec 19 22:08:09 server sshd\[11882\]: Failed password for root from 118.48.211.197 port 16943 ssh2 ... |
2019-12-20 04:10:13 |
| 117.198.171.30 | attackspambots | 1576766030 - 12/19/2019 15:33:50 Host: 117.198.171.30/117.198.171.30 Port: 445 TCP Blocked |
2019-12-20 03:54:12 |
| 139.59.78.236 | attackspambots | Brute-force attempt banned |
2019-12-20 04:17:27 |
| 149.202.233.206 | attack | Dec 19 16:13:28 game-panel sshd[4505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.233.206 Dec 19 16:13:30 game-panel sshd[4505]: Failed password for invalid user ctherry16 from 149.202.233.206 port 39368 ssh2 Dec 19 16:15:52 game-panel sshd[4592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.233.206 |
2019-12-20 03:50:57 |
| 163.172.82.142 | attackbotsspam | recursive dns scanning |
2019-12-20 03:49:40 |
| 121.78.129.147 | attackspam | Dec 20 00:35:50 gw1 sshd[2626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.78.129.147 Dec 20 00:35:51 gw1 sshd[2626]: Failed password for invalid user blaster from 121.78.129.147 port 56816 ssh2 ... |
2019-12-20 04:01:17 |
| 106.75.103.35 | attack | Dec 6 10:13:37 localhost sshd\[12634\]: Invalid user zori from 106.75.103.35 port 35254 Dec 6 10:13:37 localhost sshd\[12634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.103.35 Dec 6 10:13:39 localhost sshd\[12634\]: Failed password for invalid user zori from 106.75.103.35 port 35254 ssh2 Dec 6 10:21:09 localhost sshd\[12696\]: Invalid user ms from 106.75.103.35 port 38572 |
2019-12-20 04:17:15 |