城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.42.181.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16860
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;67.42.181.219. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:19:12 CST 2025
;; MSG SIZE rcvd: 106
219.181.42.67.in-addr.arpa domain name pointer 67-42-181-219.eugn.qwest.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
219.181.42.67.in-addr.arpa name = 67-42-181-219.eugn.qwest.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 129.204.38.202 | attackbotsspam | Aug 21 02:00:53 game-panel sshd[21748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.38.202 Aug 21 02:00:55 game-panel sshd[21748]: Failed password for invalid user dacc from 129.204.38.202 port 26817 ssh2 Aug 21 02:07:40 game-panel sshd[22035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.38.202 |
2019-08-21 10:26:24 |
| 142.93.69.223 | attackspambots | Aug 21 03:25:45 ns341937 sshd[2943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.69.223 Aug 21 03:25:47 ns341937 sshd[2943]: Failed password for invalid user leo from 142.93.69.223 port 46418 ssh2 Aug 21 03:33:45 ns341937 sshd[4087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.69.223 ... |
2019-08-21 10:22:36 |
| 117.62.129.254 | attack | Autoban 117.62.129.254 AUTH/CONNECT |
2019-08-21 10:27:59 |
| 195.91.214.145 | attackspambots | Unauthorized connection attempt from IP address 195.91.214.145 on Port 445(SMB) |
2019-08-21 10:41:31 |
| 94.125.61.92 | attackspam | 2019-08-21 00:50:54.354830 rule 86/0(match): pass in on re0: (tos 0x0, ttl 72, id 480, offset 0, flags [DF], proto TCP (6), length 40) 94.125.61.92.35266 > *.*.*.*.110: Flags [S], cksum 0x6f8f (correct), seq 2633976109, win 29200, length 0 |
2019-08-21 10:42:55 |
| 74.82.47.20 | attack | scan r |
2019-08-21 10:35:00 |
| 23.129.64.212 | attack | 2019-08-12T15:58:43.370386wiz-ks3 sshd[30769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.212 user=root 2019-08-12T15:58:44.924216wiz-ks3 sshd[30769]: Failed password for root from 23.129.64.212 port 29686 ssh2 2019-08-12T15:58:47.610987wiz-ks3 sshd[30769]: Failed password for root from 23.129.64.212 port 29686 ssh2 2019-08-12T15:58:43.370386wiz-ks3 sshd[30769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.212 user=root 2019-08-12T15:58:44.924216wiz-ks3 sshd[30769]: Failed password for root from 23.129.64.212 port 29686 ssh2 2019-08-12T15:58:47.610987wiz-ks3 sshd[30769]: Failed password for root from 23.129.64.212 port 29686 ssh2 2019-08-12T15:58:43.370386wiz-ks3 sshd[30769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.212 user=root 2019-08-12T15:58:44.924216wiz-ks3 sshd[30769]: Failed password for root from 23.129.64.212 port 29686 ssh2 2019-08-1 |
2019-08-21 11:03:49 |
| 128.199.136.129 | attack | Aug 21 04:34:03 hosting sshd[1117]: Invalid user iesse from 128.199.136.129 port 57532 Aug 21 04:34:03 hosting sshd[1117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.136.129 Aug 21 04:34:03 hosting sshd[1117]: Invalid user iesse from 128.199.136.129 port 57532 Aug 21 04:34:05 hosting sshd[1117]: Failed password for invalid user iesse from 128.199.136.129 port 57532 ssh2 Aug 21 04:40:24 hosting sshd[1668]: Invalid user peter from 128.199.136.129 port 48414 ... |
2019-08-21 10:09:27 |
| 169.197.108.38 | attackspambots | Microsoft Windows HTTP.sys Remote Code Execution Vulnerability, PTR: survey.internet-census.org. |
2019-08-21 10:59:39 |
| 131.161.26.254 | attack | Aug 20 22:18:18 debian sshd\[29177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.161.26.254 user=root Aug 20 22:18:20 debian sshd\[29177\]: Failed password for root from 131.161.26.254 port 64043 ssh2 Aug 20 22:23:54 debian sshd\[29233\]: Invalid user lnx from 131.161.26.254 port 31065 ... |
2019-08-21 10:25:14 |
| 45.227.253.114 | attackbotsspam | Aug 21 03:59:58 mail postfix/smtpd\[15668\]: warning: unknown\[45.227.253.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Aug 21 04:31:21 mail postfix/smtpd\[17363\]: warning: unknown\[45.227.253.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Aug 21 04:31:28 mail postfix/smtpd\[17386\]: warning: unknown\[45.227.253.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Aug 21 04:32:19 mail postfix/smtpd\[17940\]: warning: unknown\[45.227.253.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-08-21 10:38:55 |
| 158.69.222.2 | attackspambots | Aug 21 03:51:04 SilenceServices sshd[25777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.2 Aug 21 03:51:06 SilenceServices sshd[25777]: Failed password for invalid user adelia from 158.69.222.2 port 45162 ssh2 Aug 21 03:55:17 SilenceServices sshd[29136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.222.2 |
2019-08-21 10:13:57 |
| 54.37.157.82 | attack | Aug 20 16:17:53 tdfoods sshd\[6100\]: Invalid user stefania from 54.37.157.82 Aug 20 16:17:53 tdfoods sshd\[6100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.ip-54-37-157.eu Aug 20 16:17:56 tdfoods sshd\[6100\]: Failed password for invalid user stefania from 54.37.157.82 port 42106 ssh2 Aug 20 16:21:50 tdfoods sshd\[6443\]: Invalid user apache2 from 54.37.157.82 Aug 20 16:21:50 tdfoods sshd\[6443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.ip-54-37-157.eu |
2019-08-21 10:36:29 |
| 114.143.139.38 | attackbots | Aug 21 03:48:38 eventyay sshd[31047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.38 Aug 21 03:48:39 eventyay sshd[31047]: Failed password for invalid user network3 from 114.143.139.38 port 46464 ssh2 Aug 21 03:53:28 eventyay sshd[32584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.38 ... |
2019-08-21 10:10:09 |
| 51.89.173.145 | attackspambots | 08/20/2019-22:27:54.327205 51.89.173.145 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner) |
2019-08-21 10:37:29 |