城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.103.222.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.103.222.245. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:08:54 CST 2025
;; MSG SIZE rcvd: 107
245.222.103.68.in-addr.arpa domain name pointer ip68-103-222-245.ks.ok.cox.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.222.103.68.in-addr.arpa name = ip68-103-222-245.ks.ok.cox.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 115.84.121.80 | attackbots | Oct 2 00:28:04 ny01 sshd[22837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.121.80 Oct 2 00:28:06 ny01 sshd[22837]: Failed password for invalid user testuser from 115.84.121.80 port 36662 ssh2 Oct 2 00:32:08 ny01 sshd[23623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.121.80 |
2019-10-02 19:04:57 |
| 129.211.80.201 | attackbots | Oct 2 09:31:36 heissa sshd\[10385\]: Invalid user nina from 129.211.80.201 port 12285 Oct 2 09:31:36 heissa sshd\[10385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.80.201 Oct 2 09:31:38 heissa sshd\[10385\]: Failed password for invalid user nina from 129.211.80.201 port 12285 ssh2 Oct 2 09:37:39 heissa sshd\[11263\]: Invalid user charles from 129.211.80.201 port 57191 Oct 2 09:37:39 heissa sshd\[11263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.80.201 |
2019-10-02 19:26:39 |
| 45.40.192.118 | attack | $f2bV_matches |
2019-10-02 19:24:57 |
| 178.17.174.10 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-02 18:56:49 |
| 125.160.45.6 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 02-10-2019 04:45:22. |
2019-10-02 19:11:29 |
| 182.35.99.188 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 02-10-2019 04:45:26. |
2019-10-02 19:05:43 |
| 42.237.93.13 | attackspam | Unauthorised access (Oct 2) SRC=42.237.93.13 LEN=40 TTL=49 ID=39112 TCP DPT=8080 WINDOW=42340 SYN |
2019-10-02 18:49:45 |
| 183.111.227.5 | attackbots | Oct 2 00:10:29 web9 sshd\[5321\]: Invalid user testftp from 183.111.227.5 Oct 2 00:10:29 web9 sshd\[5321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.5 Oct 2 00:10:31 web9 sshd\[5321\]: Failed password for invalid user testftp from 183.111.227.5 port 57440 ssh2 Oct 2 00:16:35 web9 sshd\[6208\]: Invalid user jia from 183.111.227.5 Oct 2 00:16:35 web9 sshd\[6208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.5 |
2019-10-02 19:23:12 |
| 192.42.116.16 | attackspam | Aug 19 15:18:02 mercury wordpress(www.lukegirvin.co.uk)[7527]: XML-RPC authentication failure for luke from 192.42.116.16 ... |
2019-10-02 19:00:06 |
| 52.36.53.169 | attackbotsspam | 10/02/2019-13:15:02.925901 52.36.53.169 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-10-02 19:29:43 |
| 183.80.214.103 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 02-10-2019 04:45:27. |
2019-10-02 19:04:33 |
| 140.114.85.215 | attackspambots | Oct 2 04:19:36 hcbbdb sshd\[8785\]: Invalid user oracle from 140.114.85.215 Oct 2 04:19:36 hcbbdb sshd\[8785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tifa.cs.nthu.edu.tw Oct 2 04:19:37 hcbbdb sshd\[8785\]: Failed password for invalid user oracle from 140.114.85.215 port 42206 ssh2 Oct 2 04:24:33 hcbbdb sshd\[9304\]: Invalid user cao from 140.114.85.215 Oct 2 04:24:33 hcbbdb sshd\[9304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tifa.cs.nthu.edu.tw |
2019-10-02 19:24:13 |
| 89.234.157.254 | attackspambots | Oct 2 07:52:13 rotator sshd\[7298\]: Failed password for root from 89.234.157.254 port 35057 ssh2Oct 2 07:52:16 rotator sshd\[7298\]: Failed password for root from 89.234.157.254 port 35057 ssh2Oct 2 07:52:18 rotator sshd\[7298\]: Failed password for root from 89.234.157.254 port 35057 ssh2Oct 2 07:52:21 rotator sshd\[7298\]: Failed password for root from 89.234.157.254 port 35057 ssh2Oct 2 07:52:23 rotator sshd\[7298\]: Failed password for root from 89.234.157.254 port 35057 ssh2Oct 2 07:52:26 rotator sshd\[7298\]: Failed password for root from 89.234.157.254 port 35057 ssh2 ... |
2019-10-02 19:31:38 |
| 41.39.12.10 | attackbots | Chat Spam |
2019-10-02 18:44:06 |
| 77.247.109.31 | attack | 10/02/2019-13:02:53.013859 77.247.109.31 Protocol: 17 ET CINS Active Threat Intelligence Poor Reputation IP group 74 |
2019-10-02 19:30:19 |