城市(city): La Grande
省份(region): Oregon
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.116.44.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.116.44.119. IN A
;; AUTHORITY SECTION:
. 280 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019101402 1800 900 604800 86400
;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 15 04:10:42 CST 2019
;; MSG SIZE rcvd: 117
119.44.116.68.in-addr.arpa domain name pointer 68-116-44-119.static.klfl.or.charter.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
119.44.116.68.in-addr.arpa name = 68-116-44-119.static.klfl.or.charter.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 117.158.56.11 | attack | Aug 31 20:33:00 root sshd[1304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.56.11 Aug 31 20:33:02 root sshd[1304]: Failed password for invalid user backuppc from 117.158.56.11 port 19048 ssh2 Aug 31 20:36:43 root sshd[1803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.56.11 ... |
2020-09-01 04:31:58 |
| 2804:14c:1b0:946e:b946:3283:7919:e78e | attackbots | Wordpress attack |
2020-09-01 04:21:17 |
| 101.200.133.119 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2020-09-01 04:34:41 |
| 187.149.81.107 | attackspambots | 1598876888 - 08/31/2020 14:28:08 Host: 187.149.81.107/187.149.81.107 Port: 445 TCP Blocked |
2020-09-01 04:51:32 |
| 117.192.208.248 | attack | 1598876925 - 08/31/2020 14:28:45 Host: 117.192.208.248/117.192.208.248 Port: 445 TCP Blocked |
2020-09-01 04:26:44 |
| 159.89.9.22 | attackbots | Invalid user mapr from 159.89.9.22 port 51302 |
2020-09-01 04:45:27 |
| 165.22.107.7 | attackbotsspam | Aug 31 17:33:17 vm0 sshd[17531]: Failed password for root from 165.22.107.7 port 49882 ssh2 Aug 31 17:50:48 vm0 sshd[16966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.107.7 ... |
2020-09-01 04:41:06 |
| 67.205.129.197 | attackbotsspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-09-01 04:38:19 |
| 192.241.185.120 | attackspambots | 2020-08-31T13:22:36.440616shield sshd\[28588\]: Invalid user kim from 192.241.185.120 port 52783 2020-08-31T13:22:36.454845shield sshd\[28588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.185.120 2020-08-31T13:22:38.372973shield sshd\[28588\]: Failed password for invalid user kim from 192.241.185.120 port 52783 ssh2 2020-08-31T13:28:40.765023shield sshd\[29236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.185.120 user=root 2020-08-31T13:28:43.320627shield sshd\[29236\]: Failed password for root from 192.241.185.120 port 51271 ssh2 |
2020-09-01 04:44:56 |
| 192.35.168.218 | attackspambots | port scan and connect, tcp 143 (imap) |
2020-09-01 04:30:56 |
| 2.201.90.49 | attackspam | Invalid user francois from 2.201.90.49 port 36268 |
2020-09-01 04:33:09 |
| 104.248.130.17 | attackspam | 2020-08-31T20:56:50.197809ns386461 sshd\[13264\]: Invalid user terry from 104.248.130.17 port 35392 2020-08-31T20:56:50.202177ns386461 sshd\[13264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.17 2020-08-31T20:56:52.182555ns386461 sshd\[13264\]: Failed password for invalid user terry from 104.248.130.17 port 35392 ssh2 2020-08-31T21:17:00.604660ns386461 sshd\[32124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.17 user=root 2020-08-31T21:17:03.031703ns386461 sshd\[32124\]: Failed password for root from 104.248.130.17 port 42964 ssh2 ... |
2020-09-01 04:46:59 |
| 78.164.2.5 | attack | 31.08.2020 20:58:56 - Wordpress fail Detected by ELinOX-ALM |
2020-09-01 04:14:33 |
| 178.176.176.205 | attack | 1598876939 - 08/31/2020 14:28:59 Host: 178.176.176.205/178.176.176.205 Port: 445 TCP Blocked |
2020-09-01 04:20:58 |
| 118.174.3.202 | attack | 1598876890 - 08/31/2020 14:28:10 Host: 118.174.3.202/118.174.3.202 Port: 445 TCP Blocked |
2020-09-01 04:49:33 |