城市(city): Oklahoma City
省份(region): Oklahoma
国家(country): United States
运营商(isp): Softcom Internet Communications, Inc
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.12.6.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.12.6.193. IN A
;; AUTHORITY SECTION:
. 283 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023081500 1800 900 604800 86400
;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Aug 15 20:54:11 CST 2023
;; MSG SIZE rcvd: 104
193.6.12.68.in-addr.arpa domain name pointer ip68-12-6-193.ok.ok.cox.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
193.6.12.68.in-addr.arpa name = ip68-12-6-193.ok.ok.cox.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 187.62.182.133 | attackspam | Email rejected due to spam filtering |
2020-05-29 22:48:30 |
| 111.231.70.144 | attackspam | May 29 11:20:49 ws12vmsma01 sshd[16647]: Failed password for invalid user test from 111.231.70.144 port 38290 ssh2 May 29 11:26:45 ws12vmsma01 sshd[17536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.70.144 user=root May 29 11:26:46 ws12vmsma01 sshd[17536]: Failed password for root from 111.231.70.144 port 39982 ssh2 ... |
2020-05-29 22:39:39 |
| 139.198.17.31 | attackspam | reported through recidive - multiple failed attempts(SSH) |
2020-05-29 22:50:05 |
| 98.217.254.20 | attackbots | May 29 16:05:25 server sshd[24657]: Failed password for root from 98.217.254.20 port 54776 ssh2 May 29 16:17:25 server sshd[14056]: Failed password for root from 98.217.254.20 port 35832 ssh2 May 29 16:23:19 server sshd[24637]: Failed password for root from 98.217.254.20 port 54542 ssh2 |
2020-05-29 22:52:13 |
| 185.143.74.108 | attackbots | 2020-05-29 17:26:01 dovecot_login authenticator failed for \(User\) \[185.143.74.108\]: 535 Incorrect authentication data \(set_id=chat-service2@org.ua\)2020-05-29 17:27:36 dovecot_login authenticator failed for \(User\) \[185.143.74.108\]: 535 Incorrect authentication data \(set_id=vrops@org.ua\)2020-05-29 17:29:16 dovecot_login authenticator failed for \(User\) \[185.143.74.108\]: 535 Incorrect authentication data \(set_id=carsten@org.ua\) ... |
2020-05-29 22:35:17 |
| 51.75.18.212 | attackbots | May 28 07:20:26 serwer sshd\[19718\]: User mysql from 51.75.18.212 not allowed because not listed in AllowUsers May 28 07:20:26 serwer sshd\[19718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.212 user=mysql May 28 07:20:27 serwer sshd\[19718\]: Failed password for invalid user mysql from 51.75.18.212 port 44920 ssh2 May 28 07:23:58 serwer sshd\[20020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.212 user=root May 28 07:24:00 serwer sshd\[20020\]: Failed password for root from 51.75.18.212 port 51600 ssh2 May 28 07:27:12 serwer sshd\[20360\]: Invalid user b from 51.75.18.212 port 55578 May 28 07:27:12 serwer sshd\[20360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.212 May 28 07:27:14 serwer sshd\[20360\]: Failed password for invalid user b from 51.75.18.212 port 55578 ssh2 May 28 07:30:30 serwer sshd\[20725\]: pam_ ... |
2020-05-29 22:50:36 |
| 124.41.248.30 | attack | May 29 16:41:08 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:124.41.248.30\] ... |
2020-05-29 22:51:34 |
| 144.217.12.194 | attack | May 29 16:36:03 vps647732 sshd[11936]: Failed password for root from 144.217.12.194 port 44154 ssh2 ... |
2020-05-29 22:55:27 |
| 190.94.136.251 | attackbotsspam | Unauthorized connection attempt detected from IP address 190.94.136.251 to port 8080 |
2020-05-29 23:04:50 |
| 91.225.109.54 | attack | Port Scan |
2020-05-29 22:30:47 |
| 49.68.145.158 | attack | Email rejected due to spam filtering |
2020-05-29 22:51:14 |
| 185.200.118.68 | attackbots | May 29 15:40:21 debian-2gb-nbg1-2 kernel: \[13018406.581407\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.200.118.68 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=47320 DPT=1723 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-05-29 23:08:53 |
| 92.246.84.185 | attack | [2020-05-29 10:28:31] NOTICE[1157][C-0000a65d] chan_sip.c: Call from '' (92.246.84.185:53512) to extension '00046812111513' rejected because extension not found in context 'public'. [2020-05-29 10:28:31] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-29T10:28:31.085-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00046812111513",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/92.246.84.185/53512",ACLName="no_extension_match" [2020-05-29 10:35:06] NOTICE[1157][C-0000a65f] chan_sip.c: Call from '' (92.246.84.185:52077) to extension '0002146812111513' rejected because extension not found in context 'public'. [2020-05-29 10:35:06] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-29T10:35:06.780-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0002146812111513",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/ ... |
2020-05-29 22:52:33 |
| 112.103.95.245 | attackbots | Unauthorized connection attempt detected from IP address 112.103.95.245 to port 23 |
2020-05-29 22:58:41 |
| 196.52.43.126 | attack | firewall-block, port(s): 5443/tcp |
2020-05-29 22:56:14 |