城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.135.12.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.135.12.6. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 06:41:50 CST 2025
;; MSG SIZE rcvd: 104
Host 6.12.135.68.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 6.12.135.68.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 115.231.157.179 | attackspam | $f2bV_matches |
2020-07-08 03:38:55 |
| 46.76.195.36 | attack | 2020-07-08 03:13:50 | |
| 52.14.85.230 | attackspambots | mue-0 : Trying access unauthorized files=>/images/jdownloads/screenshots/update.php() |
2020-07-08 03:28:55 |
| 164.132.44.25 | attackspambots | 2020-07-08T01:59:07.896259hostname sshd[14210]: Invalid user ommdba from 164.132.44.25 port 49896 2020-07-08T01:59:09.808772hostname sshd[14210]: Failed password for invalid user ommdba from 164.132.44.25 port 49896 ssh2 2020-07-08T02:06:43.524174hostname sshd[17717]: Invalid user davis from 164.132.44.25 port 60128 ... |
2020-07-08 03:33:30 |
| 45.128.133.233 | attackspambots | (From verajohn@fanclub.pm) Hi, this is Leonrad. Today I have good news for you, witch you can get $30 free bonus in a minute. All you have to do is to register Vera & John online casino link below and that's it. You can register by free e-mail and no need kyc. Registration form https://www3.samuraiclick.com/go?m=28940&c=34&b=926&l=1 After you get your free bonus, play casino and make money! Many people sent me thanks mail because they won more than $2,000-$10,000 by trusting me. Don’t miss this chance and don't for get that your chance is just infront of you. Get free bonus and win your life! You can with draw your prize by Bitcoin, so If you need best crypto debit card, try Hcard. https://bit.ly/31zTBD0 It is Mastercard brand and you can exchange your crypto by Apps. Hcard cost you $350 + shipping, but it will definitely worth. This is how rich people always get their profits. So, if you wanna win your life for free, do not miss your last chance. |
2020-07-08 03:44:21 |
| 80.182.156.196 | attack | Jul 7 15:38:47 localhost sshd[111289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-80-182-156-196.retail.telecomitalia.it user=root Jul 7 15:38:49 localhost sshd[111289]: Failed password for root from 80.182.156.196 port 54916 ssh2 Jul 7 15:42:15 localhost sshd[111764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-80-182-156-196.pool80182.interbusiness.it user=root Jul 7 15:42:17 localhost sshd[111764]: Failed password for root from 80.182.156.196 port 53069 ssh2 Jul 7 15:45:46 localhost sshd[112261]: Invalid user kasia from 80.182.156.196 port 55360 ... |
2020-07-08 03:26:49 |
| 185.143.73.41 | attack | Jul 7 21:08:52 srv01 postfix/smtpd\[23370\]: warning: unknown\[185.143.73.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 7 21:09:30 srv01 postfix/smtpd\[23370\]: warning: unknown\[185.143.73.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 7 21:10:04 srv01 postfix/smtpd\[23454\]: warning: unknown\[185.143.73.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 7 21:10:45 srv01 postfix/smtpd\[19526\]: warning: unknown\[185.143.73.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 7 21:11:23 srv01 postfix/smtpd\[8061\]: warning: unknown\[185.143.73.41\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-08 03:12:46 |
| 106.54.145.68 | attack | Jul 7 15:17:22 PorscheCustomer sshd[19341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.145.68 Jul 7 15:17:24 PorscheCustomer sshd[19341]: Failed password for invalid user test from 106.54.145.68 port 35144 ssh2 Jul 7 15:20:43 PorscheCustomer sshd[19454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.145.68 ... |
2020-07-08 03:18:31 |
| 193.112.126.64 | attack | Jul 7 15:46:20 piServer sshd[10962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.126.64 Jul 7 15:46:22 piServer sshd[10962]: Failed password for invalid user mythtv from 193.112.126.64 port 40054 ssh2 Jul 7 15:50:30 piServer sshd[11251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.126.64 ... |
2020-07-08 03:15:10 |
| 110.141.212.12 | attack | Jul 7 14:05:44 django-0 sshd[20625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.141.212.12 user=root Jul 7 14:05:46 django-0 sshd[20625]: Failed password for root from 110.141.212.12 port 37022 ssh2 ... |
2020-07-08 03:14:43 |
| 109.233.121.250 | attackspam | DIS,DEF GET /wp-login.php |
2020-07-08 03:25:54 |
| 158.69.40.184 | attackbots |
|
2020-07-08 03:50:12 |
| 218.92.0.249 | attackspam | Jul 7 21:41:43 melroy-server sshd[25137]: Failed password for root from 218.92.0.249 port 25093 ssh2 Jul 7 21:41:47 melroy-server sshd[25137]: Failed password for root from 218.92.0.249 port 25093 ssh2 ... |
2020-07-08 03:42:59 |
| 188.128.43.28 | attackspam | Jul 7 15:40:50 buvik sshd[28608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.43.28 Jul 7 15:40:52 buvik sshd[28608]: Failed password for invalid user pj from 188.128.43.28 port 47364 ssh2 Jul 7 15:44:07 buvik sshd[29003]: Invalid user dev from 188.128.43.28 ... |
2020-07-08 03:47:53 |
| 218.241.202.58 | attack | SSH invalid-user multiple login try |
2020-07-08 03:31:26 |