城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.142.235.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.142.235.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:57:26 CST 2025
;; MSG SIZE rcvd: 107
104.235.142.68.in-addr.arpa domain name pointer unknown.yahoo.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
104.235.142.68.in-addr.arpa name = unknown.yahoo.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 218.22.253.37 | attackspam | failed_logins |
2019-07-19 07:16:14 |
| 5.189.136.96 | attack | Automatic report - Banned IP Access |
2019-07-19 06:58:04 |
| 36.89.247.26 | attack | Jul 19 01:22:55 mail sshd\[20471\]: Invalid user python from 36.89.247.26 port 42223 Jul 19 01:22:55 mail sshd\[20471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.247.26 Jul 19 01:22:57 mail sshd\[20471\]: Failed password for invalid user python from 36.89.247.26 port 42223 ssh2 Jul 19 01:29:19 mail sshd\[21427\]: Invalid user gpadmin from 36.89.247.26 port 41155 Jul 19 01:29:19 mail sshd\[21427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.247.26 |
2019-07-19 07:32:29 |
| 104.236.224.134 | attackbots | Jul 19 01:15:42 eventyay sshd[23229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.224.134 Jul 19 01:15:44 eventyay sshd[23229]: Failed password for invalid user vivian from 104.236.224.134 port 32970 ssh2 Jul 19 01:22:18 eventyay sshd[24780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.224.134 ... |
2019-07-19 07:34:20 |
| 157.230.163.6 | attackbotsspam | Jul 19 01:10:59 mail sshd\[18680\]: Invalid user dbadmin from 157.230.163.6 port 46808 Jul 19 01:10:59 mail sshd\[18680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6 Jul 19 01:11:01 mail sshd\[18680\]: Failed password for invalid user dbadmin from 157.230.163.6 port 46808 ssh2 Jul 19 01:15:48 mail sshd\[19380\]: Invalid user mm from 157.230.163.6 port 45096 Jul 19 01:15:48 mail sshd\[19380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.163.6 |
2019-07-19 07:31:55 |
| 173.219.80.40 | attack | 2019-07-18T22:46:52.472370abusebot-3.cloudsearch.cf sshd\[18610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-219-80-40.pkbgcmta03.com.sta.suddenlink.net user=root |
2019-07-19 06:53:11 |
| 171.120.204.37 | attack | Dec 20 17:43:33 vpn sshd[15907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.120.204.37 Dec 20 17:43:35 vpn sshd[15907]: Failed password for invalid user admin from 171.120.204.37 port 44834 ssh2 Dec 20 17:43:37 vpn sshd[15907]: Failed password for invalid user admin from 171.120.204.37 port 44834 ssh2 Dec 20 17:43:39 vpn sshd[15907]: Failed password for invalid user admin from 171.120.204.37 port 44834 ssh2 |
2019-07-19 07:22:55 |
| 178.162.203.104 | attack | (From micgyhaeltic@gmail.com) Load note an wonderful winnings in compensation victory. sunshinechiro.com http://bit.ly/2NNH0qG |
2019-07-19 07:35:58 |
| 128.199.202.206 | attackbots | Jul 18 19:30:00 plusreed sshd[32502]: Invalid user roberta from 128.199.202.206 ... |
2019-07-19 07:33:56 |
| 172.254.107.118 | attack | Mar 19 14:12:17 vpn sshd[24270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.254.107.118 Mar 19 14:12:19 vpn sshd[24270]: Failed password for invalid user deathrun from 172.254.107.118 port 15690 ssh2 Mar 19 14:18:23 vpn sshd[24296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.254.107.118 |
2019-07-19 07:10:39 |
| 172.93.48.70 | attackbots | Mar 21 23:01:18 vpn sshd[5793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.93.48.70 Mar 21 23:01:20 vpn sshd[5793]: Failed password for invalid user ah from 172.93.48.70 port 42254 ssh2 Mar 21 23:05:34 vpn sshd[5806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.93.48.70 |
2019-07-19 07:04:06 |
| 173.210.1.162 | attackspambots | Dec 12 04:56:24 vpn sshd[2898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.210.1.162 Dec 12 04:56:26 vpn sshd[2898]: Failed password for invalid user michal from 173.210.1.162 port 11918 ssh2 Dec 12 05:05:00 vpn sshd[2969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.210.1.162 |
2019-07-19 06:58:27 |
| 172.247.116.57 | attackbotsspam | Sep 25 17:03:22 vpn sshd[26463]: Invalid user maniac from 172.247.116.57 Sep 25 17:03:22 vpn sshd[26463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.247.116.57 Sep 25 17:03:24 vpn sshd[26463]: Failed password for invalid user maniac from 172.247.116.57 port 45319 ssh2 Sep 25 17:06:30 vpn sshd[26465]: Invalid user zhouh from 172.247.116.57 Sep 25 17:06:30 vpn sshd[26465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.247.116.57 |
2019-07-19 07:12:57 |
| 173.212.239.47 | attack | Sep 19 08:36:16 vpn sshd[22214]: Invalid user arkserver from 173.212.239.47 Sep 19 08:36:16 vpn sshd[22214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.239.47 Sep 19 08:36:17 vpn sshd[22214]: Failed password for invalid user arkserver from 173.212.239.47 port 49972 ssh2 Sep 19 08:37:59 vpn sshd[22219]: Invalid user arkserver from 173.212.239.47 Sep 19 08:37:59 vpn sshd[22219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.239.47 |
2019-07-19 06:54:52 |
| 172.93.52.58 | attackbots | Apr 14 23:29:30 vpn sshd[13945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.93.52.58 user=root Apr 14 23:29:32 vpn sshd[13945]: Failed password for root from 172.93.52.58 port 36134 ssh2 Apr 14 23:29:33 vpn sshd[13948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.93.52.58 user=root Apr 14 23:29:34 vpn sshd[13948]: Failed password for root from 172.93.52.58 port 36286 ssh2 Apr 14 23:29:34 vpn sshd[13951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.93.52.58 user=root |
2019-07-19 07:03:37 |