城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.199.134.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.199.134.119.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:37:00 CST 2025
;; MSG SIZE  rcvd: 107
        119.134.199.68.in-addr.arpa domain name pointer ool-44c78677.dyn.optonline.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
119.134.199.68.in-addr.arpa	name = ool-44c78677.dyn.optonline.net.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 194.182.84.105 | attackbotsspam | Nov 1 14:22:23 ns381471 sshd[24061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.84.105 Nov 1 14:22:25 ns381471 sshd[24061]: Failed password for invalid user chinni from 194.182.84.105 port 50872 ssh2  | 
                    2019-11-02 02:04:50 | 
| 46.229.168.147 | attackspam | Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools  | 
                    2019-11-02 01:58:23 | 
| 78.36.13.204 | attack | Unauthorized connection attempt from IP address 78.36.13.204 on Port 445(SMB)  | 
                    2019-11-02 01:55:44 | 
| 51.68.189.69 | attack | Nov 1 02:43:10 hanapaa sshd\[15861\]: Invalid user monkey from 51.68.189.69 Nov 1 02:43:10 hanapaa sshd\[15861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.ip-51-68-189.eu Nov 1 02:43:12 hanapaa sshd\[15861\]: Failed password for invalid user monkey from 51.68.189.69 port 45672 ssh2 Nov 1 02:47:01 hanapaa sshd\[16167\]: Invalid user lijiaAIR1105 from 51.68.189.69 Nov 1 02:47:01 hanapaa sshd\[16167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.ip-51-68-189.eu  | 
                    2019-11-02 01:31:54 | 
| 118.89.189.176 | attackbots | Nov 1 13:18:32 sd-53420 sshd\[7904\]: Invalid user 1Admin! from 118.89.189.176 Nov 1 13:18:32 sd-53420 sshd\[7904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.189.176 Nov 1 13:18:34 sd-53420 sshd\[7904\]: Failed password for invalid user 1Admin! from 118.89.189.176 port 48676 ssh2 Nov 1 13:23:53 sd-53420 sshd\[8259\]: Invalid user upload1 from 118.89.189.176 Nov 1 13:23:53 sd-53420 sshd\[8259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.189.176 ...  | 
                    2019-11-02 01:34:52 | 
| 191.254.224.142 | attackbots | The IP 191.254.224.142 has just been banned by Fail2Ban after 3 attempts against apache.  | 
                    2019-11-02 02:05:15 | 
| 182.61.181.138 | attackspambots | 2019-11-01T15:35:47.967657abusebot-2.cloudsearch.cf sshd\[9276\]: Invalid user elza from 182.61.181.138 port 39578  | 
                    2019-11-02 01:32:48 | 
| 165.227.199.204 | attackspam | Digital Ocean BotNet attack - 10s of requests to none existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks node-superagent/4.1.0  | 
                    2019-11-02 01:33:03 | 
| 81.22.45.190 | attackspambots | 11/01/2019-18:24:52.178362 81.22.45.190 Protocol: 6 ET DROP Dshield Block Listed Source group 1  | 
                    2019-11-02 01:35:27 | 
| 185.36.218.168 | attackbots | slow and persistent scanner  | 
                    2019-11-02 01:39:47 | 
| 202.39.70.5 | attackspam | Nov 1 11:59:30 game-panel sshd[18274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5 Nov 1 11:59:32 game-panel sshd[18274]: Failed password for invalid user Adminvps@1 from 202.39.70.5 port 52664 ssh2 Nov 1 12:03:52 game-panel sshd[18381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.39.70.5  | 
                    2019-11-02 01:43:40 | 
| 36.74.67.140 | attackbotsspam | Unauthorized connection attempt from IP address 36.74.67.140 on Port 445(SMB)  | 
                    2019-11-02 02:00:31 | 
| 122.225.76.214 | attackspambots | Unauthorized connection attempt from IP address 122.225.76.214 on Port 445(SMB)  | 
                    2019-11-02 02:01:17 | 
| 94.51.70.1 | attackspambots | Chat Spam  | 
                    2019-11-02 01:25:35 | 
| 103.18.69.186 | attack | Unauthorized connection attempt from IP address 103.18.69.186 on Port 445(SMB)  | 
                    2019-11-02 02:03:21 |