城市(city): Canton
省份(region): Michigan
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): Comcast Cable Communications, LLC
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.42.139.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28009
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.42.139.49. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019061201 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 07:59:25 CST 2019
;; MSG SIZE rcvd: 116
49.139.42.68.in-addr.arpa domain name pointer c-68-42-139-49.hsd1.mi.comcast.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
49.139.42.68.in-addr.arpa name = c-68-42-139-49.hsd1.mi.comcast.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 219.139.131.131 | attack | SASL PLAIN auth failed: ruser=... |
2020-04-10 09:20:58 |
| 167.99.153.115 | attackbotsspam | trying to access non-authorized port |
2020-04-10 09:15:18 |
| 167.99.194.54 | attack | Apr 9 23:29:23 ms-srv sshd[22401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54 Apr 9 23:29:25 ms-srv sshd[22401]: Failed password for invalid user test from 167.99.194.54 port 47092 ssh2 |
2020-04-10 08:55:21 |
| 167.114.144.96 | attackbotsspam | Apr 10 00:45:27 powerpi2 sshd[9472]: Invalid user ubuntu from 167.114.144.96 port 56290 Apr 10 00:45:29 powerpi2 sshd[9472]: Failed password for invalid user ubuntu from 167.114.144.96 port 56290 ssh2 Apr 10 00:52:45 powerpi2 sshd[9888]: Invalid user test from 167.114.144.96 port 48712 ... |
2020-04-10 09:29:16 |
| 45.142.195.2 | attackspambots | Apr 10 02:58:21 relay postfix/smtpd\[30964\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 10 02:59:01 relay postfix/smtpd\[18919\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 10 02:59:51 relay postfix/smtpd\[16908\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 10 03:00:03 relay postfix/smtpd\[30964\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 10 03:00:43 relay postfix/smtpd\[14468\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-04-10 09:07:54 |
| 66.249.64.142 | attack | $f2bV_matches |
2020-04-10 09:01:31 |
| 96.77.182.189 | attackbotsspam | Apr 9 10:07:47 UTC__SANYALnet-Labs__cac14 sshd[17781]: Connection from 96.77.182.189 port 48614 on 45.62.235.190 port 22 Apr 9 10:07:48 UTC__SANYALnet-Labs__cac14 sshd[17781]: Address 96.77.182.189 maps to 96-77-182-189-static.hfc.comcastbusiness.net, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Apr 9 10:07:48 UTC__SANYALnet-Labs__cac14 sshd[17781]: Invalid user postgres from 96.77.182.189 Apr 9 10:07:48 UTC__SANYALnet-Labs__cac14 sshd[17781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.77.182.189 Apr 9 10:07:50 UTC__SANYALnet-Labs__cac14 sshd[17781]: Failed password for invalid user postgres from 96.77.182.189 port 48614 ssh2 Apr 9 10:07:50 UTC__SANYALnet-Labs__cac14 sshd[17781]: Received disconnect from 96.77.182.189: 11: Bye Bye [preauth] Apr 9 10:11:46 UTC__SANYALnet-Labs__cac14 sshd[17944]: Connection from 96.77.182.189 port 33828 on 45.62.235.190 port 22 Apr 9 10:11:47 UTC__SANYALnet........ ------------------------------- |
2020-04-10 09:12:14 |
| 59.36.143.3 | attack | Apr 9 23:48:54 srv-ubuntu-dev3 sshd[89061]: Invalid user postgres from 59.36.143.3 Apr 9 23:48:54 srv-ubuntu-dev3 sshd[89061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.143.3 Apr 9 23:48:54 srv-ubuntu-dev3 sshd[89061]: Invalid user postgres from 59.36.143.3 Apr 9 23:48:56 srv-ubuntu-dev3 sshd[89061]: Failed password for invalid user postgres from 59.36.143.3 port 34422 ssh2 Apr 9 23:51:30 srv-ubuntu-dev3 sshd[89496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.143.3 user=root Apr 9 23:51:32 srv-ubuntu-dev3 sshd[89496]: Failed password for root from 59.36.143.3 port 47835 ssh2 Apr 9 23:54:12 srv-ubuntu-dev3 sshd[90072]: Invalid user postgres from 59.36.143.3 Apr 9 23:54:12 srv-ubuntu-dev3 sshd[90072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.143.3 Apr 9 23:54:12 srv-ubuntu-dev3 sshd[90072]: Invalid user postgres from 59.36.1 ... |
2020-04-10 09:03:05 |
| 200.116.105.213 | attackbotsspam | Scanned 3 times in the last 24 hours on port 22 |
2020-04-10 09:01:47 |
| 111.230.175.183 | attackspam | Apr 10 03:03:26 server sshd[26694]: Failed password for invalid user admin from 111.230.175.183 port 50538 ssh2 Apr 10 03:04:46 server sshd[27000]: Failed password for invalid user oracle from 111.230.175.183 port 42100 ssh2 Apr 10 03:05:46 server sshd[27251]: Failed password for invalid user user from 111.230.175.183 port 56152 ssh2 |
2020-04-10 09:18:46 |
| 139.99.219.208 | attack | Apr 9 21:50:21 ip-172-31-61-156 sshd[9614]: Failed password for ubuntu from 139.99.219.208 port 59764 ssh2 Apr 9 21:53:43 ip-172-31-61-156 sshd[9708]: Invalid user asakura from 139.99.219.208 Apr 9 21:53:43 ip-172-31-61-156 sshd[9708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.219.208 Apr 9 21:53:43 ip-172-31-61-156 sshd[9708]: Invalid user asakura from 139.99.219.208 Apr 9 21:53:45 ip-172-31-61-156 sshd[9708]: Failed password for invalid user asakura from 139.99.219.208 port 57085 ssh2 ... |
2020-04-10 09:24:21 |
| 122.51.198.90 | attackspam | Apr 9 23:53:50 ip-172-31-62-245 sshd\[25427\]: Invalid user postgres from 122.51.198.90\ Apr 9 23:53:51 ip-172-31-62-245 sshd\[25427\]: Failed password for invalid user postgres from 122.51.198.90 port 50886 ssh2\ Apr 9 23:59:27 ip-172-31-62-245 sshd\[25588\]: Invalid user user1 from 122.51.198.90\ Apr 9 23:59:29 ip-172-31-62-245 sshd\[25588\]: Failed password for invalid user user1 from 122.51.198.90 port 50080 ssh2\ Apr 10 00:02:35 ip-172-31-62-245 sshd\[25666\]: Invalid user chef from 122.51.198.90\ |
2020-04-10 09:02:52 |
| 206.189.87.214 | attack | Scanned 3 times in the last 24 hours on port 22 |
2020-04-10 08:53:10 |
| 69.158.207.141 | attack | Apr 9 17:53:21 NPSTNNYC01T sshd[29104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.158.207.141 Apr 9 17:53:23 NPSTNNYC01T sshd[29104]: Failed password for invalid user nexus from 69.158.207.141 port 60785 ssh2 Apr 9 17:53:56 NPSTNNYC01T sshd[29117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.158.207.141 ... |
2020-04-10 09:15:31 |
| 14.226.243.96 | attack | Autoban 14.226.243.96 AUTH/CONNECT |
2020-04-10 08:52:12 |