城市(city): Tulsa
省份(region): Oklahoma
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.238.147.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30237
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;69.238.147.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:22:27 CST 2025
;; MSG SIZE rcvd: 107
138.147.238.69.in-addr.arpa domain name pointer adsl-69-238-147-138.dsl.skt2ca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.147.238.69.in-addr.arpa name = adsl-69-238-147-138.dsl.skt2ca.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 41.238.147.99 | attackbots | ssh failed login |
2019-11-29 19:19:51 |
| 124.63.5.179 | attack | Fail2Ban - FTP Abuse Attempt |
2019-11-29 19:36:11 |
| 103.235.236.224 | attackbotsspam | fail2ban |
2019-11-29 19:34:14 |
| 8.208.28.6 | attackspambots | Nov 29 01:08:58 aragorn sshd[32331]: Invalid user sean from 8.208.28.6 Nov 29 01:21:50 aragorn sshd[3081]: Invalid user admin from 8.208.28.6 Nov 29 01:21:51 aragorn sshd[3080]: Invalid user admin from 8.208.28.6 Nov 29 01:21:52 aragorn sshd[3082]: Invalid user admin from 8.208.28.6 ... |
2019-11-29 19:38:00 |
| 51.79.68.99 | attack | 2019-11-29T10:20:05.196164abusebot-6.cloudsearch.cf sshd\[12630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.ip-51-79-68.net user=root |
2019-11-29 18:55:46 |
| 111.230.211.183 | attackspambots | Nov 29 09:50:50 srv01 sshd[28904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.211.183 user=root Nov 29 09:50:52 srv01 sshd[28904]: Failed password for root from 111.230.211.183 port 56066 ssh2 Nov 29 09:54:20 srv01 sshd[29146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.211.183 user=mail Nov 29 09:54:23 srv01 sshd[29146]: Failed password for mail from 111.230.211.183 port 60684 ssh2 Nov 29 09:57:45 srv01 sshd[29378]: Invalid user sophie from 111.230.211.183 port 37080 ... |
2019-11-29 19:31:53 |
| 51.255.35.58 | attackspam | Nov 29 11:56:09 server sshd\[1299\]: Invalid user remple from 51.255.35.58 Nov 29 11:56:09 server sshd\[1299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.ip-51-255-35.eu Nov 29 11:56:11 server sshd\[1299\]: Failed password for invalid user remple from 51.255.35.58 port 59354 ssh2 Nov 29 12:26:41 server sshd\[9203\]: Invalid user musiz from 51.255.35.58 Nov 29 12:26:41 server sshd\[9203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.ip-51-255-35.eu ... |
2019-11-29 19:11:18 |
| 185.209.0.90 | attack | 11/29/2019-04:58:55.118851 185.209.0.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-29 18:58:05 |
| 63.81.87.113 | attackspambots | $f2bV_matches |
2019-11-29 19:17:27 |
| 140.143.223.242 | attackspambots | Nov 29 12:04:15 mail sshd[10963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.223.242 Nov 29 12:04:17 mail sshd[10963]: Failed password for invalid user admin from 140.143.223.242 port 46298 ssh2 Nov 29 12:11:51 mail sshd[14184]: Failed password for games from 140.143.223.242 port 49128 ssh2 |
2019-11-29 19:18:46 |
| 185.132.231.242 | attackspambots | Automatic report - Port Scan Attack |
2019-11-29 19:29:55 |
| 185.176.27.166 | attackspam | 11/29/2019-11:49:04.126712 185.176.27.166 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-11-29 19:13:56 |
| 36.22.187.34 | attackspam | Nov 29 01:15:00 tdfoods sshd\[2393\]: Invalid user squid from 36.22.187.34 Nov 29 01:15:00 tdfoods sshd\[2393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22.187.34 Nov 29 01:15:01 tdfoods sshd\[2393\]: Failed password for invalid user squid from 36.22.187.34 port 50214 ssh2 Nov 29 01:19:39 tdfoods sshd\[2747\]: Invalid user administrator from 36.22.187.34 Nov 29 01:19:39 tdfoods sshd\[2747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.22.187.34 |
2019-11-29 19:27:08 |
| 119.84.8.43 | attack | Nov 29 16:11:14 gw1 sshd[24340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.84.8.43 Nov 29 16:11:15 gw1 sshd[24340]: Failed password for invalid user elmer from 119.84.8.43 port 39784 ssh2 ... |
2019-11-29 19:33:48 |
| 152.32.96.165 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-11-29 19:26:48 |