城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.120.16.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.120.16.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024120900 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 15:33:14 CST 2024
;; MSG SIZE rcvd: 105
50.16.120.70.in-addr.arpa domain name pointer syn-070-120-016-050.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
50.16.120.70.in-addr.arpa name = syn-070-120-016-050.res.spectrum.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 95.160.156.227 | attack | Brute force VPN server |
2020-01-29 22:31:46 |
| 201.172.86.7 | attackbotsspam | 2019-07-07 01:54:42 1hjuVt-0007kT-Oe SMTP connection from cablelink86-7.telefonia.intercable.net \[201.172.86.7\]:58471 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 01:54:55 1hjuW6-0007kh-QG SMTP connection from cablelink86-7.telefonia.intercable.net \[201.172.86.7\]:58664 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 01:55:06 1hjuWH-0007m9-Ub SMTP connection from cablelink86-7.telefonia.intercable.net \[201.172.86.7\]:58797 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-29 22:15:40 |
| 201.180.62.143 | attackbotsspam | 2019-09-23 19:38:51 1iCSIU-00025C-1P SMTP connection from \(201-180-62-143.speedy.com.ar\) \[201.180.62.143\]:27195 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-23 19:39:25 1iCSJ1-00027R-Hb SMTP connection from \(201-180-62-143.speedy.com.ar\) \[201.180.62.143\]:27493 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-23 19:39:41 1iCSJI-00027r-87 SMTP connection from \(201-180-62-143.speedy.com.ar\) \[201.180.62.143\]:27627 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-29 22:04:52 |
| 222.186.175.163 | attack | Jan 29 04:01:57 php1 sshd\[8013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Jan 29 04:01:59 php1 sshd\[8013\]: Failed password for root from 222.186.175.163 port 36854 ssh2 Jan 29 04:02:15 php1 sshd\[8048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root Jan 29 04:02:17 php1 sshd\[8048\]: Failed password for root from 222.186.175.163 port 64836 ssh2 Jan 29 04:02:37 php1 sshd\[8072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root |
2020-01-29 22:05:20 |
| 201.149.70.154 | attack | 2020-01-24 22:37:22 1iv6dk-0004fy-Vn SMTP connection from \(154.70.149.201.in-addr.arpa\) \[201.149.70.154\]:57104 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-24 22:37:50 1iv6eC-0004ge-S8 SMTP connection from \(154.70.149.201.in-addr.arpa\) \[201.149.70.154\]:57283 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-24 22:38:07 1iv6eT-0004hO-UC SMTP connection from \(154.70.149.201.in-addr.arpa\) \[201.149.70.154\]:57399 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-29 22:39:00 |
| 201.160.134.250 | attackbots | 2019-07-09 03:30:49 1hkey0-0002BZ-5h SMTP connection from 201.160.134.250.cable.dyn.cableonline.com.mx \[201.160.134.250\]:4549 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 03:31:01 1hkeyB-0002Bg-Bh SMTP connection from 201.160.134.250.cable.dyn.cableonline.com.mx \[201.160.134.250\]:4882 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 03:31:10 1hkeyK-0002Bt-Ii SMTP connection from 201.160.134.250.cable.dyn.cableonline.com.mx \[201.160.134.250\]:5067 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-29 22:34:24 |
| 218.92.0.179 | attack | Jan 29 13:41:57 mail sshd[15729]: Failed password for root from 218.92.0.179 port 8543 ssh2 Jan 29 13:42:00 mail sshd[15729]: Failed password for root from 218.92.0.179 port 8543 ssh2 Jan 29 13:42:05 mail sshd[15729]: Failed password for root from 218.92.0.179 port 8543 ssh2 Jan 29 13:42:10 mail sshd[15729]: Failed password for root from 218.92.0.179 port 8543 ssh2 |
2020-01-29 22:26:23 |
| 186.122.147.189 | attack | Unauthorized connection attempt detected from IP address 186.122.147.189 to port 2220 [J] |
2020-01-29 22:35:50 |
| 122.51.178.89 | attack | Unauthorized connection attempt detected from IP address 122.51.178.89 to port 2220 [J] |
2020-01-29 22:16:56 |
| 201.180.34.106 | attackspambots | 2019-09-16 19:00:02 1i9uM3-0006vD-PK SMTP connection from \(201-180-34-106.speedy.com.ar\) \[201.180.34.106\]:17683 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 19:00:38 1i9uMd-0006xr-Q6 SMTP connection from \(201-180-34-106.speedy.com.ar\) \[201.180.34.106\]:17890 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 19:01:02 1i9uN2-0006yO-DS SMTP connection from \(201-180-34-106.speedy.com.ar\) \[201.180.34.106\]:18038 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-29 22:05:57 |
| 222.140.59.32 | attackspambots | Jan 29 14:35:32 163-172-32-151 proftpd[29532]: 0.0.0.0 (222.140.59.32[222.140.59.32]) - USER anonymous: no such user found from 222.140.59.32 [222.140.59.32] to 163.172.32.151:21 ... |
2020-01-29 22:04:31 |
| 142.93.198.152 | attack | Jan 29 04:02:40 eddieflores sshd\[25796\]: Invalid user weiwei from 142.93.198.152 Jan 29 04:02:40 eddieflores sshd\[25796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.152 Jan 29 04:02:41 eddieflores sshd\[25796\]: Failed password for invalid user weiwei from 142.93.198.152 port 59222 ssh2 Jan 29 04:05:46 eddieflores sshd\[26193\]: Invalid user selvan from 142.93.198.152 Jan 29 04:05:46 eddieflores sshd\[26193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.152 |
2020-01-29 22:16:30 |
| 104.244.79.250 | attackbots | Unauthorized connection attempt detected from IP address 104.244.79.250 to port 22 [J] |
2020-01-29 22:00:14 |
| 222.186.175.147 | attack | Jan 29 15:12:41 MK-Soft-Root1 sshd[28401]: Failed password for root from 222.186.175.147 port 38452 ssh2 Jan 29 15:12:46 MK-Soft-Root1 sshd[28401]: Failed password for root from 222.186.175.147 port 38452 ssh2 ... |
2020-01-29 22:17:32 |
| 201.156.227.20 | attackbots | 2019-01-30 23:00:03 H=201-156-227-20.reservada.static.axtel.net \[201.156.227.20\]:28736 I=\[193.107.88.166\]:25 F=\ |
2020-01-29 22:37:47 |