城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.122.196.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.122.196.19. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 15:09:16 CST 2022
;; MSG SIZE rcvd: 106
19.196.122.70.in-addr.arpa domain name pointer cpe-70-122-196-19.tx.res.rr.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
19.196.122.70.in-addr.arpa name = cpe-70-122-196-19.tx.res.rr.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 118.254.134.52 | attackspambots | Brute force blocker - service: proftpd1 - aantal: 40 - Fri Jun 1 01:25:17 2018 |
2020-04-30 19:47:52 |
| 88.98.254.131 | attackspam | Brute-Force,SSH |
2020-04-30 19:50:27 |
| 222.186.30.112 | attackspambots | Apr 30 19:11:51 webhost01 sshd[25918]: Failed password for root from 222.186.30.112 port 13520 ssh2 ... |
2020-04-30 20:13:38 |
| 129.213.32.32 | attackspam | Brute-force attempt banned |
2020-04-30 19:52:37 |
| 45.117.82.134 | attack | 2020-04-30T10:55:03.884829homeassistant sshd[22541]: Invalid user yuyue from 45.117.82.134 port 59592 2020-04-30T10:55:03.894737homeassistant sshd[22541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.117.82.134 ... |
2020-04-30 19:38:15 |
| 37.228.116.129 | spam | Spammail mit unerwünschtem Sexangeboten. Passt auch überhaupt nicht zu meinem Profil. Da ich über Freenet schon gehackt wurde über russische Server, könnte meine E-Mailadresse aus diesen alten Vorfällen stammen. Ich habe vor kurzem eine Warnung von Apple über unerwünschte Aktionen auf meinen Internetaktionen bekommen, die ich zu entfernen versucht habe. Das ist mir wohl auch auf dem E-Mail Postfach von Apple gelungen. Aber auf dem Original Freenet Kanal ist mir das wohl nicht gelungen. |
2020-04-30 19:53:54 |
| 49.233.220.227 | attack | SSH brutforce |
2020-04-30 20:00:34 |
| 168.62.174.233 | attack | Apr 30 10:34:40 vlre-nyc-1 sshd\[13544\]: Invalid user kk from 168.62.174.233 Apr 30 10:34:40 vlre-nyc-1 sshd\[13544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.62.174.233 Apr 30 10:34:42 vlre-nyc-1 sshd\[13544\]: Failed password for invalid user kk from 168.62.174.233 port 43032 ssh2 Apr 30 10:38:22 vlre-nyc-1 sshd\[13628\]: Invalid user reach from 168.62.174.233 Apr 30 10:38:22 vlre-nyc-1 sshd\[13628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.62.174.233 ... |
2020-04-30 20:10:22 |
| 60.162.42.136 | attackspambots | Honeypot attack, port: 445, PTR: 136.42.162.60.broad.tz.zj.dynamic.163data.com.cn. |
2020-04-30 19:59:04 |
| 115.159.48.220 | attackbotsspam | $f2bV_matches |
2020-04-30 20:09:32 |
| 117.50.40.157 | attack | SSH Brute-Forcing (server1) |
2020-04-30 20:07:40 |
| 222.186.31.166 | attackspambots | Apr 30 07:49:47 debian sshd[13208]: Unable to negotiate with 222.186.31.166 port 62718: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] Apr 30 08:17:08 debian sshd[14406]: Unable to negotiate with 222.186.31.166 port 62284: no matching key exchange method found. Their offer: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2020-04-30 20:17:30 |
| 46.38.144.32 | attackspam | Apr 30 14:04:16 relay postfix/smtpd\[10835\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 30 14:04:31 relay postfix/smtpd\[7940\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 30 14:05:40 relay postfix/smtpd\[11326\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 30 14:05:53 relay postfix/smtpd\[4327\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 30 14:07:04 relay postfix/smtpd\[11326\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-04-30 20:11:53 |
| 123.206.217.32 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-30 19:39:03 |
| 109.169.89.101 | attack | lfd: (smtpauth) Failed SMTP AUTH login from 109.169.89.101 (GB/United Kingdom/-): 5 in the last 3600 secs - Tue May 29 19:38:28 2018 |
2020-04-30 19:58:41 |