城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.185.149.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.185.149.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:24:47 CST 2025
;; MSG SIZE rcvd: 106
21.149.185.70.in-addr.arpa domain name pointer ip70-185-149-21.sb.sd.cox.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.149.185.70.in-addr.arpa name = ip70-185-149-21.sb.sd.cox.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 172.104.62.237 | attack | eintrachtkultkellerfulda.de 172.104.62.237 \[17/Aug/2019:20:30:21 +0200\] "POST /wp-login.php HTTP/1.1" 200 2062 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" eintrachtkultkellerfulda.de 172.104.62.237 \[17/Aug/2019:20:30:23 +0200\] "POST /wp-login.php HTTP/1.1" 200 2027 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-08-18 07:05:57 |
| 195.154.255.85 | attack | Aug 17 19:12:46 plusreed sshd[13311]: Invalid user discord from 195.154.255.85 ... |
2019-08-18 07:22:40 |
| 111.231.114.109 | attackbots | SSH Bruteforce attack |
2019-08-18 07:01:53 |
| 81.92.149.60 | attack | Aug 17 20:26:22 root sshd[8397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.92.149.60 Aug 17 20:26:24 root sshd[8397]: Failed password for invalid user web from 81.92.149.60 port 53734 ssh2 Aug 17 20:30:48 root sshd[8435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.92.149.60 ... |
2019-08-18 06:42:33 |
| 192.3.152.158 | attack | Time: Sat Aug 17 15:21:47 2019 -0300 IP: 192.3.152.158 (US/United States/192-3-152-158-host.colocrossing.com) Failures: 30 (smtpauth) Interval: 3600 seconds Blocked: Permanent Block |
2019-08-18 07:09:46 |
| 167.99.76.71 | attack | Aug 17 23:05:25 hcbbdb sshd\[1485\]: Invalid user mayer from 167.99.76.71 Aug 17 23:05:25 hcbbdb sshd\[1485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.76.71 Aug 17 23:05:27 hcbbdb sshd\[1485\]: Failed password for invalid user mayer from 167.99.76.71 port 37398 ssh2 Aug 17 23:10:26 hcbbdb sshd\[2076\]: Invalid user xp from 167.99.76.71 Aug 17 23:10:26 hcbbdb sshd\[2076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.76.71 |
2019-08-18 07:20:03 |
| 159.203.111.100 | attackspambots | Aug 17 11:59:26 sachi sshd\[22442\]: Invalid user icecast2 from 159.203.111.100 Aug 17 11:59:26 sachi sshd\[22442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.111.100 Aug 17 11:59:28 sachi sshd\[22442\]: Failed password for invalid user icecast2 from 159.203.111.100 port 40184 ssh2 Aug 17 12:05:28 sachi sshd\[23015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.111.100 user=root Aug 17 12:05:30 sachi sshd\[23015\]: Failed password for root from 159.203.111.100 port 35149 ssh2 |
2019-08-18 07:12:33 |
| 196.196.47.250 | attackspambots | NAME : "" "" CIDR : | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack - block certain countries :) IP: 196.196.47.250 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-08-18 06:44:44 |
| 139.99.201.100 | attackbotsspam | Aug 18 00:27:22 SilenceServices sshd[14449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.201.100 Aug 18 00:27:24 SilenceServices sshd[14449]: Failed password for invalid user gmod from 139.99.201.100 port 46638 ssh2 Aug 18 00:32:55 SilenceServices sshd[17795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.201.100 |
2019-08-18 06:48:32 |
| 72.94.181.219 | attack | Aug 17 23:12:38 dev0-dcde-rnet sshd[18074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.94.181.219 Aug 17 23:12:39 dev0-dcde-rnet sshd[18074]: Failed password for invalid user ncarpen from 72.94.181.219 port 6734 ssh2 Aug 17 23:17:29 dev0-dcde-rnet sshd[18108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.94.181.219 |
2019-08-18 06:45:24 |
| 185.220.101.48 | attackspam | Invalid user service from 185.220.101.48 port 43173 |
2019-08-18 06:48:58 |
| 49.231.13.190 | attack | Unauthorized connection attempt from IP address 49.231.13.190 on Port 445(SMB) |
2019-08-18 06:50:08 |
| 103.38.194.139 | attack | Aug 17 12:20:29 eddieflores sshd\[18801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.194.139 user=root Aug 17 12:20:32 eddieflores sshd\[18801\]: Failed password for root from 103.38.194.139 port 60582 ssh2 Aug 17 12:27:48 eddieflores sshd\[19444\]: Invalid user chary from 103.38.194.139 Aug 17 12:27:48 eddieflores sshd\[19444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.194.139 Aug 17 12:27:50 eddieflores sshd\[19444\]: Failed password for invalid user chary from 103.38.194.139 port 50342 ssh2 |
2019-08-18 07:14:23 |
| 104.210.43.219 | attackbots | Aug 18 00:49:21 localhost sshd\[1484\]: Invalid user duckie from 104.210.43.219 port 53505 Aug 18 00:49:21 localhost sshd\[1484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.210.43.219 Aug 18 00:49:23 localhost sshd\[1484\]: Failed password for invalid user duckie from 104.210.43.219 port 53505 ssh2 |
2019-08-18 06:52:04 |
| 18.209.157.19 | attackspam | Unauthorized connection attempt from IP address 18.209.157.19 on Port 3389(RDP) |
2019-08-18 07:20:19 |