城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): Verizon
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.220.44.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.220.44.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030302 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 04 08:27:22 CST 2025
;; MSG SIZE rcvd: 105
99.44.220.70.in-addr.arpa domain name pointer 99.sub-70-220-44.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.44.220.70.in-addr.arpa name = 99.sub-70-220-44.myvzw.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 116.196.117.97 | attack | Jul 16 06:53:05 vps639187 sshd\[22973\]: Invalid user annika from 116.196.117.97 port 38380 Jul 16 06:53:05 vps639187 sshd\[22973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.117.97 Jul 16 06:53:07 vps639187 sshd\[22973\]: Failed password for invalid user annika from 116.196.117.97 port 38380 ssh2 ... |
2020-07-16 13:07:01 |
| 106.124.142.206 | attackspambots | $f2bV_matches |
2020-07-16 12:47:55 |
| 188.166.6.130 | attackbots | Jul 16 06:35:45 lnxweb62 sshd[30827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.6.130 |
2020-07-16 12:45:13 |
| 119.235.19.66 | attackspam | Jul 16 06:09:55 srv-ubuntu-dev3 sshd[83227]: Invalid user xian from 119.235.19.66 Jul 16 06:09:55 srv-ubuntu-dev3 sshd[83227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.19.66 Jul 16 06:09:55 srv-ubuntu-dev3 sshd[83227]: Invalid user xian from 119.235.19.66 Jul 16 06:09:57 srv-ubuntu-dev3 sshd[83227]: Failed password for invalid user xian from 119.235.19.66 port 44171 ssh2 Jul 16 06:14:36 srv-ubuntu-dev3 sshd[83915]: Invalid user na from 119.235.19.66 Jul 16 06:14:36 srv-ubuntu-dev3 sshd[83915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.235.19.66 Jul 16 06:14:36 srv-ubuntu-dev3 sshd[83915]: Invalid user na from 119.235.19.66 Jul 16 06:14:38 srv-ubuntu-dev3 sshd[83915]: Failed password for invalid user na from 119.235.19.66 port 51375 ssh2 Jul 16 06:19:28 srv-ubuntu-dev3 sshd[84650]: Invalid user autumn from 119.235.19.66 ... |
2020-07-16 12:30:15 |
| 31.221.81.222 | attackspam | Jul 16 04:38:41 game-panel sshd[7669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.221.81.222 Jul 16 04:38:42 game-panel sshd[7669]: Failed password for invalid user admin from 31.221.81.222 port 43686 ssh2 Jul 16 04:42:45 game-panel sshd[8015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.221.81.222 |
2020-07-16 12:53:07 |
| 142.11.214.36 | attackspam | *Port Scan* detected from 142.11.214.36 (US/United States/Washington/Seattle/hwsrv-751373.hostwindsdns.com). 4 hits in the last 190 seconds |
2020-07-16 13:03:15 |
| 117.50.95.121 | attackbots | Jul 16 06:26:58 vps sshd[680261]: Failed password for invalid user sftpuser from 117.50.95.121 port 53538 ssh2 Jul 16 06:30:18 vps sshd[697407]: Invalid user direzione from 117.50.95.121 port 41784 Jul 16 06:30:18 vps sshd[697407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.95.121 Jul 16 06:30:21 vps sshd[697407]: Failed password for invalid user direzione from 117.50.95.121 port 41784 ssh2 Jul 16 06:33:40 vps sshd[710598]: Invalid user lll from 117.50.95.121 port 58266 ... |
2020-07-16 12:54:52 |
| 200.27.212.22 | attack | fail2ban |
2020-07-16 12:43:20 |
| 191.233.255.128 | attackspam | 2020-07-15 23:48:39.874570-0500 localhost sshd[49168]: Failed password for root from 191.233.255.128 port 47541 ssh2 |
2020-07-16 13:02:22 |
| 223.223.176.184 | attack | Invalid user backup from 223.223.176.184 port 51674 |
2020-07-16 13:12:44 |
| 51.75.144.43 | attackspambots | Automatic report - Banned IP Access |
2020-07-16 12:43:51 |
| 222.186.173.226 | attackspambots | Jul 16 07:10:52 vps sshd[895688]: Failed password for root from 222.186.173.226 port 14454 ssh2 Jul 16 07:10:55 vps sshd[895688]: Failed password for root from 222.186.173.226 port 14454 ssh2 Jul 16 07:10:59 vps sshd[895688]: Failed password for root from 222.186.173.226 port 14454 ssh2 Jul 16 07:11:03 vps sshd[895688]: Failed password for root from 222.186.173.226 port 14454 ssh2 Jul 16 07:11:06 vps sshd[895688]: Failed password for root from 222.186.173.226 port 14454 ssh2 ... |
2020-07-16 13:11:38 |
| 51.77.135.89 | attack | 51.77.135.89 - - [15/Jul/2020:22:21:20 -0600] "POST /cgi-bin/php-cgi?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%69%6F%6E%73%3D%22%22+%2D%64+%6F%70%65%6E%5F%62%61%73%65%64%69%72%3D%6E%6F%6E%65+%2D%64+%61%75%74%6F%5F%70%72%65%70%65%6E%64%5F%66%69%6C%65%3D%70%68%70%3A%2F%2F%69%6E%70%75%74+%2D%64+%63%67%69%2E%66%6F%72%63%65%5F%72%65%64%69%72%65%63%74%3D%30+%2D%64+%63%67%69%2E%72%65%64%69%72%65%63%74%5F%73%74%61%74%75%73%5F%65%6E%76%3D%30+%2D%6E HTTP/1.1" 301 1585 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36" ... |
2020-07-16 12:37:38 |
| 77.121.81.204 | attackbots | Jul 15 22:16:15 server1 sshd\[11559\]: Failed password for invalid user debi from 77.121.81.204 port 42266 ssh2 Jul 15 22:20:23 server1 sshd\[12810\]: Invalid user platform from 77.121.81.204 Jul 15 22:20:23 server1 sshd\[12810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.121.81.204 Jul 15 22:20:25 server1 sshd\[12810\]: Failed password for invalid user platform from 77.121.81.204 port 33991 ssh2 Jul 15 22:24:29 server1 sshd\[14053\]: Invalid user jiyuan from 77.121.81.204 ... |
2020-07-16 12:42:29 |
| 193.169.145.66 | attack | apache exploit attempt |
2020-07-16 13:10:20 |