城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.68.102.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35045
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;71.68.102.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 21:09:52 CST 2025
;; MSG SIZE rcvd: 105
99.102.68.71.in-addr.arpa domain name pointer syn-071-068-102-099.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.102.68.71.in-addr.arpa name = syn-071-068-102-099.res.spectrum.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 134.73.76.182 | attackspam | Postfix DNSBL listed. Trying to send SPAM. |
2019-10-08 21:10:10 |
| 139.59.75.75 | attackspam | trying to login to a wordpress site using various usernames |
2019-10-08 21:00:29 |
| 222.186.175.167 | attackbotsspam | Oct 8 14:57:22 meumeu sshd[27079]: Failed password for root from 222.186.175.167 port 58566 ssh2 Oct 8 14:57:27 meumeu sshd[27079]: Failed password for root from 222.186.175.167 port 58566 ssh2 Oct 8 14:57:32 meumeu sshd[27079]: Failed password for root from 222.186.175.167 port 58566 ssh2 Oct 8 14:57:36 meumeu sshd[27079]: Failed password for root from 222.186.175.167 port 58566 ssh2 ... |
2019-10-08 20:58:03 |
| 54.37.230.141 | attack | Oct 8 14:37:27 SilenceServices sshd[18090]: Failed password for root from 54.37.230.141 port 35394 ssh2 Oct 8 14:41:28 SilenceServices sshd[19230]: Failed password for root from 54.37.230.141 port 46970 ssh2 |
2019-10-08 20:48:45 |
| 140.143.53.145 | attackbots | Oct 8 02:43:57 php1 sshd\[9510\]: Invalid user Motdepasse1qaz from 140.143.53.145 Oct 8 02:43:57 php1 sshd\[9510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.53.145 Oct 8 02:44:00 php1 sshd\[9510\]: Failed password for invalid user Motdepasse1qaz from 140.143.53.145 port 15633 ssh2 Oct 8 02:49:49 php1 sshd\[10072\]: Invalid user !@qwaszx from 140.143.53.145 Oct 8 02:49:49 php1 sshd\[10072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.53.145 |
2019-10-08 20:56:38 |
| 92.242.240.17 | attackspambots | Oct 8 14:37:23 xeon sshd[48839]: Failed password for root from 92.242.240.17 port 60764 ssh2 |
2019-10-08 21:33:43 |
| 178.128.183.90 | attackbots | Oct 8 12:59:17 ip-172-31-62-245 sshd\[8844\]: Invalid user Story2017 from 178.128.183.90\ Oct 8 12:59:19 ip-172-31-62-245 sshd\[8844\]: Failed password for invalid user Story2017 from 178.128.183.90 port 35490 ssh2\ Oct 8 13:03:31 ip-172-31-62-245 sshd\[8876\]: Invalid user 4%6rTyfGhvBn from 178.128.183.90\ Oct 8 13:03:33 ip-172-31-62-245 sshd\[8876\]: Failed password for invalid user 4%6rTyfGhvBn from 178.128.183.90 port 47290 ssh2\ Oct 8 13:07:45 ip-172-31-62-245 sshd\[8911\]: Invalid user Gas123 from 178.128.183.90\ |
2019-10-08 21:09:11 |
| 49.88.112.80 | attackbots | Oct 8 14:49:52 MK-Soft-Root1 sshd[18226]: Failed password for root from 49.88.112.80 port 52417 ssh2 Oct 8 14:49:55 MK-Soft-Root1 sshd[18226]: Failed password for root from 49.88.112.80 port 52417 ssh2 ... |
2019-10-08 20:50:09 |
| 197.210.57.87 | attackspam | Automatic report - Port Scan Attack |
2019-10-08 21:02:00 |
| 114.32.153.15 | attackbotsspam | Oct 8 02:41:31 eddieflores sshd\[16603\]: Invalid user Micro2017 from 114.32.153.15 Oct 8 02:41:31 eddieflores sshd\[16603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-32-153-15.hinet-ip.hinet.net Oct 8 02:41:33 eddieflores sshd\[16603\]: Failed password for invalid user Micro2017 from 114.32.153.15 port 44508 ssh2 Oct 8 02:45:47 eddieflores sshd\[16980\]: Invalid user P4sswort@ABC from 114.32.153.15 Oct 8 02:45:47 eddieflores sshd\[16980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-32-153-15.hinet-ip.hinet.net |
2019-10-08 20:55:24 |
| 222.186.42.15 | attack | Oct 8 16:00:00 sauna sshd[21429]: Failed password for root from 222.186.42.15 port 62480 ssh2 Oct 8 16:00:02 sauna sshd[21429]: Failed password for root from 222.186.42.15 port 62480 ssh2 ... |
2019-10-08 21:03:44 |
| 14.231.34.234 | attackbotsspam | Oct 8 13:55:23 dev sshd\[15502\]: Invalid user admin from 14.231.34.234 port 57366 Oct 8 13:55:23 dev sshd\[15502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.231.34.234 Oct 8 13:55:26 dev sshd\[15502\]: Failed password for invalid user admin from 14.231.34.234 port 57366 ssh2 |
2019-10-08 21:30:26 |
| 198.228.145.150 | attack | Oct 8 15:02:00 ns41 sshd[31277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.228.145.150 |
2019-10-08 21:15:48 |
| 88.84.200.139 | attackbotsspam | Oct 8 08:45:23 ny01 sshd[17275]: Failed password for root from 88.84.200.139 port 57225 ssh2 Oct 8 08:49:13 ny01 sshd[17594]: Failed password for root from 88.84.200.139 port 47907 ssh2 |
2019-10-08 20:57:15 |
| 86.122.219.173 | attack | Automatic report - Port Scan Attack |
2019-10-08 21:08:26 |