城市(city): Los Angeles
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.202.13.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.202.13.93. IN A
;; AUTHORITY SECTION:
. 566 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022101600 1800 900 604800 86400
;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 16 19:04:35 CST 2022
;; MSG SIZE rcvd: 105
93.13.202.74.in-addr.arpa domain name pointer 74-202-13-93.static.ctl.one.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
93.13.202.74.in-addr.arpa name = 74-202-13-93.static.ctl.one.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 46.146.136.8 | attackspambots | Sep 24 09:56:43 Ubuntu-1404-trusty-64-minimal sshd\[17316\]: Invalid user hadoop from 46.146.136.8 Sep 24 09:56:43 Ubuntu-1404-trusty-64-minimal sshd\[17316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.136.8 Sep 24 09:56:45 Ubuntu-1404-trusty-64-minimal sshd\[17316\]: Failed password for invalid user hadoop from 46.146.136.8 port 56334 ssh2 Sep 24 10:05:49 Ubuntu-1404-trusty-64-minimal sshd\[26515\]: Invalid user stack from 46.146.136.8 Sep 24 10:05:49 Ubuntu-1404-trusty-64-minimal sshd\[26515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.146.136.8 |
2020-09-24 16:12:30 |
| 161.35.11.118 | attackspam | Sep 23 22:25:32 web9 sshd\[23141\]: Invalid user admin1 from 161.35.11.118 Sep 23 22:25:32 web9 sshd\[23141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.11.118 Sep 23 22:25:34 web9 sshd\[23141\]: Failed password for invalid user admin1 from 161.35.11.118 port 52608 ssh2 Sep 23 22:30:50 web9 sshd\[23822\]: Invalid user tech from 161.35.11.118 Sep 23 22:30:50 web9 sshd\[23822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.11.118 |
2020-09-24 16:31:38 |
| 27.128.244.13 | attackspambots | Sep 24 09:31:22 host sshd[6078]: Invalid user nuxeo from 27.128.244.13 port 37022 ... |
2020-09-24 16:02:21 |
| 41.64.172.51 | attackbots | port scan and connect, tcp 1433 (ms-sql-s) |
2020-09-24 16:23:04 |
| 123.240.0.61 | attackbotsspam | " " |
2020-09-24 16:11:25 |
| 119.147.144.22 | attackspambots |
|
2020-09-24 16:17:03 |
| 111.229.57.21 | attack | Sep 24 09:10:28 h2779839 sshd[1478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.57.21 user=root Sep 24 09:10:30 h2779839 sshd[1478]: Failed password for root from 111.229.57.21 port 44898 ssh2 Sep 24 09:15:16 h2779839 sshd[1524]: Invalid user leon from 111.229.57.21 port 39932 Sep 24 09:15:16 h2779839 sshd[1524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.57.21 Sep 24 09:15:16 h2779839 sshd[1524]: Invalid user leon from 111.229.57.21 port 39932 Sep 24 09:15:19 h2779839 sshd[1524]: Failed password for invalid user leon from 111.229.57.21 port 39932 ssh2 Sep 24 09:19:49 h2779839 sshd[1587]: Invalid user lia from 111.229.57.21 port 34956 Sep 24 09:19:49 h2779839 sshd[1587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.57.21 Sep 24 09:19:49 h2779839 sshd[1587]: Invalid user lia from 111.229.57.21 port 34956 Sep 24 09:19:51 h2779839 ss ... |
2020-09-24 16:14:59 |
| 39.65.147.118 | attackspambots | Honeypot hit. |
2020-09-24 16:27:37 |
| 14.232.155.113 | attack | Unauthorized connection attempt from IP address 14.232.155.113 on Port 445(SMB) |
2020-09-24 16:24:58 |
| 200.198.136.122 | attackspam | Unauthorized connection attempt from IP address 200.198.136.122 on Port 445(SMB) |
2020-09-24 16:21:54 |
| 113.172.164.254 | attackbots | (eximsyntax) Exim syntax errors from 113.172.164.254 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-09-23 20:32:20 SMTP call from [113.172.164.254] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f? ?") |
2020-09-24 16:01:05 |
| 176.159.128.148 | attackbotsspam | Sep 23 14:02:15 logopedia-1vcpu-1gb-nyc1-01 sshd[126973]: Failed password for root from 176.159.128.148 port 40776 ssh2 ... |
2020-09-24 16:13:02 |
| 144.217.217.174 | attackspambots | Sep 24 04:24:16 [host] kernel: [1246269.944550] [U Sep 24 04:24:16 [host] kernel: [1246269.946705] [U Sep 24 04:24:16 [host] kernel: [1246269.948172] [U Sep 24 04:24:16 [host] kernel: [1246269.950871] [U Sep 24 04:24:16 [host] kernel: [1246269.951240] [U Sep 24 04:24:16 [host] kernel: [1246269.956783] [U Sep 24 04:24:16 [host] kernel: [1246269.957105] [U |
2020-09-24 16:04:18 |
| 31.166.246.251 | attack | Unauthorized connection attempt from IP address 31.166.246.251 on Port 445(SMB) |
2020-09-24 16:00:15 |
| 52.142.41.110 | attack | Sep 24 17:50:14 localhost sshd[1202911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.142.41.110 user=root Sep 24 17:50:15 localhost sshd[1202911]: Failed password for root from 52.142.41.110 port 53246 ssh2 ... |
2020-09-24 16:29:16 |