城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 76.150.148.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;76.150.148.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:51:38 CST 2025
;; MSG SIZE rcvd: 106
21.148.150.76.in-addr.arpa domain name pointer c-76-150-148-21.hsd1.in.comcast.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.148.150.76.in-addr.arpa name = c-76-150-148-21.hsd1.in.comcast.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 183.83.87.61 | attack | Unauthorized connection attempt from IP address 183.83.87.61 on Port 445(SMB) |
2020-06-28 03:00:04 |
| 140.249.30.203 | attackspambots | Failed password for invalid user wjy from 140.249.30.203 port 51390 ssh2 |
2020-06-28 03:33:14 |
| 36.35.75.180 | attackbots | 1593281234 - 06/28/2020 01:07:14 Host: 36.35.75.180/36.35.75.180 Port: 23 TCP Blocked ... |
2020-06-28 03:22:17 |
| 49.234.126.177 | attackbots | Invalid user rapid from 49.234.126.177 port 51300 |
2020-06-28 03:01:03 |
| 85.192.161.101 | attackspambots | Unauthorized connection attempt from IP address 85.192.161.101 on Port 445(SMB) |
2020-06-28 03:24:32 |
| 98.5.240.187 | attackbotsspam | Jun 27 14:54:06 host sshd[17995]: Invalid user backup from 98.5.240.187 port 40368 ... |
2020-06-28 03:29:38 |
| 210.213.136.163 | attackbotsspam | Unauthorized connection attempt from IP address 210.213.136.163 on Port 445(SMB) |
2020-06-28 03:19:25 |
| 222.186.180.41 | attack | 2020-06-27T22:29:38.931060afi-git.jinr.ru sshd[29283]: Failed password for root from 222.186.180.41 port 55092 ssh2 2020-06-27T22:29:42.346412afi-git.jinr.ru sshd[29283]: Failed password for root from 222.186.180.41 port 55092 ssh2 2020-06-27T22:29:45.163917afi-git.jinr.ru sshd[29283]: Failed password for root from 222.186.180.41 port 55092 ssh2 2020-06-27T22:29:45.164091afi-git.jinr.ru sshd[29283]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 55092 ssh2 [preauth] 2020-06-27T22:29:45.164108afi-git.jinr.ru sshd[29283]: Disconnecting: Too many authentication failures [preauth] ... |
2020-06-28 03:36:20 |
| 47.52.64.165 | attack | " " |
2020-06-28 03:13:58 |
| 118.97.188.91 | attack | Unauthorized connection attempt from IP address 118.97.188.91 on Port 445(SMB) |
2020-06-28 03:15:54 |
| 179.70.122.149 | attackbotsspam | Jun 25 13:22:23 h2570396 sshd[25948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179-70-122-149.user3p.veloxzone.com.br Jun 25 13:22:25 h2570396 sshd[25948]: Failed password for invalid user nikolay from 179.70.122.149 port 39066 ssh2 Jun 25 13:22:26 h2570396 sshd[25948]: Received disconnect from 179.70.122.149: 11: Bye Bye [preauth] Jun 25 13:29:48 h2570396 sshd[26204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179-70-122-149.user3p.veloxzone.com.br Jun 25 13:29:50 h2570396 sshd[26204]: Failed password for invalid user ksenia from 179.70.122.149 port 34278 ssh2 Jun 25 13:29:51 h2570396 sshd[26204]: Received disconnect from 179.70.122.149: 11: Bye Bye [preauth] Jun 25 13:34:46 h2570396 sshd[26356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179-70-122-149.user3p.veloxzone.com.br Jun 25 13:34:49 h2570396 sshd[26356]: Failed password for ........ ------------------------------- |
2020-06-28 03:36:41 |
| 125.94.150.164 | attackspambots | Port probing on unauthorized port 1433 |
2020-06-28 03:28:37 |
| 156.96.47.131 | attackspam | Port Scan detected! ... |
2020-06-28 03:18:14 |
| 37.49.229.182 | attackbotsspam | [2020-06-27 14:46:08] NOTICE[1273][C-00005264] chan_sip.c: Call from '' (37.49.229.182:35106) to extension '000441519460088' rejected because extension not found in context 'public'. [2020-06-27 14:46:08] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-27T14:46:08.812-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="000441519460088",SessionID="0x7f31c05e9da8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.229.182/5060",ACLName="no_extension_match" [2020-06-27 14:50:42] NOTICE[1273][C-0000526a] chan_sip.c: Call from '' (37.49.229.182:28048) to extension '900441519460088' rejected because extension not found in context 'public'. [2020-06-27 14:50:42] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-27T14:50:42.894-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900441519460088",SessionID="0x7f31c054cb28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/3 ... |
2020-06-28 03:07:32 |
| 5.101.152.139 | attackbots | Port probing on unauthorized port 48889 |
2020-06-28 03:06:14 |