城市(city): unknown
省份(region): unknown
国家(country): Netherlands (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.99.39.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.99.39.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 12:56:17 CST 2025
;; MSG SIZE rcvd: 103
1.39.99.89.in-addr.arpa domain name pointer 89-99-39-1.cable.dynamic.v4.ziggo.nl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
1.39.99.89.in-addr.arpa name = 89-99-39-1.cable.dynamic.v4.ziggo.nl.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 42.159.228.125 | attack | SSH Brute-Forcing (server2) |
2020-06-08 22:32:37 |
| 122.51.41.44 | attack | Jun 8 14:25:04 prod4 sshd\[7637\]: Failed password for root from 122.51.41.44 port 59320 ssh2 Jun 8 14:29:38 prod4 sshd\[9291\]: Failed password for root from 122.51.41.44 port 45668 ssh2 Jun 8 14:32:35 prod4 sshd\[10193\]: Failed password for root from 122.51.41.44 port 46110 ssh2 ... |
2020-06-08 22:17:54 |
| 95.180.69.205 | attackbots | Bruteforce detected by fail2ban |
2020-06-08 22:27:36 |
| 3.6.140.111 | attackbotsspam | 08-Jun-2020 14:07:22.506 client @0x7fa9c00fe760 3.6.140.111#9987 (pizzaseo.com): view external: query (cache) 'pizzaseo.com/RRSIG/IN' denied 08-Jun-2020 14:07:22.512 client @0x7fa9c00e1840 3.6.140.111#9987 (pizzaseo.com): view external: query (cache) 'pizzaseo.com/RRSIG/IN' denied 08-Jun-2020 14:07:22.512 client @0x7fa9c00effd0 3.6.140.111#9987 (pizzaseo.com): view external: query (cache) 'pizzaseo.com/RRSIG/IN' denied |
2020-06-08 22:35:30 |
| 49.88.112.113 | attack | Jun 8 03:45:14 php1 sshd\[8829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Jun 8 03:45:16 php1 sshd\[8829\]: Failed password for root from 49.88.112.113 port 23400 ssh2 Jun 8 03:46:17 php1 sshd\[8922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Jun 8 03:46:19 php1 sshd\[8922\]: Failed password for root from 49.88.112.113 port 63159 ssh2 Jun 8 03:47:17 php1 sshd\[8990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root |
2020-06-08 22:53:30 |
| 220.165.15.228 | attack | Jun 8 16:40:34 vmi345603 sshd[14748]: Failed password for root from 220.165.15.228 port 41356 ssh2 ... |
2020-06-08 22:51:41 |
| 196.37.111.217 | attackspambots | $f2bV_matches |
2020-06-08 22:21:05 |
| 140.143.245.30 | attackspambots | Jun 8 15:49:28 eventyay sshd[8134]: Failed password for root from 140.143.245.30 port 47012 ssh2 Jun 8 15:54:06 eventyay sshd[8287]: Failed password for root from 140.143.245.30 port 43710 ssh2 ... |
2020-06-08 22:19:25 |
| 187.23.135.185 | attackspam | 2020-06-08T09:44:36.5508621495-001 sshd[3841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.23.135.185 user=root 2020-06-08T09:44:38.2695411495-001 sshd[3841]: Failed password for root from 187.23.135.185 port 45462 ssh2 2020-06-08T09:50:16.1756761495-001 sshd[4031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.23.135.185 user=root 2020-06-08T09:50:17.9047141495-001 sshd[4031]: Failed password for root from 187.23.135.185 port 48198 ssh2 2020-06-08T09:55:56.0859841495-001 sshd[4283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.23.135.185 user=root 2020-06-08T09:55:57.8244891495-001 sshd[4283]: Failed password for root from 187.23.135.185 port 50930 ssh2 ... |
2020-06-08 22:34:02 |
| 222.186.30.167 | attackbots | Jun 8 16:12:45 abendstille sshd\[15499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167 user=root Jun 8 16:12:48 abendstille sshd\[15499\]: Failed password for root from 222.186.30.167 port 33470 ssh2 Jun 8 16:12:54 abendstille sshd\[15572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167 user=root Jun 8 16:12:57 abendstille sshd\[15572\]: Failed password for root from 222.186.30.167 port 61373 ssh2 Jun 8 16:12:59 abendstille sshd\[15572\]: Failed password for root from 222.186.30.167 port 61373 ssh2 ... |
2020-06-08 22:15:06 |
| 144.217.105.209 | attack | 2020-06-08T14:07:07.344658vps751288.ovh.net sshd\[747\]: Invalid user bad from 144.217.105.209 port 50400 2020-06-08T14:07:07.354373vps751288.ovh.net sshd\[747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip209.ip-144-217-105.net 2020-06-08T14:07:09.780672vps751288.ovh.net sshd\[747\]: Failed password for invalid user bad from 144.217.105.209 port 50400 ssh2 2020-06-08T14:07:10.747265vps751288.ovh.net sshd\[749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip209.ip-144-217-105.net user=root 2020-06-08T14:07:12.248698vps751288.ovh.net sshd\[749\]: Failed password for root from 144.217.105.209 port 56308 ssh2 |
2020-06-08 22:45:31 |
| 51.178.50.98 | attackbotsspam | Jun 8 17:14:05 lukav-desktop sshd\[5440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.50.98 user=root Jun 8 17:14:07 lukav-desktop sshd\[5440\]: Failed password for root from 51.178.50.98 port 45182 ssh2 Jun 8 17:16:35 lukav-desktop sshd\[5483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.50.98 user=root Jun 8 17:16:37 lukav-desktop sshd\[5483\]: Failed password for root from 51.178.50.98 port 56464 ssh2 Jun 8 17:18:59 lukav-desktop sshd\[5539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.50.98 user=root |
2020-06-08 22:55:03 |
| 47.252.6.231 | attackspam | 47.252.6.231 - - [08/Jun/2020:15:26:32 +0200] "GET /wp-login.php HTTP/1.1" 200 5861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 47.252.6.231 - - [08/Jun/2020:15:26:35 +0200] "POST /wp-login.php HTTP/1.1" 200 6112 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 47.252.6.231 - - [08/Jun/2020:15:26:36 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-08 22:38:47 |
| 106.13.93.252 | attackspambots | Jun 8 15:00:26 lukav-desktop sshd\[5228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.252 user=root Jun 8 15:00:27 lukav-desktop sshd\[5228\]: Failed password for root from 106.13.93.252 port 43061 ssh2 Jun 8 15:03:46 lukav-desktop sshd\[5250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.252 user=root Jun 8 15:03:48 lukav-desktop sshd\[5250\]: Failed password for root from 106.13.93.252 port 39541 ssh2 Jun 8 15:07:33 lukav-desktop sshd\[10548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.252 user=root |
2020-06-08 22:26:33 |
| 200.73.238.250 | attack | Jun 8 05:49:36 mockhub sshd[609]: Failed password for root from 200.73.238.250 port 45814 ssh2 ... |
2020-06-08 22:19:55 |