城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.42.6.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57196
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;98.42.6.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 06:02:09 CST 2025
;; MSG SIZE rcvd: 104
164.6.42.98.in-addr.arpa domain name pointer c-98-42-6-164.hsd1.ca.comcast.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
164.6.42.98.in-addr.arpa name = c-98-42-6-164.hsd1.ca.comcast.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 66.249.79.1 | attack | Automatic report - Web App Attack |
2019-10-14 00:56:16 |
| 54.36.150.119 | attackspambots | Automatic report - Banned IP Access |
2019-10-14 01:09:18 |
| 62.173.149.65 | attackspambots | " " |
2019-10-14 01:16:46 |
| 81.177.98.52 | attack | 2019-10-13T17:02:17.496346shield sshd\[4452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.177.98.52 user=root 2019-10-13T17:02:19.089895shield sshd\[4452\]: Failed password for root from 81.177.98.52 port 44466 ssh2 2019-10-13T17:06:39.271364shield sshd\[5251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.177.98.52 user=root 2019-10-13T17:06:41.166075shield sshd\[5251\]: Failed password for root from 81.177.98.52 port 56220 ssh2 2019-10-13T17:10:59.454084shield sshd\[7525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.177.98.52 user=root |
2019-10-14 01:16:07 |
| 189.112.109.185 | attack | 2019-10-13T17:12:54.311828abusebot-8.cloudsearch.cf sshd\[17076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.109.185 user=root |
2019-10-14 01:15:18 |
| 220.164.2.76 | attack | Brute force attempt |
2019-10-14 01:35:29 |
| 103.121.242.210 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-14 01:36:52 |
| 103.58.148.3 | attackspam | WordPress wp-login brute force :: 103.58.148.3 0.048 BYPASS [13/Oct/2019:22:47:59 1100] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-10-14 01:44:30 |
| 51.75.205.122 | attackbots | Oct 13 14:32:14 eventyay sshd[2551]: Failed password for root from 51.75.205.122 port 56624 ssh2 Oct 13 14:36:05 eventyay sshd[2743]: Failed password for root from 51.75.205.122 port 38682 ssh2 ... |
2019-10-14 01:29:22 |
| 138.197.162.32 | attack | Oct 13 12:06:27 firewall sshd[15839]: Invalid user Amigo_123 from 138.197.162.32 Oct 13 12:06:28 firewall sshd[15839]: Failed password for invalid user Amigo_123 from 138.197.162.32 port 42444 ssh2 Oct 13 12:10:29 firewall sshd[16015]: Invalid user Russia@1 from 138.197.162.32 ... |
2019-10-14 01:08:24 |
| 129.204.74.15 | attack | SSH Bruteforce attempt |
2019-10-14 00:55:12 |
| 212.64.38.76 | attack | Web App Attack |
2019-10-14 01:43:49 |
| 218.21.96.237 | attackbotsspam | Unauthorised access (Oct 13) SRC=218.21.96.237 LEN=52 TOS=0x10 PREC=0x40 TTL=113 ID=18148 DF TCP DPT=445 WINDOW=8192 SYN |
2019-10-14 01:05:07 |
| 89.252.164.2 | attackspam | Automatic report - XMLRPC Attack |
2019-10-14 01:24:12 |
| 144.217.214.13 | attackbots | 2019-10-13T17:01:52.316438abusebot-8.cloudsearch.cf sshd\[17009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip13.ip-144-217-214.net user=root |
2019-10-14 01:15:43 |