城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.129.142.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10390
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.129.142.170.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 21:30:56 CST 2025
;; MSG SIZE  rcvd: 107
        170.142.129.99.in-addr.arpa domain name pointer 99-129-142-170.lightspeed.austtx.sbcglobal.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
170.142.129.99.in-addr.arpa	name = 99-129-142-170.lightspeed.austtx.sbcglobal.net.
Authoritative answers can be found from:
        | IP | 类型 | 评论内容 | 时间 | 
|---|---|---|---|
| 111.231.239.143 | attack | Mar 28 04:48:50 localhost sshd\[25169\]: Invalid user sps from 111.231.239.143 Mar 28 04:48:50 localhost sshd\[25169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.239.143 Mar 28 04:48:52 localhost sshd\[25169\]: Failed password for invalid user sps from 111.231.239.143 port 38684 ssh2 Mar 28 04:52:25 localhost sshd\[25461\]: Invalid user szx from 111.231.239.143 Mar 28 04:52:25 localhost sshd\[25461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.239.143 ...  | 
                    2020-03-28 14:28:28 | 
| 106.13.93.199 | attackbots | $f2bV_matches  | 
                    2020-03-28 14:02:41 | 
| 181.126.83.125 | attackbotsspam | Invalid user pedro from 181.126.83.125 port 59018  | 
                    2020-03-28 14:04:14 | 
| 89.163.209.26 | attack | Invalid user kaile from 89.163.209.26 port 50350  | 
                    2020-03-28 14:36:57 | 
| 78.39.121.115 | attack | SASL broute force  | 
                    2020-03-28 14:00:53 | 
| 178.221.150.139 | attackspam | Mar 28 05:48:06 raspberrypi sshd\[4154\]: Invalid user sbx from 178.221.150.139Mar 28 05:48:08 raspberrypi sshd\[4154\]: Failed password for invalid user sbx from 178.221.150.139 port 41742 ssh2Mar 28 05:49:52 raspberrypi sshd\[4300\]: Invalid user miriama from 178.221.150.139 ...  | 
                    2020-03-28 13:50:23 | 
| 165.22.63.73 | attackbots | Mar 28 06:44:26 vps sshd[950659]: Failed password for invalid user remote from 165.22.63.73 port 55822 ssh2 Mar 28 06:47:59 vps sshd[972951]: Invalid user dolphin from 165.22.63.73 port 33808 Mar 28 06:47:59 vps sshd[972951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.73 Mar 28 06:48:01 vps sshd[972951]: Failed password for invalid user dolphin from 165.22.63.73 port 33808 ssh2 Mar 28 06:51:42 vps sshd[996125]: Invalid user inu from 165.22.63.73 port 40028 ...  | 
                    2020-03-28 13:59:02 | 
| 180.76.119.182 | attackspam | $f2bV_matches  | 
                    2020-03-28 14:07:05 | 
| 130.61.122.5 | attack | fail2ban  | 
                    2020-03-28 13:48:21 | 
| 89.248.162.161 | attack | 03/28/2020-02:08:04.151334 89.248.162.161 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-03-28 14:13:51 | 
| 222.252.104.75 | attack | Unauthorized connection attempt from IP address 222.252.104.75 on Port 445(SMB)  | 
                    2020-03-28 13:54:52 | 
| 106.54.224.59 | attack | Invalid user fgm from 106.54.224.59 port 39896  | 
                    2020-03-28 14:30:38 | 
| 157.230.163.6 | attackbots | Invalid user admin from 157.230.163.6 port 47210  | 
                    2020-03-28 14:10:37 | 
| 95.85.26.23 | attack | $f2bV_matches  | 
                    2020-03-28 14:26:10 | 
| 118.137.5.59 | attackspambots | 1585367550 - 03/28/2020 04:52:30 Host: 118.137.5.59/118.137.5.59 Port: 445 TCP Blocked  | 
                    2020-03-28 14:23:47 |