城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.158.21.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.158.21.61. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:25:55 CST 2025
;; MSG SIZE rcvd: 105
61.21.158.99.in-addr.arpa domain name pointer adsl-99-158-21-61.dsl.irvnca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
61.21.158.99.in-addr.arpa name = adsl-99-158-21-61.dsl.irvnca.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 138.99.216.221 | attackspambots | firewall-block, port(s): 19121/tcp, 19125/tcp, 19126/tcp |
2019-12-09 00:04:38 |
| 45.55.224.209 | attack | Dec 8 18:02:26 server sshd\[1369\]: Invalid user my from 45.55.224.209 Dec 8 18:02:26 server sshd\[1369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209 Dec 8 18:02:29 server sshd\[1369\]: Failed password for invalid user my from 45.55.224.209 port 49368 ssh2 Dec 8 18:07:34 server sshd\[2808\]: Invalid user guest from 45.55.224.209 Dec 8 18:07:34 server sshd\[2808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209 ... |
2019-12-09 00:11:01 |
| 119.29.15.120 | attackbots | Oct 19 07:16:47 vtv3 sshd[951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.15.120 user=root Oct 19 07:16:49 vtv3 sshd[951]: Failed password for root from 119.29.15.120 port 47472 ssh2 Oct 19 07:22:41 vtv3 sshd[3706]: Invalid user webdown from 119.29.15.120 port 38221 Oct 19 07:22:41 vtv3 sshd[3706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.15.120 Oct 19 07:22:43 vtv3 sshd[3706]: Failed password for invalid user webdown from 119.29.15.120 port 38221 ssh2 Oct 19 07:33:51 vtv3 sshd[9085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.15.120 user=root Oct 19 07:33:53 vtv3 sshd[9085]: Failed password for root from 119.29.15.120 port 47928 ssh2 Oct 19 07:39:09 vtv3 sshd[11656]: Invalid user a from 119.29.15.120 port 38662 Oct 19 07:39:09 vtv3 sshd[11656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.15.120 Oct 1 |
2019-12-08 23:48:40 |
| 37.187.113.229 | attackbotsspam | Dec 8 16:07:48 lnxded63 sshd[22972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.113.229 Dec 8 16:07:48 lnxded63 sshd[22972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.113.229 |
2019-12-08 23:33:26 |
| 183.82.100.141 | attackbotsspam | SSH Brute Force, server-1 sshd[1590]: Failed password for invalid user wilsons from 183.82.100.141 port 39137 ssh2 |
2019-12-08 23:37:00 |
| 185.36.81.78 | attackspam | Dec 8 15:51:11 server1 postfix/smtpd\[23583\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Dec 8 16:03:03 server1 postfix/smtpd\[23907\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Dec 8 16:38:22 server1 postfix/smtpd\[25804\]: warning: unknown\[185.36.81.78\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-12-08 23:52:06 |
| 129.211.63.79 | attackbotsspam | Dec 8 07:57:15 home sshd[1771]: Invalid user skyfarm from 129.211.63.79 port 47768 Dec 8 07:57:15 home sshd[1771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.63.79 Dec 8 07:57:15 home sshd[1771]: Invalid user skyfarm from 129.211.63.79 port 47768 Dec 8 07:57:17 home sshd[1771]: Failed password for invalid user skyfarm from 129.211.63.79 port 47768 ssh2 Dec 8 08:07:05 home sshd[1934]: Invalid user shop from 129.211.63.79 port 47732 Dec 8 08:07:05 home sshd[1934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.63.79 Dec 8 08:07:05 home sshd[1934]: Invalid user shop from 129.211.63.79 port 47732 Dec 8 08:07:08 home sshd[1934]: Failed password for invalid user shop from 129.211.63.79 port 47732 ssh2 Dec 8 08:14:47 home sshd[2020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.63.79 user=root Dec 8 08:14:49 home sshd[2020]: Failed password for root from |
2019-12-09 00:16:17 |
| 62.234.97.139 | attack | Dec 8 07:53:52 home sshd[1722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.97.139 user=root Dec 8 07:53:54 home sshd[1722]: Failed password for root from 62.234.97.139 port 49794 ssh2 Dec 8 08:04:47 home sshd[1920]: Invalid user student05 from 62.234.97.139 port 54382 Dec 8 08:04:47 home sshd[1920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.97.139 Dec 8 08:04:47 home sshd[1920]: Invalid user student05 from 62.234.97.139 port 54382 Dec 8 08:04:49 home sshd[1920]: Failed password for invalid user student05 from 62.234.97.139 port 54382 ssh2 Dec 8 08:12:23 home sshd[2002]: Invalid user computerbranche from 62.234.97.139 port 52245 Dec 8 08:12:23 home sshd[2002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.97.139 Dec 8 08:12:23 home sshd[2002]: Invalid user computerbranche from 62.234.97.139 port 52245 Dec 8 08:12:25 home sshd[2002]: Failed password |
2019-12-08 23:43:52 |
| 112.85.42.189 | attackbots | 08.12.2019 16:04:50 SSH access blocked by firewall |
2019-12-09 00:07:37 |
| 207.154.206.212 | attack | Dec 8 07:29:11 mockhub sshd[7635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.206.212 Dec 8 07:29:13 mockhub sshd[7635]: Failed password for invalid user erenity from 207.154.206.212 port 43574 ssh2 ... |
2019-12-08 23:46:06 |
| 139.199.183.185 | attackspambots | Dec 8 16:59:39 MK-Soft-VM5 sshd[5358]: Failed password for root from 139.199.183.185 port 48744 ssh2 ... |
2019-12-09 00:15:45 |
| 182.61.49.179 | attack | Dec 8 21:48:04 itv-usvr-01 sshd[29196]: Invalid user guest from 182.61.49.179 Dec 8 21:48:04 itv-usvr-01 sshd[29196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.179 Dec 8 21:48:04 itv-usvr-01 sshd[29196]: Invalid user guest from 182.61.49.179 Dec 8 21:48:06 itv-usvr-01 sshd[29196]: Failed password for invalid user guest from 182.61.49.179 port 39874 ssh2 Dec 8 21:56:09 itv-usvr-01 sshd[29502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.179 user=root Dec 8 21:56:11 itv-usvr-01 sshd[29502]: Failed password for root from 182.61.49.179 port 37436 ssh2 |
2019-12-08 23:52:36 |
| 159.203.17.176 | attackspambots | May 25 17:28:15 vtv3 sshd[13201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.17.176 May 25 17:40:49 vtv3 sshd[19594]: Invalid user sysop from 159.203.17.176 port 58629 May 25 17:40:49 vtv3 sshd[19594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.17.176 May 25 17:40:51 vtv3 sshd[19594]: Failed password for invalid user sysop from 159.203.17.176 port 58629 ssh2 May 25 17:44:01 vtv3 sshd[20876]: Invalid user hd from 159.203.17.176 port 44808 May 25 17:44:01 vtv3 sshd[20876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.17.176 May 25 17:56:32 vtv3 sshd[27183]: Invalid user shw from 159.203.17.176 port 45993 May 25 17:56:32 vtv3 sshd[27183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.17.176 May 25 17:56:34 vtv3 sshd[27183]: Failed password for invalid user shw from 159.203.17.176 port 45993 ssh2 May 25 17:59: |
2019-12-09 00:18:30 |
| 218.92.0.137 | attackspam | $f2bV_matches |
2019-12-08 23:58:14 |
| 187.44.106.11 | attackbotsspam | Dec 8 16:25:21 microserver sshd[37531]: Invalid user guest from 187.44.106.11 port 50212 Dec 8 16:25:21 microserver sshd[37531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.44.106.11 Dec 8 16:25:23 microserver sshd[37531]: Failed password for invalid user guest from 187.44.106.11 port 50212 ssh2 Dec 8 16:32:34 microserver sshd[38451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.44.106.11 user=root Dec 8 16:32:36 microserver sshd[38451]: Failed password for root from 187.44.106.11 port 55906 ssh2 Dec 8 16:46:53 microserver sshd[40761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.44.106.11 user=root Dec 8 16:46:55 microserver sshd[40761]: Failed password for root from 187.44.106.11 port 39050 ssh2 Dec 8 16:54:12 microserver sshd[41691]: Invalid user raeni from 187.44.106.11 port 44736 Dec 8 16:54:12 microserver sshd[41691]: pam_unix(sshd:auth): authentication |
2019-12-09 00:09:39 |