城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.159.57.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25927
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.159.57.18. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 247 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 03:27:37 CST 2025
;; MSG SIZE rcvd: 105
18.57.159.99.in-addr.arpa domain name pointer 99-159-57-18.lightspeed.miamfl.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
18.57.159.99.in-addr.arpa name = 99-159-57-18.lightspeed.miamfl.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 220.179.68.246 | attackbotsspam | SSH brutforce |
2019-11-11 05:20:56 |
| 49.246.82.223 | attackbotsspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-11-11 05:44:06 |
| 119.90.43.106 | attackbots | Nov 10 08:55:39 kapalua sshd\[10696\]: Invalid user hung7777 from 119.90.43.106 Nov 10 08:55:39 kapalua sshd\[10696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.43.106 Nov 10 08:55:41 kapalua sshd\[10696\]: Failed password for invalid user hung7777 from 119.90.43.106 port 42939 ssh2 Nov 10 08:59:26 kapalua sshd\[11003\]: Invalid user ddaadd from 119.90.43.106 Nov 10 08:59:26 kapalua sshd\[11003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.43.106 |
2019-11-11 05:29:05 |
| 171.242.8.58 | attackbotsspam | invalid user |
2019-11-11 05:43:08 |
| 106.12.185.58 | attack | Nov 10 21:04:43 gw1 sshd[21421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.185.58 Nov 10 21:04:45 gw1 sshd[21421]: Failed password for invalid user test from 106.12.185.58 port 36378 ssh2 ... |
2019-11-11 05:16:00 |
| 193.161.132.97 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-11-11 05:45:39 |
| 149.202.198.86 | attackspambots | Nov 10 15:53:12 ny01 sshd[28686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.198.86 Nov 10 15:53:14 ny01 sshd[28686]: Failed password for invalid user minecraft from 149.202.198.86 port 55998 ssh2 Nov 10 15:56:01 ny01 sshd[29292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.198.86 |
2019-11-11 05:17:14 |
| 122.116.190.45 | attack | Honeypot attack, port: 81, PTR: 122-116-190-45.HINET-IP.hinet.net. |
2019-11-11 05:29:57 |
| 196.13.207.52 | attack | SSH Bruteforce |
2019-11-11 05:14:39 |
| 190.113.142.197 | attackspambots | 2019-11-10 17:25:36,083 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 190.113.142.197 2019-11-10 17:57:15,257 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 190.113.142.197 2019-11-10 18:34:26,124 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 190.113.142.197 2019-11-10 19:13:24,325 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 190.113.142.197 2019-11-10 19:52:12,993 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 190.113.142.197 ... |
2019-11-11 05:17:58 |
| 58.221.101.182 | attack | 2019-11-10T16:52:23.461954 sshd[20887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.101.182 user=root 2019-11-10T16:52:25.321284 sshd[20887]: Failed password for root from 58.221.101.182 port 38658 ssh2 2019-11-10T16:58:18.911443 sshd[20957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.101.182 user=root 2019-11-10T16:58:21.172260 sshd[20957]: Failed password for root from 58.221.101.182 port 46608 ssh2 2019-11-10T17:04:08.651816 sshd[21058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.101.182 user=root 2019-11-10T17:04:10.626811 sshd[21058]: Failed password for root from 58.221.101.182 port 54560 ssh2 ... |
2019-11-11 05:30:55 |
| 103.84.62.204 | attack | 2019-11-10T17:43:05.316433abusebot-8.cloudsearch.cf sshd\[20672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.62.204 user=root |
2019-11-11 05:43:34 |
| 104.206.128.66 | attack | " " |
2019-11-11 05:36:04 |
| 209.235.23.125 | attack | Nov 10 18:29:26 sd-53420 sshd\[20392\]: User root from 209.235.23.125 not allowed because none of user's groups are listed in AllowGroups Nov 10 18:29:26 sd-53420 sshd\[20392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.23.125 user=root Nov 10 18:29:28 sd-53420 sshd\[20392\]: Failed password for invalid user root from 209.235.23.125 port 37300 ssh2 Nov 10 18:32:46 sd-53420 sshd\[21303\]: Invalid user client from 209.235.23.125 Nov 10 18:32:46 sd-53420 sshd\[21303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.23.125 ... |
2019-11-11 05:11:02 |
| 108.30.75.26 | attackspambots | Unauthorised access (Nov 10) SRC=108.30.75.26 LEN=40 TTL=242 ID=1142 TCP DPT=445 WINDOW=1024 SYN |
2019-11-11 05:21:15 |