城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.22.81.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.22.81.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:13:10 CST 2025
;; MSG SIZE rcvd: 104
39.81.22.99.in-addr.arpa domain name pointer 99-22-81-39.lightspeed.cicril.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
39.81.22.99.in-addr.arpa name = 99-22-81-39.lightspeed.cicril.sbcglobal.net.
Authoritative answers can be found from:
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
51.38.65.65 | attack | Dec 4 15:04:46 master sshd[9561]: Failed password for root from 51.38.65.65 port 43362 ssh2 Dec 4 15:15:19 master sshd[9582]: Failed password for invalid user zz from 51.38.65.65 port 34890 ssh2 Dec 4 15:23:10 master sshd[9593]: Failed password for invalid user mattew from 51.38.65.65 port 45786 ssh2 Dec 4 15:28:08 master sshd[9603]: Failed password for invalid user wwwadmin from 51.38.65.65 port 56678 ssh2 Dec 4 15:34:24 master sshd[9626]: Failed password for invalid user mysql from 51.38.65.65 port 39340 ssh2 |
2019-12-04 21:13:00 |
139.59.23.68 | attackbots | 2019-12-04T12:48:20.983447shield sshd\[22151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.68 user=root 2019-12-04T12:48:22.660344shield sshd\[22151\]: Failed password for root from 139.59.23.68 port 39090 ssh2 2019-12-04T12:55:39.516099shield sshd\[24194\]: Invalid user secci from 139.59.23.68 port 50810 2019-12-04T12:55:39.520479shield sshd\[24194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.68 2019-12-04T12:55:41.799209shield sshd\[24194\]: Failed password for invalid user secci from 139.59.23.68 port 50810 ssh2 |
2019-12-04 21:05:31 |
183.134.199.68 | attack | Dec 4 13:46:06 tux-35-217 sshd\[3205\]: Invalid user temp from 183.134.199.68 port 52359 Dec 4 13:46:06 tux-35-217 sshd\[3205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.199.68 Dec 4 13:46:08 tux-35-217 sshd\[3205\]: Failed password for invalid user temp from 183.134.199.68 port 52359 ssh2 Dec 4 13:54:03 tux-35-217 sshd\[3316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.199.68 user=root ... |
2019-12-04 20:59:50 |
159.203.197.10 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-04 21:20:58 |
45.237.140.120 | attackbotsspam | Dec 4 12:12:08 legacy sshd[18125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.237.140.120 Dec 4 12:12:11 legacy sshd[18125]: Failed password for invalid user kurjat from 45.237.140.120 port 60398 ssh2 Dec 4 12:19:36 legacy sshd[18486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.237.140.120 ... |
2019-12-04 21:02:02 |
106.13.123.134 | attack | 2019-12-04T12:59:44.300258hub.schaetter.us sshd\[29034\]: Invalid user vcsa from 106.13.123.134 port 52114 2019-12-04T12:59:44.317975hub.schaetter.us sshd\[29034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.123.134 2019-12-04T12:59:46.230697hub.schaetter.us sshd\[29034\]: Failed password for invalid user vcsa from 106.13.123.134 port 52114 ssh2 2019-12-04T13:07:37.551854hub.schaetter.us sshd\[29140\]: Invalid user eric from 106.13.123.134 port 51472 2019-12-04T13:07:37.570103hub.schaetter.us sshd\[29140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.123.134 ... |
2019-12-04 21:08:25 |
139.155.50.40 | attack | Dec 4 12:19:06 herz-der-gamer sshd[16666]: Invalid user loan from 139.155.50.40 port 55398 Dec 4 12:19:06 herz-der-gamer sshd[16666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.50.40 Dec 4 12:19:06 herz-der-gamer sshd[16666]: Invalid user loan from 139.155.50.40 port 55398 Dec 4 12:19:08 herz-der-gamer sshd[16666]: Failed password for invalid user loan from 139.155.50.40 port 55398 ssh2 ... |
2019-12-04 21:29:48 |
222.186.175.155 | attack | Dec 3 19:31:49 microserver sshd[33263]: Failed none for root from 222.186.175.155 port 19444 ssh2 Dec 3 19:31:49 microserver sshd[33263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155 user=root Dec 3 19:31:51 microserver sshd[33263]: Failed password for root from 222.186.175.155 port 19444 ssh2 Dec 3 19:31:55 microserver sshd[33263]: Failed password for root from 222.186.175.155 port 19444 ssh2 Dec 3 19:31:58 microserver sshd[33263]: Failed password for root from 222.186.175.155 port 19444 ssh2 Dec 3 20:41:50 microserver sshd[43976]: Failed none for root from 222.186.175.155 port 7934 ssh2 Dec 3 20:41:50 microserver sshd[43976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155 user=root Dec 3 20:41:52 microserver sshd[43976]: Failed password for root from 222.186.175.155 port 7934 ssh2 Dec 3 20:41:55 microserver sshd[43976]: Failed password for root from 222.186.175.155 port 7934 ssh2 De |
2019-12-04 21:16:46 |
222.186.175.150 | attackbotsspam | Dec 4 14:22:01 ks10 sshd[20507]: Failed password for root from 222.186.175.150 port 59344 ssh2 Dec 4 14:22:05 ks10 sshd[20507]: Failed password for root from 222.186.175.150 port 59344 ssh2 ... |
2019-12-04 21:23:42 |
49.254.45.86 | attackbots | Hits on port : 5555 |
2019-12-04 21:37:21 |
103.9.78.228 | attack | firewall-block, port(s): 1433/tcp |
2019-12-04 21:36:15 |
178.217.173.54 | attackbotsspam | Dec 4 13:16:42 zeus sshd[25513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.173.54 Dec 4 13:16:43 zeus sshd[25513]: Failed password for invalid user password12346 from 178.217.173.54 port 53752 ssh2 Dec 4 13:23:06 zeus sshd[25630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.217.173.54 Dec 4 13:23:08 zeus sshd[25630]: Failed password for invalid user nobody666 from 178.217.173.54 port 36572 ssh2 |
2019-12-04 21:25:11 |
192.99.28.247 | attackbotsspam | Dec 4 02:35:31 sachi sshd\[24166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.28.247 user=root Dec 4 02:35:34 sachi sshd\[24166\]: Failed password for root from 192.99.28.247 port 36978 ssh2 Dec 4 02:41:18 sachi sshd\[24783\]: Invalid user maxsym from 192.99.28.247 Dec 4 02:41:18 sachi sshd\[24783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.28.247 Dec 4 02:41:20 sachi sshd\[24783\]: Failed password for invalid user maxsym from 192.99.28.247 port 42322 ssh2 |
2019-12-04 20:58:11 |
159.203.197.12 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-04 21:15:03 |
180.76.136.81 | attackspambots | Dec 4 13:40:02 localhost sshd\[2036\]: Invalid user mozes from 180.76.136.81 port 57950 Dec 4 13:40:02 localhost sshd\[2036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.136.81 Dec 4 13:40:04 localhost sshd\[2036\]: Failed password for invalid user mozes from 180.76.136.81 port 57950 ssh2 |
2019-12-04 21:28:19 |