城市(city): Waterford
省份(region): Michigan
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.40.8.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4036
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.40.8.212. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 08:22:39 CST 2025
;; MSG SIZE rcvd: 104
212.8.40.99.in-addr.arpa domain name pointer 99-40-8-212.lightspeed.livnmi.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
212.8.40.99.in-addr.arpa name = 99-40-8-212.lightspeed.livnmi.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 177.52.24.20 | attackbots | ... |
2019-09-08 12:22:08 |
| 150.95.212.72 | attack | Sep 7 12:49:42 sachi sshd\[1297\]: Invalid user 103 from 150.95.212.72 Sep 7 12:49:42 sachi sshd\[1297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-212-72.873a.static.cnode.io Sep 7 12:49:44 sachi sshd\[1297\]: Failed password for invalid user 103 from 150.95.212.72 port 43970 ssh2 Sep 7 12:54:05 sachi sshd\[1694\]: Invalid user test1234 from 150.95.212.72 Sep 7 12:54:05 sachi sshd\[1694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-212-72.873a.static.cnode.io |
2019-09-08 12:07:55 |
| 159.203.199.163 | attack | port scan and connect, tcp 8080 (http-proxy) |
2019-09-08 12:14:36 |
| 222.76.187.88 | attack | Sep 8 07:19:17 localhost sshd[465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.76.187.88 user=root Sep 8 07:19:19 localhost sshd[465]: Failed password for root from 222.76.187.88 port 48419 ssh2 Sep 8 07:19:33 localhost sshd[465]: error: maximum authentication attempts exceeded for root from 222.76.187.88 port 48419 ssh2 [preauth] Sep 8 07:19:17 localhost sshd[465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.76.187.88 user=root Sep 8 07:19:19 localhost sshd[465]: Failed password for root from 222.76.187.88 port 48419 ssh2 Sep 8 07:19:33 localhost sshd[465]: error: maximum authentication attempts exceeded for root from 222.76.187.88 port 48419 ssh2 [preauth] ... |
2019-09-08 12:15:49 |
| 46.101.204.20 | attackspam | Sep 8 01:57:38 vps647732 sshd[11457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20 Sep 8 01:57:39 vps647732 sshd[11457]: Failed password for invalid user password123 from 46.101.204.20 port 50868 ssh2 ... |
2019-09-08 11:31:56 |
| 104.254.95.152 | attackspambots | (From connor.melrose@outlook.com) Hi, Thanks for the connect. I have found when a business owner, professional, coach or consultant is asked what they need more than anything in their business, you get the same two answers every time... more clients and more revenue. Our Online Business Building System is designed to make Your Business Stand Out From Your Competition... And Dominate Your Market Right From The Start. Gain access to our Complimentary four part video series on how to generate more leads than your business can handle. The four videos are packed with expert advice, designed to help you experience an immediate increase in your bottom-line revenue so we can prove to you that our system will produce real results for your business. See first hand exactly how we help hundreds of business owners worldwide to attract more clients and increase their revenue. Put Us To The Test…Click The Link Below: http://bit.ly/YourBusinessGrowth2019 Cheers, Michael Your Business Gro |
2019-09-08 11:52:10 |
| 182.61.166.179 | attackbotsspam | Sep 8 06:09:09 mail sshd\[10717\]: Failed password for invalid user 123456789 from 182.61.166.179 port 56266 ssh2 Sep 8 06:13:34 mail sshd\[11176\]: Invalid user test123 from 182.61.166.179 port 43064 Sep 8 06:13:34 mail sshd\[11176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.179 Sep 8 06:13:35 mail sshd\[11176\]: Failed password for invalid user test123 from 182.61.166.179 port 43064 ssh2 Sep 8 06:18:08 mail sshd\[11631\]: Invalid user 123456 from 182.61.166.179 port 58096 Sep 8 06:18:08 mail sshd\[11631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.166.179 |
2019-09-08 12:29:51 |
| 203.187.194.131 | attackspam | Sep 7 13:48:17 eddieflores sshd\[29692\]: Invalid user 1 from 203.187.194.131 Sep 7 13:48:17 eddieflores sshd\[29692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.187.194.131 Sep 7 13:48:18 eddieflores sshd\[29692\]: Failed password for invalid user 1 from 203.187.194.131 port 58433 ssh2 Sep 7 13:52:57 eddieflores sshd\[30066\]: Invalid user 1qaz2wsx from 203.187.194.131 Sep 7 13:52:57 eddieflores sshd\[30066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.187.194.131 |
2019-09-08 12:18:01 |
| 188.226.226.82 | attackbots | Sep 7 12:16:26 wbs sshd\[15264\]: Invalid user postgres from 188.226.226.82 Sep 7 12:16:26 wbs sshd\[15264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.226.82 Sep 7 12:16:28 wbs sshd\[15264\]: Failed password for invalid user postgres from 188.226.226.82 port 54177 ssh2 Sep 7 12:20:59 wbs sshd\[15676\]: Invalid user csadmin from 188.226.226.82 Sep 7 12:20:59 wbs sshd\[15676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.226.82 |
2019-09-08 12:01:45 |
| 167.71.191.53 | attack | Sep 7 13:45:09 hcbb sshd\[13735\]: Invalid user frappe from 167.71.191.53 Sep 7 13:45:09 hcbb sshd\[13735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.191.53 Sep 7 13:45:11 hcbb sshd\[13735\]: Failed password for invalid user frappe from 167.71.191.53 port 60772 ssh2 Sep 7 13:49:00 hcbb sshd\[14023\]: Invalid user test from 167.71.191.53 Sep 7 13:49:00 hcbb sshd\[14023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.191.53 |
2019-09-08 12:18:52 |
| 103.219.249.2 | attackspam | 2019-09-08T02:18:43.589281abusebot-5.cloudsearch.cf sshd\[15253\]: Invalid user postgres from 103.219.249.2 port 16797 |
2019-09-08 11:40:49 |
| 71.6.165.200 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-09-08 11:21:34 |
| 109.168.97.36 | attackspam | xmlrpc attack |
2019-09-08 12:16:29 |
| 127.0.0.1 | attack | Test Connectivity |
2019-09-08 12:12:12 |
| 191.53.52.245 | attack | Sep 7 16:45:49 mailman postfix/smtpd[4633]: warning: unknown[191.53.52.245]: SASL PLAIN authentication failed: authentication failure |
2019-09-08 11:45:05 |