城市(city): Arlington
省份(region): Texas
国家(country): United States
运营商(isp): AT&T
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.49.243.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48704
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.49.243.139. IN A
;; AUTHORITY SECTION:
. 189 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019122901 1800 900 604800 86400
;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 30 05:00:13 CST 2019
;; MSG SIZE rcvd: 117
139.243.49.99.in-addr.arpa domain name pointer 99-49-243-139.lightspeed.ftwotx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.243.49.99.in-addr.arpa name = 99-49-243-139.lightspeed.ftwotx.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 74.208.46.73 | attackbotsspam | SSH login attempts. |
2020-08-20 05:33:39 |
| 182.61.4.60 | attackspam | Aug 20 02:18:43 dhoomketu sshd[2495260]: Invalid user vvv from 182.61.4.60 port 33746 Aug 20 02:18:43 dhoomketu sshd[2495260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.4.60 Aug 20 02:18:43 dhoomketu sshd[2495260]: Invalid user vvv from 182.61.4.60 port 33746 Aug 20 02:18:45 dhoomketu sshd[2495260]: Failed password for invalid user vvv from 182.61.4.60 port 33746 ssh2 Aug 20 02:23:06 dhoomketu sshd[2495375]: Invalid user bo from 182.61.4.60 port 42246 ... |
2020-08-20 05:16:32 |
| 59.49.13.45 | attack | Aug 19 23:20:02 cosmoit sshd[32331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.49.13.45 |
2020-08-20 05:26:48 |
| 222.186.15.62 | attackspam | 2020-08-19T21:15:18.260709vps1033 sshd[3626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root 2020-08-19T21:15:20.539139vps1033 sshd[3626]: Failed password for root from 222.186.15.62 port 11385 ssh2 2020-08-19T21:15:18.260709vps1033 sshd[3626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62 user=root 2020-08-19T21:15:20.539139vps1033 sshd[3626]: Failed password for root from 222.186.15.62 port 11385 ssh2 2020-08-19T21:15:22.975363vps1033 sshd[3626]: Failed password for root from 222.186.15.62 port 11385 ssh2 ... |
2020-08-20 05:16:00 |
| 87.166.193.105 | attackbotsspam | Aug 19 22:40:26 server dovecot: imap-login: Aborted login (auth failed, 1 attempts in 3 secs): user= |
2020-08-20 05:12:58 |
| 218.92.0.171 | attackspambots | 2020-08-19T22:58:21+0200 Failed SSH Authentication/Brute Force Attack. (Server 5) |
2020-08-20 05:11:11 |
| 222.186.180.223 | attackspambots | Aug 19 23:07:29 minden010 sshd[19616]: Failed password for root from 222.186.180.223 port 49452 ssh2 Aug 19 23:07:42 minden010 sshd[19616]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 49452 ssh2 [preauth] Aug 19 23:07:48 minden010 sshd[19710]: Failed password for root from 222.186.180.223 port 53516 ssh2 ... |
2020-08-20 05:13:47 |
| 111.74.11.85 | attackbotsspam | Aug 19 21:04:50 game-panel sshd[21268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.74.11.85 Aug 19 21:04:51 game-panel sshd[21268]: Failed password for invalid user abc123 from 111.74.11.85 port 55992 ssh2 Aug 19 21:08:49 game-panel sshd[21487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.74.11.85 |
2020-08-20 05:14:38 |
| 115.195.102.78 | attackspam | Portscan detected |
2020-08-20 05:20:05 |
| 106.54.141.196 | attack | Invalid user gateway from 106.54.141.196 port 58024 |
2020-08-20 05:26:20 |
| 172.104.108.109 | attackspambots | \[2020-08-18 06:42:58\] \[28845\] \[http_80_tcp 12088\] \[172.104.108.109:36896\] recv: GET / HTTP/1.1 \[2020-08-19 22:52:37\] \[28845\] \[http_80_tcp 21967\] \[172.104.108.109:44078\] recv: GET / HTTP/1.1 |
2020-08-20 05:39:57 |
| 170.233.159.142 | attackbots | Aug 19 23:11:33 eventyay sshd[29026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.233.159.142 Aug 19 23:11:36 eventyay sshd[29026]: Failed password for invalid user cos from 170.233.159.142 port 56390 ssh2 Aug 19 23:16:08 eventyay sshd[29168]: Failed password for root from 170.233.159.142 port 60327 ssh2 ... |
2020-08-20 05:16:44 |
| 117.69.159.243 | attackbots | Aug 19 23:15:56 srv01 postfix/smtpd\[14201\]: warning: unknown\[117.69.159.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 19 23:19:23 srv01 postfix/smtpd\[21714\]: warning: unknown\[117.69.159.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 19 23:22:49 srv01 postfix/smtpd\[21599\]: warning: unknown\[117.69.159.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 19 23:26:15 srv01 postfix/smtpd\[21378\]: warning: unknown\[117.69.159.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 19 23:26:26 srv01 postfix/smtpd\[21378\]: warning: unknown\[117.69.159.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-08-20 05:38:06 |
| 188.166.225.37 | attack | Aug 19 22:05:45 rocket sshd[29400]: Failed password for root from 188.166.225.37 port 35764 ssh2 Aug 19 22:10:10 rocket sshd[30261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.225.37 ... |
2020-08-20 05:17:38 |
| 106.12.70.99 | attack | Aug 19 17:24:57 NPSTNNYC01T sshd[2717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.70.99 Aug 19 17:24:59 NPSTNNYC01T sshd[2717]: Failed password for invalid user admin from 106.12.70.99 port 54888 ssh2 Aug 19 17:29:33 NPSTNNYC01T sshd[3231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.70.99 ... |
2020-08-20 05:34:23 |