城市(city): unknown
省份(region): unknown
国家(country): United States of America (the)
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.56.45.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.56.45.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:13:09 CST 2025
;; MSG SIZE rcvd: 105
242.45.56.99.in-addr.arpa domain name pointer 99-56-45-242.lightspeed.irvnca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.45.56.99.in-addr.arpa name = 99-56-45-242.lightspeed.irvnca.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 88.255.240.186 | attackbots | Aug 16 22:56:56 ms-srv sshd[22619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.255.240.186 Aug 16 22:56:58 ms-srv sshd[22619]: Failed password for invalid user almacen from 88.255.240.186 port 29442 ssh2 |
2020-08-17 05:57:49 |
| 116.58.172.118 | attackspam | Aug 16 23:52:14 PorscheCustomer sshd[7038]: Failed password for root from 116.58.172.118 port 37171 ssh2 Aug 16 23:57:14 PorscheCustomer sshd[7339]: Failed password for root from 116.58.172.118 port 56446 ssh2 ... |
2020-08-17 06:06:13 |
| 66.223.164.237 | attack | SSH Brute-Force. Ports scanning. |
2020-08-17 06:20:19 |
| 79.137.77.131 | attack | Aug 16 14:39:14 dignus sshd[27577]: Failed password for invalid user moon from 79.137.77.131 port 49680 ssh2 Aug 16 14:42:57 dignus sshd[28192]: Invalid user qa from 79.137.77.131 port 58554 Aug 16 14:42:57 dignus sshd[28192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.77.131 Aug 16 14:43:00 dignus sshd[28192]: Failed password for invalid user qa from 79.137.77.131 port 58554 ssh2 Aug 16 14:46:49 dignus sshd[28780]: Invalid user kz from 79.137.77.131 port 39200 ... |
2020-08-17 06:12:40 |
| 106.55.243.41 | attackspam | Aug 16 18:50:56 ws24vmsma01 sshd[197176]: Failed password for root from 106.55.243.41 port 52104 ssh2 ... |
2020-08-17 06:13:17 |
| 23.129.64.203 | attackspambots | Automatic report - Banned IP Access |
2020-08-17 06:00:57 |
| 218.92.0.250 | attack | Aug 16 23:59:38 ip106 sshd[8977]: Failed password for root from 218.92.0.250 port 44019 ssh2 Aug 16 23:59:43 ip106 sshd[8977]: Failed password for root from 218.92.0.250 port 44019 ssh2 ... |
2020-08-17 06:01:26 |
| 112.85.42.229 | attack | Aug 16 22:08:24 plex-server sshd[2289678]: Failed password for root from 112.85.42.229 port 51914 ssh2 Aug 16 22:09:43 plex-server sshd[2290268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229 user=root Aug 16 22:09:46 plex-server sshd[2290268]: Failed password for root from 112.85.42.229 port 56831 ssh2 Aug 16 22:11:08 plex-server sshd[2290808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.229 user=root Aug 16 22:11:10 plex-server sshd[2290808]: Failed password for root from 112.85.42.229 port 17993 ssh2 ... |
2020-08-17 06:11:35 |
| 49.235.221.172 | attack | Aug 16 16:29:47 ny01 sshd[30166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.221.172 Aug 16 16:29:50 ny01 sshd[30166]: Failed password for invalid user harry from 49.235.221.172 port 35218 ssh2 Aug 16 16:33:06 ny01 sshd[30660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.221.172 |
2020-08-17 05:49:50 |
| 52.214.195.80 | attack | 52.214.195.80 - - [16/Aug/2020:23:43:38 +0200] "GET /wp-login.php HTTP/1.1" 200 8775 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 52.214.195.80 - - [16/Aug/2020:23:43:39 +0200] "POST /wp-login.php HTTP/1.1" 200 9026 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 52.214.195.80 - - [16/Aug/2020:23:43:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-17 05:45:26 |
| 139.155.26.79 | attackbotsspam | Aug 16 23:28:30 minden010 sshd[8591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.79 Aug 16 23:28:32 minden010 sshd[8591]: Failed password for invalid user krishna from 139.155.26.79 port 45808 ssh2 Aug 16 23:32:45 minden010 sshd[9993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.79 ... |
2020-08-17 06:13:38 |
| 134.175.19.71 | attack | Failed password for invalid user newadmin from 134.175.19.71 port 39132 ssh2 |
2020-08-17 06:17:09 |
| 54.38.188.105 | attack | Invalid user aaron from 54.38.188.105 port 48852 |
2020-08-17 06:15:06 |
| 186.179.100.111 | attack | Telnet Honeypot -> Telnet Bruteforce / Login |
2020-08-17 06:00:37 |
| 115.23.223.56 | attackbots | Probing for vulnerable services |
2020-08-17 05:55:35 |