城市(city): Santa Clara
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.73.94.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.73.94.142. IN A
;; AUTHORITY SECTION:
. 407 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020050101 1800 900 604800 86400
;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 18:00:27 CST 2020
;; MSG SIZE rcvd: 116
142.94.73.99.in-addr.arpa domain name pointer 99-73-94-142.lightspeed.sntcca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.94.73.99.in-addr.arpa name = 99-73-94-142.lightspeed.sntcca.sbcglobal.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 185.220.102.8 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.8 user=root Failed password for root from 185.220.102.8 port 36417 ssh2 Failed password for root from 185.220.102.8 port 36417 ssh2 Failed password for root from 185.220.102.8 port 36417 ssh2 Failed password for root from 185.220.102.8 port 36417 ssh2 |
2019-06-22 19:39:22 |
| 36.68.4.236 | attackbotsspam | Jun 22 13:40:08 nginx sshd[24923]: Invalid user user1 from 36.68.4.236 Jun 22 13:40:08 nginx sshd[24923]: Received disconnect from 36.68.4.236 port 25837:11: Bye Bye [preauth] |
2019-06-22 19:40:19 |
| 46.218.176.51 | attack | Jun 22 12:29:58 mail sshd\[4580\]: Invalid user lue from 46.218.176.51 port 16520 Jun 22 12:29:58 mail sshd\[4580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.176.51 Jun 22 12:30:00 mail sshd\[4580\]: Failed password for invalid user lue from 46.218.176.51 port 16520 ssh2 Jun 22 12:31:36 mail sshd\[4861\]: Invalid user dev from 46.218.176.51 port 47511 Jun 22 12:31:36 mail sshd\[4861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.176.51 |
2019-06-22 19:42:09 |
| 112.85.42.174 | attackspambots | Jun 22 10:07:00 ip-172-31-1-72 sshd\[17667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root Jun 22 10:07:02 ip-172-31-1-72 sshd\[17667\]: Failed password for root from 112.85.42.174 port 41619 ssh2 Jun 22 10:07:20 ip-172-31-1-72 sshd\[17669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root Jun 22 10:07:22 ip-172-31-1-72 sshd\[17669\]: Failed password for root from 112.85.42.174 port 47759 ssh2 Jun 22 10:07:40 ip-172-31-1-72 sshd\[17671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root |
2019-06-22 19:33:04 |
| 159.65.99.227 | attack | WP Authentication failure |
2019-06-22 19:36:22 |
| 157.230.163.6 | attackbotsspam | $f2bV_matches |
2019-06-22 19:02:53 |
| 14.215.46.94 | attackspambots | Jun 22 08:54:50 MK-Soft-Root1 sshd\[32667\]: Invalid user minecraft from 14.215.46.94 port 33004 Jun 22 08:54:51 MK-Soft-Root1 sshd\[32667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.46.94 Jun 22 08:54:53 MK-Soft-Root1 sshd\[32667\]: Failed password for invalid user minecraft from 14.215.46.94 port 33004 ssh2 ... |
2019-06-22 19:10:53 |
| 143.215.172.79 | attackbots | Port scan on 1 port(s): 53 |
2019-06-22 19:00:12 |
| 185.203.18.254 | attack | Jun 19 18:05:29 xxxxxxx0 sshd[16173]: Invalid user system from 185.203.18.254 port 57828 Jun 19 18:05:29 xxxxxxx0 sshd[16173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.203.18.254 Jun 19 18:05:31 xxxxxxx0 sshd[16173]: Failed password for invalid user system from 185.203.18.254 port 57828 ssh2 Jun 19 18:07:45 xxxxxxx0 sshd[16545]: Invalid user store from 185.203.18.254 port 51422 Jun 19 18:07:45 xxxxxxx0 sshd[16545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.203.18.254 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=185.203.18.254 |
2019-06-22 19:02:27 |
| 92.118.37.84 | attackbotsspam | Jun 22 13:16:02 h2177944 kernel: \[2546147.055823\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=6291 PROTO=TCP SPT=41610 DPT=20426 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 22 13:18:47 h2177944 kernel: \[2546311.576971\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=7855 PROTO=TCP SPT=41610 DPT=6246 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 22 13:21:14 h2177944 kernel: \[2546459.010624\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=62977 PROTO=TCP SPT=41610 DPT=59414 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 22 13:30:13 h2177944 kernel: \[2546998.292254\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=10253 PROTO=TCP SPT=41610 DPT=5704 WINDOW=1024 RES=0x00 SYN URGP=0 Jun 22 13:30:47 h2177944 kernel: \[2547031.546221\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.84 DST=85.214.117.9 LEN= |
2019-06-22 19:44:28 |
| 112.85.42.189 | attack | Jun 22 07:17:52 mail sshd\[27793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189 user=root Jun 22 07:17:54 mail sshd\[27793\]: Failed password for root from 112.85.42.189 port 49991 ssh2 Jun 22 07:17:56 mail sshd\[27793\]: Failed password for root from 112.85.42.189 port 49991 ssh2 Jun 22 07:17:58 mail sshd\[27793\]: Failed password for root from 112.85.42.189 port 49991 ssh2 Jun 22 07:18:44 mail sshd\[27903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189 user=root |
2019-06-22 19:49:39 |
| 80.67.172.162 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.67.172.162 user=root Failed password for root from 80.67.172.162 port 33178 ssh2 Failed password for root from 80.67.172.162 port 33178 ssh2 Failed password for root from 80.67.172.162 port 33178 ssh2 Failed password for root from 80.67.172.162 port 33178 ssh2 |
2019-06-22 18:57:33 |
| 95.70.111.106 | attackbots | port scan and connect, tcp 25 (smtp) |
2019-06-22 18:56:26 |
| 185.173.35.37 | attackspam | firewall-block, port(s): 873/tcp |
2019-06-22 19:47:02 |
| 87.118.77.126 | attackspam | joshuajohannes.de 87.118.77.126 \[22/Jun/2019:06:21:26 +0200\] "POST /wp-login.php HTTP/1.1" 200 5606 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" joshuajohannes.de 87.118.77.126 \[22/Jun/2019:06:21:26 +0200\] "POST /wp-login.php HTTP/1.1" 200 5613 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-06-22 19:45:03 |