城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.21.169.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15557
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.21.169.68. IN A
;; AUTHORITY SECTION:
. 483 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031901 1800 900 604800 86400
;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 20 12:50:59 CST 2022
;; MSG SIZE rcvd: 106
68.169.21.107.in-addr.arpa domain name pointer ec2-107-21-169-68.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.169.21.107.in-addr.arpa name = ec2-107-21-169-68.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 199.229.249.188 | attack | 1 attempts against mh-modsecurity-ban on mist |
2020-08-09 06:10:49 |
| 118.126.88.254 | attackbots | Aug 8 20:27:12 IngegnereFirenze sshd[15651]: User root from 118.126.88.254 not allowed because not listed in AllowUsers ... |
2020-08-09 05:57:51 |
| 118.244.195.141 | attackbotsspam | Aug 9 00:10:05 vps639187 sshd\[15800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.195.141 user=root Aug 9 00:10:06 vps639187 sshd\[15800\]: Failed password for root from 118.244.195.141 port 11802 ssh2 Aug 9 00:14:09 vps639187 sshd\[15895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.195.141 user=root ... |
2020-08-09 06:30:48 |
| 219.150.85.232 | attackbots | Aug 8 22:01:36 plex-server sshd[1631011]: Invalid user 1q2w3e.1234 from 219.150.85.232 port 34492 Aug 8 22:01:36 plex-server sshd[1631011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.150.85.232 Aug 8 22:01:36 plex-server sshd[1631011]: Invalid user 1q2w3e.1234 from 219.150.85.232 port 34492 Aug 8 22:01:39 plex-server sshd[1631011]: Failed password for invalid user 1q2w3e.1234 from 219.150.85.232 port 34492 ssh2 Aug 8 22:05:09 plex-server sshd[1632400]: Invalid user qwert@!@#$% from 219.150.85.232 port 35720 ... |
2020-08-09 06:06:40 |
| 51.195.136.14 | attackspam | Aug 8 18:54:57 ws12vmsma01 sshd[62046]: Failed password for root from 51.195.136.14 port 55994 ssh2 Aug 8 18:59:05 ws12vmsma01 sshd[62631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-2b23bbbe.vps.ovh.net user=root Aug 8 18:59:07 ws12vmsma01 sshd[62631]: Failed password for root from 51.195.136.14 port 39670 ssh2 ... |
2020-08-09 06:35:51 |
| 134.175.161.251 | attackbotsspam | 2020-08-08T23:20:54.429278mail.standpoint.com.ua sshd[5759]: Failed password for root from 134.175.161.251 port 37200 ssh2 2020-08-08T23:22:57.701686mail.standpoint.com.ua sshd[6019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.161.251 user=root 2020-08-08T23:23:00.071169mail.standpoint.com.ua sshd[6019]: Failed password for root from 134.175.161.251 port 39404 ssh2 2020-08-08T23:25:03.334303mail.standpoint.com.ua sshd[6313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.161.251 user=root 2020-08-08T23:25:05.337271mail.standpoint.com.ua sshd[6313]: Failed password for root from 134.175.161.251 port 41612 ssh2 ... |
2020-08-09 06:15:23 |
| 222.186.42.213 | attack | Aug 9 00:00:01 santamaria sshd\[12689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.213 user=root Aug 9 00:00:03 santamaria sshd\[12689\]: Failed password for root from 222.186.42.213 port 38609 ssh2 Aug 9 00:00:05 santamaria sshd\[12689\]: Failed password for root from 222.186.42.213 port 38609 ssh2 ... |
2020-08-09 06:00:17 |
| 123.142.108.122 | attack | Aug 8 22:17:39 server sshd[23950]: Failed password for root from 123.142.108.122 port 54002 ssh2 Aug 8 22:22:13 server sshd[29996]: Failed password for root from 123.142.108.122 port 37436 ssh2 Aug 8 22:26:47 server sshd[2992]: Failed password for root from 123.142.108.122 port 49104 ssh2 |
2020-08-09 06:17:00 |
| 139.59.57.2 | attackbots | 31353/tcp 5324/tcp 16525/tcp... [2020-06-22/08-08]123pkt,48pt.(tcp) |
2020-08-09 06:31:58 |
| 1.245.61.144 | attackbots | Aug 8 23:38:38 OPSO sshd\[16230\]: Invalid user 1515 from 1.245.61.144 port 39754 Aug 8 23:38:38 OPSO sshd\[16230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.245.61.144 Aug 8 23:38:40 OPSO sshd\[16230\]: Failed password for invalid user 1515 from 1.245.61.144 port 39754 ssh2 Aug 8 23:40:00 OPSO sshd\[16355\]: Invalid user Pas5w0rd! from 1.245.61.144 port 59314 Aug 8 23:40:00 OPSO sshd\[16355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.245.61.144 |
2020-08-09 06:18:47 |
| 88.198.51.187 | attackspambots | Aug 8 22:27:04 b-vps wordpress(gpfans.cz)[14942]: Authentication attempt for unknown user buchtic from 88.198.51.187 ... |
2020-08-09 06:04:30 |
| 46.52.130.154 | attack | Aug 8 22:26:25 mout sshd[5490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.52.130.154 user=pi Aug 8 22:26:27 mout sshd[5490]: Failed password for pi from 46.52.130.154 port 57158 ssh2 |
2020-08-09 06:30:18 |
| 104.168.190.54 | attack | Automatic report - Port Scan Attack |
2020-08-09 06:24:05 |
| 149.56.107.216 | attackspam | Aug 9 00:19:16 jane sshd[12063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.107.216 Aug 9 00:19:19 jane sshd[12063]: Failed password for invalid user routhier from 149.56.107.216 port 33422 ssh2 ... |
2020-08-09 06:19:37 |
| 194.190.22.90 | attack | Aug 8 23:04:43 *hidden* sshd[41874]: Failed password for *hidden* from 194.190.22.90 port 38620 ssh2 Aug 8 23:08:29 *hidden* sshd[51609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.190.22.90 user=root Aug 8 23:08:31 *hidden* sshd[51609]: Failed password for *hidden* from 194.190.22.90 port 48914 ssh2 Aug 8 23:12:16 *hidden* sshd[60497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.190.22.90 user=root Aug 8 23:12:19 *hidden* sshd[60497]: Failed password for *hidden* from 194.190.22.90 port 59208 ssh2 |
2020-08-09 06:34:01 |